Author of the publication

Secure Host Name Resolution Infrastructure for Overlay Networks.

, , and . IEICE Transactions, 89-B (9): 2434-2439 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tanaka, Toshiaki
add a person with the name Tanaka, Toshiaki
 

Other publications of authors with the same name

On Effectiveness of Clock Control in Stream Ciphers., , , and . IEICE Transactions, 90-A (9): 1780-1787 (2007)Efficient Implementation of the Pairing on Mobilephones Using BREW., , , and . IEICE Transactions, 91-D (5): 1330-1337 (2008)High-Quality and High-Speed Wireless Multimedia Transmission Technology for Personal Handy Phone System., , , , and . Wireless Personal Communications, 9 (3): 255-270 (1999)A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework., , , and . Security and Management, page 323-329. CSREA Press, (2010)Assessment of visual space recognition in patients with unilateral spatial neglect using head mounted display (HMD) system: Case study with left unilateral spatial neglect., , , , and . SII, page 712-716. IEEE, (2013)Anonymous Prepaid Content Viewing System with Mobile Terminal., , , , and . SECRYPT, page 281-288. INSTICC Press, (2007)HARP: FORTRAN to silicon compilation system., , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 8 (6): 649-660 (1989)DNS Transport Size Issues in IPv6 Environment., , , , and . SAINT Workshops, page 141-145. IEEE Computer Society, (2004)Implementation of remote system using touchless palmprint recognition algorithm., , , , and . MoMM, page 33-41. ACM, (2010)Side-Channel Analysis of the K2 Stream Cipher., , , , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 53-73. Springer, (2010)