Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tanaka, Hidema
add a person with the name Tanaka, Hidema
 

Other publications of authors with the same name

Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest.. IEICE Transactions, 91-D (5): 1439-1446 (2008)An Optimized Algebraic Method for Higher Order Differential Attack., , and . AAECC, volume 2643 of Lecture Notes in Computer Science, page 61-70. Springer, (2003)Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector., and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 146-163. Springer, (2017)Anonymous Password-Based Authenticated Key Exchange., , and . INDOCRYPT, volume 3797 of Lecture Notes in Computer Science, page 244-257. Springer, (2005)Algebraic Degree Estimation for Integral Attack by Randomized Algorithm., and . WISA, volume 10144 of Lecture Notes in Computer Science, page 292-304. (2016)A Linguistic Approach Towards Intrusion Detection in Actual Proxy Logs., and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 708-718. Springer, (2018)Classification of Hash Functions Suitable for Real-Life Systems., , , , and . IEICE Transactions, 91-A (1): 64-73 (2008)Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels., , , , , and . ARES, page 619-624. IEEE Computer Society, (2010)Information Theoretical Analysis of Side-Channel Attack., , , and . ICISS, volume 8303 of Lecture Notes in Computer Science, page 255-269. Springer, (2013)Abusing TCP Retransmission for DoS Attack Inside Virtual Network., , and . WISA, volume 10763 of Lecture Notes in Computer Science, page 199-211. Springer, (2017)