| 2008 |
| 40 | EE | Kenji Hashimoto,
Fumikazu Takasuka,
Kimihide Sakano,
Yasunori Ishihara,
Toru Fujiwara:
Verification of the Security Against Inference Attacks on XML Databases.
APWeb 2008: 359-370 |
| 39 | EE | Kazuhiro Haramura,
Maki Yoshida,
Toru Fujiwara:
Anonymous Fingerprinting for Predelivery of Contents.
ICISC 2008: 134-151 |
| 38 | EE | Kenji Yasunaga,
Toru Fujiwara:
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes
CoRR abs/0804.4042: (2008) |
| 37 | EE | Akinari Yamaguchi,
Shougo Shimizu,
Yasunori Ishihara,
Toru Fujiwara:
Bag-based data models for incomplete information and their closure properties.
J. Intell. Inf. Syst. 30(2): 115-135 (2008) |
| 2007 |
| 36 | EE | Kenji Yasunaga,
Toru Fujiwara:
Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes.
AAECC 2007: 110-119 |
| 35 | EE | Maki Yoshida,
Toru Fujiwara:
On the Security of Tag-KEM for Signcryption.
Electr. Notes Theor. Comput. Sci. 171(1): 83-91 (2007) |
| 34 | EE | Satoshi Nakayama,
Maki Yoshida,
Shingo Okamura,
Toru Fujiwara:
A Private and Consistent Data Retrieval Scheme with Log-Squared Communication.
IEICE Transactions 90-A(1): 204-215 (2007) |
| 33 | EE | Takaaki Fujita,
Maki Yoshida,
Toru Fujiwara:
A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain.
IEICE Transactions 90-A(1): 216-225 (2007) |
| 32 | EE | Kenji Yasunaga,
Toru Fujiwara,
Tadao Kasami:
Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code.
IEICE Transactions 90-A(3): 698-701 (2007) |
| 2006 |
| 31 | EE | Maki Yoshida,
Takaaki Fujita,
Toru Fujiwara:
A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain.
IIH-MSP 2006: 101-104 |
| 30 | EE | Kenji Yasunaga,
Toru Fujiwara:
Determination of the Local Weight Distribution of Binary Linear Block Codes.
IEEE Transactions on Information Theory 52(10): 4444-4454 (2006) |
| 2005 |
| 29 | EE | Kenji Hashimoto,
Yasunori Ishihara,
Toru Fujiwara:
Schema update operations preserving the expressive power in XML databases.
ICDE Workshops 2005: 1229 |
| 28 | EE | Maki Yoshida,
Shigeo Mitsunari,
Toru Fujiwara:
A Timed-Release Key Management Scheme for Backward Recovery.
ICISC 2005: 3-14 |
| 27 | EE | Shingo Okamura,
Maki Yoshida,
Toru Fujiwara:
Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors.
ISSA 2005: 1-12 |
| 26 | EE | Kenji Yasunaga,
Toru Fujiwara:
Relations between the Local Weight Distributions of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode
CoRR abs/cs/0508013: (2005) |
| 25 | EE | Shingo Okamura,
Yoshiyuki Konishi,
Maki Yoshida,
Toru Fujiwara:
Unlinkable Delivery System for Interactive Dramas.
IEICE Transactions 88-A(1): 262-269 (2005) |
| 24 | EE | Yasunori Ishihara,
Shuichiro Ako,
Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases.
IEICE Transactions 88-D(12): 2767-2776 (2005) |
| 2004 |
| 23 | EE | Yasunori Ishihara,
Yumi Shimakawa,
Toru Fujiwara:
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases.
ICICS 2004: 145-157 |
| 2002 |
| 22 | EE | Yasunori Ishihara,
Shuichiro Ako,
Toru Fujiwara:
Security against Inference Attacks on Negative Information in Object-Oriented Databases.
ICICS 2002: 49-60 |
| 21 | | Yuansheng Tang,
Toru Fujiwara,
Tadao Kasami:
Asymptotic optimality of the GMD and chase decoding algorithms.
IEEE Transactions on Information Theory 48(8): 2401-2405 (2002) |
| 2001 |
| 20 | EE | Maki Yoshida,
Toru Fujiwara:
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem.
IMA Int. Conf. 2001: 27-37 |
| 1999 |
| 19 | | Yuansheng Tang,
Tadao Kasami,
Toru Fujiwara:
An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and Its Computational Complexity.
AAECC 1999: 201-210 |
| 18 | | Robert Morelos-Zaragoza,
Toru Fujiwara,
Tadao Kasami,
Shu Lin:
Constructions of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity.
IEEE Transactions on Information Theory 45(2): 725-731 (1999) |
| 1998 |
| 17 | | Toru Fujiwara,
Hiroshi Yamamoto,
Tadao Kasami,
Shu Lin:
A Trellis-Based Recursive Maximum-Likelihood Decoding Algorithm for Binary Linear Block Codes.
IEEE Transactions on Information Theory 44(2): 714-729 (1998) |
| 1997 |
| 16 | | Tadao Kasami,
Tsukasa Sugita,
Toru Fujiwara:
The Split Weight (wL, wR) Enumeration of Reed-Muller Codes for wL + wR < 2dmin.
AAECC 1997: 197-211 |
| 15 | | Y. Desaki,
Toru Fujiwara,
Tadao Kasami:
The weight distributions of extended binary primitive BCH codes of length 128.
IEEE Transactions on Information Theory 43(4): 1364-1371 (1997) |
| 14 | | Yuichi Kaji,
Toru Fujiwara,
Tadao Kasami:
Solving a Unification Problem under Constrained Substitutions Using Tree Automata.
J. Symb. Comput. 23(1): 79-117 (1997) |
| 1996 |
| 13 | | Tsukasa Sugita,
Tadao Kasami,
Toru Fujiwara:
The weight distribution of the third-order Reed-Muller code of length 512.
IEEE Transactions on Information Theory 42(5): 1622-1625 (1996) |
| 1995 |
| 12 | | Shou-ping Feng,
Toru Fujiwara,
Tadao Kasami,
Kazuhiko Iwasaki:
On the Maximum Value of Aliasing Probabilities for Single Input Signature Registers.
IEEE Trans. Computers 44(11): 1265-1274 (1995) |
| 1994 |
| 11 | | Yuichi Kaji,
Toru Fujiwara,
Tadao Kasami:
Solving a Unification Problem under Constrained Substitutions Using Tree Automata.
FSTTCS 1994: 276-287 |
| 10 | | Toyoo Takata,
Y. Yamashita,
Toru Fujiwara,
Tadao Kasami,
Shu Lin:
Suboptimum decoding of decomposable block codes.
IEEE Transactions on Information Theory 40(5): 1392-1405 (1994) |
| 1993 |
| 9 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On the optimum bit orders with respect to the state complexity of trellis diagrams for binary linear codes.
IEEE Transactions on Information Theory 39(1): 242- (1993) |
| 8 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On complexity of trellis structure of linear block codes.
IEEE Transactions on Information Theory 39(3): 1057- (1993) |
| 1991 |
| 7 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On linear structure and phase rotation invariant properties of block M-PSK modulation codes.
IEEE Transactions on Information Theory 37(1): 164- (1991) |
| 6 | | Toru Fujiwara,
Minoru Ito,
Tadao Kasami,
Mitsuteru Kataoka,
Jun Okui:
Performance analysis of disk allocation method using error-correcting codes.
IEEE Transactions on Information Theory 37(2): 379- (1991) |
| 5 | | Tadao Kasami,
Toyoo Takata,
Toru Fujiwara,
Shu Lin:
On multilevel block modulation codes.
IEEE Transactions on Information Theory 37(4): 965-975 (1991) |
| 4 | | Toru Fujiwara,
Tadao Kasami,
Shou-ping Feng:
On the monotonic property of the probability of undetected error for a shortened code.
IEEE Transactions on Information Theory 37(5): 1409- (1991) |
| 1988 |
| 3 | | Tadao Kasami,
Toru Fujiwara,
Toyoo Takata,
Shu Lin:
A cascaded coding scheme for error control and its performance analysis.
IEEE Transactions on Information Theory 34(3): 448-462 (1988) |
| 1986 |
| 2 | | Toru Fujiwara,
Toyoo Takata,
Tadao Kasami,
Shu Lin:
An approximation to the weight distribution of binary primitive BCH codes with designed distances 9 and 11.
IEEE Transactions on Information Theory 32(5): 706- (1986) |
| 1985 |
| 1 | | Tadao Kasami,
Toru Fujiwara,
Shu Lin:
An approximation to the weight distribution of binary linear codes.
IEEE Transactions on Information Theory 31(6): 769-780 (1985) |