Search results for: Yoshiaki Hori
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Authorization and Access Control > 80-89
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Ad-Hoc and Intelligent Networks > 382-391
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Track 8: Services, Models, Personal/Social Factors > 1008-1018
Lecture Notes in Computer Science > Theory and Applications of Models of Computation > Contributed Papers > 362-373
Lecture Notes in Computer Science > Information Security and Cryptology > Computer and Applications Security > 253-263
Lecture Notes in Computer Science > Advances in Web and Network Technologies, and Information Management > Sensor, P2P, and Grid Networks 2 > 211-216
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Authorization and Access Control > 51-59
Communications in Computer and Information Science > Advances in Information Security and Its Application > Other Security Research > 105-110
Communications in Computer and Information Science > Advances in Information Security and Its Application > Other Security Research > 111-118
Signal Processing: Image Communication > 2014 > 29 > 10 > 1197-1210