2008 |
5 | EE | Yo Mashimo,
Shintaro Ueda,
Yasutaka Shinzaki,
Hiroshi Shigeno:
Examination of Forwarding Obstruction Attacks in Structured Overlay Networks.
ARES 2008: 1340-1345 |
2006 |
4 | EE | Shintaro Ueda,
Shin-ichiro Kaneko,
Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
Authenticating Video Streams.
AINA (1) 2006: 863-868 |
3 | EE | Nobutaka Kawaguchi,
Yusuke Azuma,
Shintaro Ueda,
Hiroshi Shigeno,
Ken-ichi Okada:
ACTM: Anomaly Connection Tree Method to detect Silent Worms.
AINA (1) 2006: 901-908 |
2005 |
2 | EE | Nobutaka Kawaguchi,
Shintaro Ueda,
Naohiro Obata,
Hiroshi Shigeno,
Ken-ichi Okada:
An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication.
AINA 2005: 253-256 |
2004 |
1 | EE | Shintaro Ueda,
Nobutaka Kawaguchi,
Hiroshi Shigeno,
Ken-ichi Okada:
Stream Authentication Scheme for the use over the IP Telephony.
AINA (2) 2004: 164-169 |