Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Hirosuke Yamamoto
Coding Theorems for a $(2,2)$-Threshold Scheme With Detectability of Impersonation Attacks
IEEE Transactions on Information Theory
Computer Science Applications
Information Systems
Library
Information Sciences
Related publications
Server Impersonation Attacks on RFID Protocols
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Convergence Theorems of a Scheme With Errors for I-Asymptotically Quasi-Nonexpansive Mappings
Journal of Nonlinear Science and Applications
Number Theory
Analysis
Algebra
A Reversible Coding Scheme of Map Data for Car Navigation Using Chain Coding.
The Journal of the Institute of Television Engineers of Japan
An Efficient MAC-based Scheme Against Pollution Attacks in XOR Network Coding-Enabled WBANs for Remote Patient Monitoring Systems
Eurasip Journal on Wireless Communications and Networking
Computer Networks
Computer Science Applications
Signal Processing
Communications
A Bandwidth Efficient Turbo Coding Scheme for VDSL Systems
Circuits, Systems, and Signal Processing
Applied Mathematics
Signal Processing
A Multivariate Based Threshold Ring Signature Scheme
Applicable Algebra in Engineering, Communications and Computing
Applied Mathematics
Number Theory
Algebra
A Low-Complexity Multicarrier Scheme With LDPC Coding for Mobile-To-Mobile Environment
A Distributed Opportunistic Scheduling Scheme for Wireless Network Coding