default search action
Toru Fujiwara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c54]Kazuki Iwahana, Naoto Yanai, Toru Fujiwara:
Backdoor Attacks Leveraging Latent Representation in Competitive Learning. ESORICS Workshops (2) 2023: 700-718 - 2022
- [j55]Kazuki Iwahana, Naoto Yanai, Jason Paul Cruz, Toru Fujiwara:
SPGC: Integration of Secure Multiparty Computation and Differential Privacy for Gradient Computation on Collaborative Learning. J. Inf. Process. 30: 209-225 (2022) - 2021
- [j54]Toru Fujiwara, Takuya Kusaka:
The Weight Distributions of the (256, k) Extended Binary Primitive BCH Codes with k≤71 and k≥187. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1321-1328 (2021) - [c53]Kazuki Iwahana, Naoto Yanai, Jason Paul Cruz, Toru Fujiwara:
SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning. DPM/CBT@ESORICS 2021: 89-105 - 2020
- [j53]Yasunori Ishihara, Takashi Hayata, Toru Fujiwara:
The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies. IEICE Trans. Inf. Syst. 103-D(11): 2278-2288 (2020) - [j52]Tatsuya Takemura, Naoto Yanai, Toru Fujiwara:
Model Extraction Attacks on Recurrent Neural Networks. J. Inf. Process. 28: 1010-1024 (2020) - [c52]Kodai Sato, Kenji Yasunaga, Toru Fujiwara:
A Construction of Robustly Reusable Fuzzy Extractors over Blockchains. ISITA 2020: 353-357 - [i4]Tatsuya Takemura, Naoto Yanai, Toru Fujiwara:
Model Extraction Attacks against Recurrent Neural Networks. CoRR abs/2002.00123 (2020)
2010 – 2019
- 2019
- [j51]Maki Yoshida, Toru Fujiwara, Marc P. C. Fossorier:
Optimal Uniform Secret Sharing. IEEE Trans. Inf. Theory 65(1): 436-443 (2019) - [c51]Sangamithirai Subramanian Parimalam, Naoyuki Sotta, Takashi Kuromori, Toru Fujiwara, Masami Yokota Hirai, Hirofumi Shintaku:
Extraction of RNA from an intact single plant cell with cell wall using focused electric field. MHS 2019: 1-2 - [c50]Yoshiki Yumbe, Norihisa Komoda, Toru Fujiwara:
Workforce Scheduling System to Manage Static Optimization and Dynamic Re-optimization for Field Service. SMC 2019: 3142-3147 - 2018
- [j50]Naoto Yanai, Toru Fujiwara:
Tighter Reductions for Deterministic Identity-Based Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 64-76 (2018) - [j49]Seunghoan Song, Toru Fujiwara:
Sphere Packing Bound and Gilbert-Varshamov Bound for b-Symbol Read Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1915-1924 (2018) - [j48]Thi Ngoc Diep Pham, Chai Kiat Yeo, Naoto Yanai, Toru Fujiwara:
Detecting Flooding Attack and Accommodating Burst Traffic in Delay-Tolerant Networks. IEEE Trans. Veh. Technol. 67(1): 795-808 (2018) - 2017
- [c49]Yuuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara:
Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model. DPM/CBT@ESORICS 2017: 55-69 - 2016
- [j47]Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki, Toru Fujiwara:
Determinacy and Subsumption of Single-Valued Bottom-Up Tree Transducers. IEICE Trans. Inf. Syst. 99-D(3): 575-587 (2016) - [j46]Maki Yoshida, Toru Fujiwara:
Efficient Usage of Cover Free Families in Broadcast Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1216-1221 (2016) - [c48]Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Web security model with cache. ISITA 2016: 408-412 - [c47]Ryo Fukuyama, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Towards a formal foundation of protection against data-oriented attacks. ISITA 2016: 413-417 - [c46]Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
ISDSR: Secure DSR with ID-based Sequential Aggregate Signature. SECRYPT 2016: 376-387 - 2015
- [j45]Maki Yoshida, Kazuya Ohkita, Toru Fujiwara:
Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking. IEICE Trans. Inf. Syst. 98-D(1): 58-64 (2015) - [j44]Maki Yoshida, Toru Fujiwara:
On the Impossibility of d-Multiplicative Non-perfect Secret Sharing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(2): 767-770 (2015) - [j43]Shohei Ando, Fumihiko Ino, Toru Fujiwara, Kenichi Hagihara:
Enumerating Joint Weight of a Binary Linear Code Using Parallel Architectures: multi-core CPUs and GPUs. Int. J. Netw. Comput. 5(2): 290-303 (2015) - [j42]Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara:
The consistency and absolute consistency problems of XML schema mappings between restricted DTDs. World Wide Web 18(5): 1443-1461 (2015) - [c45]Yuma Higashiyama, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones. CANDAR 2015: 89-95 - [c44]Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers. TrustCom/BigDataSE/ISPA (1) 2015: 1329-1336 - 2014
- [j41]Kansuporn Sriyudthsak, Yuji Sawada, Yukako Chiba, Yui Yamashita, Shigehiko Kanaya, Hitoshi Onouchi, Toru Fujiwara, Satoshi Naito, Eberhard O. Voit, Fumihide Shiraishi, Masami Y. Hirai:
A U-system approach for predicting metabolic behaviors and responses based on an alleged metabolic reaction network. BMC Syst. Biol. 8(S-5): S4 (2014) - [c43]Hironobu Tozuka, Maki Yoshida, Toru Fujiwara:
Salt-and-pepper image watermarking system for IHC evaluation criteria. IWIHC@AsiaCCS 2014: 31-36 - [c42]Yasunori Ishihara, Hayato Kuwada, Toru Fujiwara:
The Absolute Consistency Problem of XML Schema Mappings with Data Values between Restricted DTDs. DEXA (1) 2014: 317-327 - [c41]Shohei Ando, Fumihiko Ino, Toru Fujiwara, Kenichi Hagihara:
A Parallel Algorithm for Enumerating Joint Weight of a Binary Linear Code in Network Coding. CANDAR 2014: 137-143 - 2013
- [c40]Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara:
The Consistency and Absolute Consistency Problems of XML Schema Mappings between Restricted DTDs. APWeb 2013: 228-239 - [c39]Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki, Toru Fujiwara:
Determinacy and Subsumption for Single-Valued Bottom-Up Tree Transducers. LATA 2013: 335-346 - [c38]Yasunori Ishihara, Nobutaka Suzuki, Kenji Hashimoto, Shougo Shimizu, Toru Fujiwara:
XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs. DBPL 2013 - [i3]Ryo Iwase, Yasunori Ishihara, Toru Fujiwara:
Toward Security Verification against Inference Attacks on Data Trees. CoRR abs/1312.4833 (2013) - 2012
- [j40]Takuya Kusaka, Ryuhei Yokoyama, Toru Fujiwara:
A Recursive Method for Vector Generation in Non-increasing Order of Its Likelihood for All Binary Vectors and Its Application for Linear Block Code Decodings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(4): 801-810 (2012) - [j39]Kenji Hashimoto, Hiroto Kawai, Yasunori Ishihara, Toru Fujiwara:
Decidability of the Security against Inference Attacks Using a Functional Dependency on XML Databases. IEICE Trans. Inf. Syst. 95-D(5): 1365-1374 (2012) - [c37]Maki Yoshida, Toru Fujiwara, Marc P. C. Fossorier:
Optimum General Threshold Secret Sharing. ICITS 2012: 187-204 - [c36]Takuya Kusaka, Ryuhei Yokoyama, Toru Fujiwara:
A soft-decision sphere decoding based on the recursive vector generator. ISITA 2012: 111-115 - [c35]Seigo Ikeda, Maki Yoshida, Toru Fujiwara:
New hybrid additive-multiplicative watermarking with better tradeoff between image quality and detection accuracy. ISITA 2012: 797-801 - [c34]Itsuki Suzuki, Maki Yoshida, Toru Fujiwara:
Generic Construction of GUC Secure Commitment in the KRK Model. IWSEC 2012: 244-260 - [c33]Yasunori Ishihara, Kenji Hashimoto, Shougo Shimizu, Toru Fujiwara:
XPath satisfiability with downward and sibling axes is tractable under most of real-world DTDs. WIDM 2012: 11-18 - 2011
- [j38]Toru Fujiwara:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 1-2 (2011) - [j37]Maki Yoshida, Toru Fujiwara:
Toward Digital Watermarking for Cryptographic Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 270-272 (2011) - [c32]Kenji Hashimoto, Yohei Kusunoki, Yasunori Ishihara, Toru Fujiwara:
Validity of Positive XPath Queries with Wildcard in the Presence of DTDs. DBPL 2011 - 2010
- [j36]Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara:
The Vector Decomposition Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 188-193 (2010) - [j35]Kenji Yasunaga, Toru Fujiwara:
On correctable errors of binary linear codes. IEEE Trans. Inf. Theory 56(6): 2537-2548 (2010) - [c31]Tetsushi Masuno, Toru Fujiwara, Takuya Kusaka:
A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code. ISITA 2010: 326-331 - [c30]Ryuhei Yokoyama, Toru Fujiwara, Takuya Kusaka:
Adaptive recursive MLD using ordered statistics for low rate codes. ISITA 2010: 772-777 - [c29]Hiroaki Yamanaka, Toru Fujiwara, Shingo Okamura:
A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay. SAINT 2010: 181-184 - [c28]Yasunori Ishihara, Shougo Shimizu, Toru Fujiwara:
Extending the Tractability Results on XPath Satisfiability with Sibling Axes. XSym 2010: 33-47
2000 – 2009
- 2009
- [j34]Maki Yoshida, Toru Fujiwara:
Flexible Timed-Release Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 222-225 (2009) - [j33]Kenji Hashimoto, Kimihide Sakano, Fumikazu Takasuka, Yasunori Ishihara, Toru Fujiwara:
Verification of the Security against Inference Attacks on XML Databases. IEICE Trans. Inf. Syst. 92-D(5): 1022-1032 (2009) - [c27]Yasunori Ishihara, Takuji Morimoto, Shougo Shimizu, Kenji Hashimoto, Toru Fujiwara:
A Tractable Subclass of DTDs for XPath Satisfiability with Sibling Axes. DBPL 2009: 68-83 - [c26]Maki Yoshida, Toru Fujiwara:
Watermarking Cryptographic Data. IIH-MSP 2009: 40-43 - [c25]Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara:
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking. IWDW 2009: 279-293 - 2008
- [j32]Akinari Yamaguchi, Shougo Shimizu, Yasunori Ishihara, Toru Fujiwara:
Bag-based data models for incomplete information and their closure properties. J. Intell. Inf. Syst. 30(2): 115-135 (2008) - [c24]Kenji Hashimoto, Fumikazu Takasuka, Kimihide Sakano, Yasunori Ishihara, Toru Fujiwara:
Verification of the Security Against Inference Attacks on XML Databases. APWeb 2008: 359-370 - [c23]Susumu Date, Shoji Miyanaga, Kohei Ichikawa, Shinji Shimojo, Haruo Takemura, Toru Fujiwara:
PRIUS: An Educational Framework on PRAGMA Fostering Globally-Leading Researchers in Integrated Sciences. eScience 2008: 576-581 - [c22]Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara:
Anonymous Fingerprinting for Predelivery of Contents. ICISC 2008: 134-151 - [c21]Maki Yoshida, Toru Fujiwara:
Expiration Dated Fingerprinting. IIH-MSP 2008: 147-150 - [c20]Kenji Yasunaga, Toru Fujiwara:
Uncorrectable errors of weight half the minimum distance for binary linear codes. ISIT 2008: 975-979 - [i2]Kenji Yasunaga, Toru Fujiwara:
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes. CoRR abs/0804.4042 (2008) - 2007
- [j31]Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Toru Fujiwara:
A Private and Consistent Data Retrieval Scheme with Log-Squared Communication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 204-215 (2007) - [j30]Takaaki Fujita, Maki Yoshida, Toru Fujiwara:
A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 216-225 (2007) - [j29]Kenji Yasunaga, Toru Fujiwara, Tadao Kasami:
Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(3): 698-701 (2007) - [c19]Kenji Yasunaga, Toru Fujiwara:
Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes. AAECC 2007: 110-119 - [c18]Maki Yoshida, Itaru Kitamura, Toru Fujiwara:
A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain. IIH-MSP 2007: 16-19 - [c17]Maki Yoshida, Toru Fujiwara:
Secure Construction for Nonlinear Function Threshold Ramp Secret Sharing. ISIT 2007: 1041-1045 - 2006
- [j28]Kenji Yasunaga, Toru Fujiwara:
Determination of the Local Weight Distribution of Binary Linear Block Codes. IEEE Trans. Inf. Theory 52(10): 4444-4454 (2006) - [c16]Maki Yoshida, Takaaki Fujita, Toru Fujiwara:
A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain. IIH-MSP 2006: 101-104 - [c15]Maki Yoshida, Toru Fujiwara:
On the Security of Tag-KEM for Signcryption. WCAN@ICALP 2006: 83-91 - 2005
- [j27]Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara:
Unlinkable Delivery System for Interactive Dramas. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 262-269 (2005) - [j26]Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases. IEICE Trans. Inf. Syst. 88-D(12): 2767-2776 (2005) - [c14]Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara:
Schema update operations preserving the expressive power in XML databases. ICDE Workshops 2005: 1229 - [c13]Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara:
A Timed-Release Key Management Scheme for Backward Recovery. ICISC 2005: 3-14 - [c12]Kenji Yasunaga, Toru Fujiwara:
Relations between the local weight distributions of a linear block code, its extended code, and its even weight subcode. ISIT 2005: 382-386 - [c11]Shingo Okamura, Maki Yoshida, Toru Fujiwara:
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors. ISSA 2005: 1-12 - [i1]Kenji Yasunaga, Toru Fujiwara:
Relations between the Local Weight Distributions of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode. CoRR abs/cs/0508013 (2005) - 2004
- [c10]Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara:
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. ICICS 2004: 145-157 - [c9]Jun Asatani, Takuya Koumoto, Toru Fujiwara, Tadao Kasami:
Soft-input soft-output decoding algorithm of linear block codes based on minimum distance search. ISIT 2004: 345 - 2002
- [j25]Yuansheng Tang, Toru Fujiwara, Tadao Kasami:
Asymptotic optimality of the GMD and chase decoding algorithms. IEEE Trans. Inf. Theory 48(8): 2401-2405 (2002) - [c8]Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases. ICICS 2002: 49-60 - 2001
- [c7]Maki Yoshida, Toru Fujiwara:
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem. IMACC 2001: 27-37
1990 – 1999
- 1999
- [j24]Robert Morelos-Zaragoza, Toru Fujiwara, Tadao Kasami, Shu Lin:
Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity. IEEE Trans. Inf. Theory 45(2): 725-731 (1999) - [c6]Yuansheng Tang, Tadao Kasami, Toru Fujiwara:
An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity. AAECC 1999: 201-210 - [c5]Morgan Hirosuke Miki, Daisuke Taki, Gen Fujita, Takao Onoye, Isao Shirakawa, Toru Fujiwara, Tadao Kasami:
Recursive maximum likelihood decoder for high-speed satellite communication. ISCAS (4) 1999: 572-575 - 1998
- [j23]Toru Fujiwara, Hiroshi Yamamoto, Tadao Kasami, Shu Lin:
A Trellis-Based Recursive Maximum-Likelihood Decoding Algorithm for Binary Linear Block Codes. IEEE Trans. Inf. Theory 44(2): 714-729 (1998) - 1997
- [j22]Yuichi Kaji, Toru Fujiwara, Tadao Kasami:
Solving a Unification Problem under Constrained Substitutions Using Tree Automata. J. Symb. Comput. 23(1): 79-117 (1997) - [j21]Tadao Kasami, Toyoo Takata, Kouichi Yamashita, Toru Fujiwara, Shu Lin:
On bit-error probability of a concatenated coding scheme. IEEE Trans. Commun. 45(5): 536-543 (1997) - [j20]Y. Desaki, Toru Fujiwara, Tadao Kasami:
The weight distributions of extended binary primitive BCH codes of length 128. IEEE Trans. Inf. Theory 43(4): 1364-1371 (1997) - [c4]Tadao Kasami, Tsukasa Sugita, Toru Fujiwara:
The Split Weight (wL, wR) Enumeration of Reed-Muller Codes for wL + wR < 2dmin. AAECC 1997: 197-211 - 1996
- [j19]Tsukasa Sugita, Tadao Kasami, Toru Fujiwara:
The weight distribution of the third-order Reed-Muller code of length 512. IEEE Trans. Inf. Theory 42(5): 1622-1625 (1996) - 1995
- [j18]Shou-ping Feng, Toru Fujiwara, Tadao Kasami, Kazuhiko Iwasaki:
On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers. IEEE Trans. Computers 44(11): 1265-1274 (1995) - 1994
- [j17]Jiantian Wu, Shu Lin, Tadao Kasami, Toru Fujiwara, Toyoo Takata:
An upper bound on the effective error coefficient of two-stage decoding, and good two-level decompositions of some Reed-Muller codes. IEEE Trans. Commun. 42(234): 813-818 (1994) - [j16]Toyoo Takata, Yuji Yamashita, Toru Fujiwara, Tadao Kasami, Shu Lin:
Suboptimum decoding of decomposable block codes. IEEE Trans. Inf. Theory 40(5): 1392-1405 (1994) - [c3]Yuichi Kaji, Toru Fujiwara, Tadao Kasami:
Solving a Unification Problem under Constrained Substitutions Using Tree Automata. FSTTCS 1994: 276-287 - 1993
- [j15]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes. IEEE Trans. Inf. Theory 39(1): 242-245 (1993) - [j14]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
On complexity of trellis structure of linear block codes. IEEE Trans. Inf. Theory 39(3): 1057-1064 (1993) - [c2]Shou-ping Feng, Toru Fujiwara, Tadao Kasami, Kazuhiko Iwasaki:
On the maximum value of aliasing probabilities for single input signature registers. VTS 1993: 267-274 - 1992
- [c1]Kazuhiko Iwasaki, Toru Fujiwara, Tadao Kasami:
A defect-tolerant design for mask ROMs. VTS 1992: 171-175 - 1991
- [j13]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
On linear structure and phase rotation invariant properties of block M-PSK modulation codes. IEEE Trans. Inf. Theory 37(1): 164-167 (1991) - [j12]Toru Fujiwara, Minoru Ito, Tadao Kasami, Mitsuteru Kataoka, Jun Okui:
Performance analysis of disk allocation method using error-correcting codes. IEEE Trans. Inf. Theory 37(2): 379-384 (1991) - [j11]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
On multilevel block modulation codes. IEEE Trans. Inf. Theory 37(4): 965-975 (1991) - [j10]Toru Fujiwara, Tadao Kasami, Shou-ping Feng:
On the monotonic property of the probability of undetected error for a shortened code. IEEE Trans. Inf. Theory 37(5): 1409-1411 (1991) - 1990
- [j9]Tadao Kasami, Toyoo Takata, Toru Fujiwara, Shu Lin:
A concatenated coded modulation scheme for error control. IEEE Trans. Commun. 38(6): 752-763 (1990) - [j8]Toyoo Takata, Toru Fujiwara, Tadao Kasami, Shu Lin:
An error control system with multiple-stage forward error corrections. IEEE Trans. Commun. 38(10): 1799-1809 (1990)
1980 – 1989
- 1989
- [j7]Toru Fujiwara, Tadao Kasami, Shu Lin:
Error detecting capabilities of the shortened Hamming codes adopted for error detection in IEEE Standard 802.3. IEEE Trans. Commun. 37(9): 986-989 (1989) - 1988
- [j6]Tadao Kasami, Toru Fujiwara, Toyoo Takata, Shu Lin:
A cascaded coding scheme for error control and its performance analysis. IEEE Trans. Inf. Theory 34(3): 448-462 (1988) - 1987
- [j5]Toru Fujiwara, Kenichi Taniguchi, Tadao Kasami:
Decision problem concerning security for cryptographic protocols. Syst. Comput. Jpn. 18(5): 67-78 (1987) - 1986
- [j4]Tadao Kasami, Toru Fujiwara, Shu Lin:
A Concatenated Coding Scheme for Error Control. IEEE Trans. Commun. 34(5): 481-488 (1986) - [j3]Toru Fujiwara, Toyoo Takata, Tadao Kasami, Shu Lin:
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11. IEEE Trans. Inf. Theory 32(5): 706-709 (1986) - 1985
- [j2]Toru Fujiwara, Tadao Kasami, Atsushi Kitai, Shu Lin:
On the Undetected Error Probability for Shortened Hamming Codes. IEEE Trans. Commun. 33(6): 570-574 (1985) - [j1]Tadao Kasami, Toru Fujiwara, Shu Lin:
An approximation to the weight distribution of binary linear codes. IEEE Trans. Inf. Theory 31(6): 769-780 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint