Author of the publication

Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation.

, and . IEICE Trans. Inf. Syst., 92-D (2): 200-210 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security verification of programs with stack inspection., , and . SACMAT, page 31-40. ACM, (2001)Availability checking of dynamic spatial information for automobiles., , , and . ICSRS, page 505-511. IEEE, (2017)Subclasses of Tree Adjoining Grammar for RNA Secondary Structure., , and . TAG+, page 48-55. Simon Fraser University, (2004)Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability., , and . RTA, volume 1833 of Lecture Notes in Computer Science, page 246-260. Springer, (2000)Investigation of a Femto-DAS Hybrid System for In-Building Wireless Solutions., , and . VTC Spring, page 1-5. IEEE, (2016)TV white space availability in Japan estimated using D/U-based and I/N-based protection rules., , and . GLOBECOM, page 1302-1307. IEEE, (2012)Analysis and Implementation Method of Program to Detect Inappropriate Information Leak., , , , and . APAQS, page 5-12. IEEE Computer Society, (2001)Accessibility Verification of WWW Documents by an Automatic Guideline Verification Tool., , and . HICSS, IEEE Computer Society, (2004)Antenna Deployment of 5G Ultra High-Density Distributed Massive MIMO by Low-SHF-Band Indoor and Outdoor Experiments., , , , , , , , and . VTC Fall, page 1-5. IEEE, (2017)Optimal Run Problem for Weighted Register Automata., , and . ICTAC, volume 11884 of Lecture Notes in Computer Science, page 91-110. Springer, (2019)