2008 |
40 | EE | Kenji Hashimoto,
Fumikazu Takasuka,
Kimihide Sakano,
Yasunori Ishihara,
Toru Fujiwara:
Verification of the Security Against Inference Attacks on XML Databases.
APWeb 2008: 359-370 |
39 | EE | Kazuhiro Haramura,
Maki Yoshida,
Toru Fujiwara:
Anonymous Fingerprinting for Predelivery of Contents.
ICISC 2008: 134-151 |
38 | EE | Kenji Yasunaga,
Toru Fujiwara:
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes
CoRR abs/0804.4042: (2008) |
37 | EE | Akinari Yamaguchi,
Shougo Shimizu,
Yasunori Ishihara,
Toru Fujiwara:
Bag-based data models for incomplete information and their closure properties.
J. Intell. Inf. Syst. 30(2): 115-135 (2008) |
2007 |
36 | EE | Kenji Yasunaga,
Toru Fujiwara:
Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes.
AAECC 2007: 110-119 |
35 | EE | Maki Yoshida,
Toru Fujiwara:
On the Security of Tag-KEM for Signcryption.
Electr. Notes Theor. Comput. Sci. 171(1): 83-91 (2007) |
34 | EE | Satoshi Nakayama,
Maki Yoshida,
Shingo Okamura,
Toru Fujiwara:
A Private and Consistent Data Retrieval Scheme with Log-Squared Communication.
IEICE Transactions 90-A(1): 204-215 (2007) |
33 | EE | Takaaki Fujita,
Maki Yoshida,
Toru Fujiwara:
A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain.
IEICE Transactions 90-A(1): 216-225 (2007) |
32 | EE | Kenji Yasunaga,
Toru Fujiwara,
Tadao Kasami:
Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code.
IEICE Transactions 90-A(3): 698-701 (2007) |
2006 |
31 | EE | Maki Yoshida,
Takaaki Fujita,
Toru Fujiwara:
A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain.
IIH-MSP 2006: 101-104 |
30 | EE | Kenji Yasunaga,
Toru Fujiwara:
Determination of the Local Weight Distribution of Binary Linear Block Codes.
IEEE Transactions on Information Theory 52(10): 4444-4454 (2006) |
2005 |
29 | EE | Kenji Hashimoto,
Yasunori Ishihara,
Toru Fujiwara:
Schema update operations preserving the expressive power in XML databases.
ICDE Workshops 2005: 1229 |
28 | EE | Maki Yoshida,
Shigeo Mitsunari,
Toru Fujiwara:
A Timed-Release Key Management Scheme for Backward Recovery.
ICISC 2005: 3-14 |
27 | EE | Shingo Okamura,
Maki Yoshida,
Toru Fujiwara:
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors.
ISSA 2005: 1-12 |
26 | EE | Kenji Yasunaga,
Toru Fujiwara:
Relations between the Local Weight Distributions of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode
CoRR abs/cs/0508013: (2005) |
25 | EE | Shingo Okamura,
Yoshiyuki Konishi,
Maki Yoshida,
Toru Fujiwara:
Unlinkable Delivery System for Interactive Dramas.
IEICE Transactions 88-A(1): 262-269 (2005) |
24 | EE | Yasunori Ishihara,
Shuichiro Ako,
Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases.
IEICE Transactions 88-D(12): 2767-2776 (2005) |
2004 |
23 | EE | Yasunori Ishihara,
Yumi Shimakawa,
Toru Fujiwara:
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.
ICICS 2004: 145-157 |
2002 |
22 | EE | Yasunori Ishihara,
Shuichiro Ako,
Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases.
ICICS 2002: 49-60 |
21 | | Yuansheng Tang,
Toru Fujiwara,
Tadao Kasami:
Asymptotic optimality of the GMD and chase decoding algorithms.
IEEE Transactions on Information Theory 48(8): 2401-2405 (2002) |
2001 |
20 | EE | Maki Yoshida,
Toru Fujiwara:
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.
IMA Int. Conf. 2001: 27-37 |
1999 |
19 | | Yuansheng Tang,
Tadao Kasami,
Toru Fujiwara:
An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity.
AAECC 1999: 201-210 |
18 | | Robert Morelos-Zaragoza,
Toru Fujiwara,
Tadao Kasami,
Shu Lin:
Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity.
IEEE Transactions on Information Theory 45(2): 725-731 (1999) |
1998 |
17 | | Toru Fujiwara,
Hiroshi Yamamoto,
Tadao Kasami,
Shu Lin:
A Trellis-Based Recursive Maximum-Likelihood Decoding Algorithm for Binary Linear Block Codes.
IEEE Transactions on Information Theory 44(2): 714-729 (1998) |
1997 |
16 | | Tadao Kasami,
Tsukasa Sugita,
Toru Fujiwara:
The Split Weight (wL, wR) Enumeration of Reed-Muller Codes for wL + wR < 2dmin.
AAECC 1997: 197-211 |
15 | | Y. Desaki,
Toru Fujiwara,
Tadao Kasami:
The weight distributions of extended binary primitive BCH codes of length 128.
IEEE Transactions on Information Theory 43(4): 1364-1371 (1997) |
14 | | Yuichi Kaji,
Toru Fujiwara,
Tadao Kasami:
Solving a Unification Problem under Constrained Substitutions Using Tree Automata.
J. Symb. Comput. 23(1): 79-117 (1997) |
1996 |
13 | | Tsukasa Sugita,
Tadao Kasami,
Toru Fujiwara:
The weight distribution of the third-order Reed-Muller code of length 512.
IEEE Transactions on Information Theory 42(5): 1622-1625 (1996) |
1995 |
12 | | Shou-ping Feng,
Toru Fujiwara,
Tadao Kasami,
Kazuhiko Iwasaki:
On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers.
IEEE Trans. Computers 44(11): 1265-1274 (1995) |
1994 |
11 | | Yuichi Kaji,
Toru Fujiwara,
Tadao Kasami:
Solving a Unification Problem under Constrained Substitutions Using Tree Automata.
FSTTCS 1994: 276-287 |
10 | | Toyoo Takata,
Y. Yamashita,
Toru Fujiwara,
Tadao Kasami,
Shu Lin:
Suboptimum decoding of decomposable block codes.
IEEE Transactions on Information Theory 40(5): 1392-1405 (1994) |
1993 |
9 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes.
IEEE Transactions on Information Theory 39(1): 242- (1993) |
8 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On complexity of trellis structure of linear block codes.
IEEE Transactions on Information Theory 39(3): 1057- (1993) |
1991 |
7 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On linear structure and phase rotation invariant properties of block M-PSK modulation codes.
IEEE Transactions on Information Theory 37(1): 164- (1991) |
6 | | Toru Fujiwara,
Minoru Ito,
Tadao Kasami,
Mitsuteru Kataoka,
Jun Okui:
Performance analysis of disk allocation method using error-correcting codes.
IEEE Transactions on Information Theory 37(2): 379- (1991) |
5 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On multilevel block modulation codes.
IEEE Transactions on Information Theory 37(4): 965-975 (1991) |
4 | | Toru Fujiwara,
Tadao Kasami,
Shou-ping Feng:
On the monotonic property of the probability of undetected error for a shortened code.
IEEE Transactions on Information Theory 37(5): 1409- (1991) |
1988 |
3 | | Tadao Kasami,
Toru Fujiwara,
Toyoo Takata,
Shu Lin:
A cascaded coding scheme for error control and its performance analysis.
IEEE Transactions on Information Theory 34(3): 448-462 (1988) |
1986 |
2 | | Toru Fujiwara,
Toyoo Takata,
Tadao Kasami,
Shu Lin:
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11.
IEEE Transactions on Information Theory 32(5): 706- (1986) |
1985 |
1 | | Tadao Kasami,
Toru Fujiwara,
Shu Lin:
An approximation to the weight distribution of binary linear codes.
IEEE Transactions on Information Theory 31(6): 769-780 (1985) |