Old Web
English
Sign In
Acemap
>
authorDetail
>
tada yuki tori saki
tada yuki tori saki
Computer science
Data mining
Computer security
Information transfer
Confidentiality
5
Papers
0
Citations
0
KQI
Citation Trend
Filter By
Interval:
1900~2024
1900
2024
Author
Papers (5)
Sort By
Default
Most Recent
Most Early
Most Citation
No data
Journal
Conference
Others
Falsification detection data generation method, and a falsification detection method and apparatus
2005
sinzi inoue
tomoya satou
kentarou siomi
yuusuke konpon
kazuya simizu
mutumi fuziwara
yizaitengcun
makoto oti
tada yuki tori saki
Show All
Source
Cite
Save
Citations (0)
The key information generation method and apparatus, the key information updating method, falsification detection method and apparatus, the data key information structure
2005
sinzi inoue
tomoya satou
kentarou siomi
yuusuke konpon
kazuya simizu
mutumi fuziwara
yizaitengcun
makoto oti
tada yuki tori saki
Show All
Source
Cite
Save
Citations (0)
Dma controller and a data transfer control method
2005
yuusuke konpon
mutumi fuziwara
tada yuki tori saki
Show All
Source
Cite
Save
Citations (0)
Communication card, the confidential information processing system, secret information transfer method and program
2005
tomoya satou
kentarou siomi
yuusuke konpon
kazuya simizu
mutumi fuziwara
tada yuki tori saki
Show All
Source
Cite
Save
Citations (0)
分散 OS Colonia における並列アクティビティの高速移送
2000
mine gi masuda
tada yuki tori saki
masahiro gotou
sin'itirou mori
sinzi tomita
Show All
Source
Cite
Save
Citations (0)
1