2007 |
9 | EE | Hirokazu Ozaki,
Atsushi Kara:
Computing the Availability and MTTF of Shared Protection Systems.
CIT 2007: 480-485 |
2006 |
8 | EE | Yaser M. Asem,
Atsushi Kara:
New Group Rekeying Algorithm Using Combination of Secret Mask Patterns and Hash Values.
IEICE Transactions 89-D(9): 2525-2532 (2006) |
2005 |
7 | EE | Yaser M. Asem,
Atsushi Kara:
A scalable group-rekeying scheme using secret mask patterns.
IJHPCN 3(5/6): 346-355 (2005) |
2004 |
6 | EE | Yaser M. Asem,
Atsushi Kara:
A Scalable Group Rekeying Scheme using Secret Mask Patterns.
AINA (1) 2004: 190-195 |
5 | EE | Atsushi Kara,
Takahiro Suzuki,
Kenta Takahashi,
Masayuki Yoshikaw:
A DoS-Vulnerability Analysis of L2TP-VPN.
CIT 2004: 397-402 |
4 | EE | Atsushi Kara:
Private-to-Private Communications over the Internet.
IEEE Computer 37(5): 53-59 (2004) |
2003 |
3 | | Yaser Mohamed,
Atsushi Kara:
Secret Keys Multiplication for Scalable Group Re-Keying.
CITA 2003: 247-251 |
2001 |
2 | EE | Atsushi Kara:
Protecting Privacy in Remote-Patient Monitoring.
IEEE Computer 34(5): 24-27 (2001) |
1987 |
1 | | Martin Hofmann,
Anne Usha,
Souri Das,
Kazuhiko Kawamura,
Atsushi Kara,
Ravi Rastogi:
Module: A Modular Programming Environment in Prolog.
ISMIS 1987: 73-80 |