Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Performance Analysis of End-to-End Fragmentation in Content-Centric Networking., , , and . MASS, page 531-536. IEEE Computer Society, (2015)Towards the NFVI-Assisted ICN: Integrating ICN Forwarding into the Virtualization Infrastructure., , , and . GLOBECOM, page 1-6. IEEE, (2016)A Novel Realization of Threshold Schemes over Binary Field Extensions., and . IEICE Transactions, 94-A (6): 1375-1380 (2011)List Interest: Simply Packing Interests Dramatically Reduces Router Workload in Content-Centric Networking., , and . IEICE Transactions, 99-B (12): 2520-2531 (2016)Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding, , and . CoRR, (2013)A New (k, n)-Threshold Secret Sharing Scheme and Its Extension., , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 455-470. Springer, (2008)On a Construction of Stream-cipher-based Hash Functions., , , and . SECRYPT, page 334-343. SciTePress, (2010)List Interest: Packing Interests for Reduction of Router Workload in CCN 1.0., , , and . MASS, page 500-505. IEEE Computer Society, (2015)Secret Sharing Schemes Based on Linear Codes Can Be Precisely Characterized by the Relative Generalized Hamming Weight., , and . IEICE Transactions, 95-A (11): 2067-2075 (2012)A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme., , , and . IEICE Transactions, 92-A (8): 1808-1821 (2009)