Author of the publication

Assurance Evaluation Technology of Train Control System for Achieving Expansion during Operation .

, , , , and . HASE, page 71-78. IEEE Computer Society, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Keystream Generator MUGI., , , , and . IEICE Transactions, 87-A (1): 37-45 (2004)Modeling of Train Control System and a Method of Assurance Evaluation., , , and . ICDCS Workshops, page 89-94. IEEE Computer Society, (2002)Single-Chip Implementation and Evaluation of Passive UHF RFID Tag with Hash-Based Mutual Authentication., , , , and . RFIDSec Asia, volume 12 of Cryptology and Information Security Series, page 3-15. IOS Press, (2014)Correlation Power Analysis and Countermeasure on the Stream Cipher Enocoro-128v2., , , and . IEICE Transactions, 96-A (3): 697-704 (2013)A Distinguishing Attack of SNOW 2.0 with Linear Masking Method., , and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 222-233. Springer, (2003)Comparison of Deep Learning and Image Processing for Tracking the Cognitive Motion of a Laboratory Mouse., , , , , , and . BioCAS, page 1-4. IEEE, (2019)A MAC Forgery Attack on SOBER-128., , and . IEICE Transactions, 88-A (5): 1166-1172 (2005)A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications., , and . RFIDSec Asia, volume 11 of Cryptology and Information Security Series, page 83-94. IOS Press, (2013)Improving the Security of Cryptographic Protocol Standards., , , , and . IEEE Security & Privacy, 13 (3): 24-31 (2015)The New ATC Systems with an Autonomous Speed Control with On-Board Equipment., , , , and . ISADS, page 235-238. IEEE Computer Society, (2001)