Tetsutaro Uehara
Tetsutaro Uehara
確認したメール アドレス: cysec.cs.ritsumei.ac.jp - ホームページ
Successive Change in Conformation Caused by p-Y Groups in 1-(MeSe)-8-(p-YC6H4Se)C10H6:  Role of Linear Se···Se−C Three-Center−Four-Electron …
W Nakanishi, S Hayashi, T Uehara
The Journal of Physical Chemistry A 103 (48), 9906-9912, 1999
Fog computing: Issues and challenges in security and forensics
Y Wang, T Uehara, R Sasaki
2015 IEEE 39th Annual Computer Software and Applications Conference 3, 53-59, 2015
Structure of 1‐(Arylselanyl)naphthalenes − Y Dependence in 1‐(p‐YC6H4Se)C10H7
W Nakanishi, S Hayashi, T Uehara
European Journal of Organic Chemistry 2001 (20), 3933-3943, 2001
Privacy preserving confidential forensic investigation for shared or remote servers
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Seventh International Conference on Intelligent Information Hiding and …, 2011
Privacy preserving multiple keyword search for confidential investigation of remote forensics
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Third International Conference on Multimedia Information Networking and …, 2011
A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking
M Okada, Y Okabe, T Uehara
2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010
Security analysis on privacy-secure image trading framework using blind watermarking
M Okada, Y Okabe, T Uehara
2009 Ninth Annual International Symposium on Applications and the Internet …, 2009
A privacy-preserving approach for collecting evidence in forensic investigation
S Hou, SM Yiu, T Uehara, R Sasaki
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013
Benchmarking vector indirect load/store instructions
T Uehara
Supercomputer 46, 15-29, 1991
Development of a multiple user quiz system on a shared display
M Saga, K Ikeda, M Mori, T Uehara, H Kita, Y Naya, N Nagata, H Ueda, ...
2009 Seventh International Conference on Creating, Connecting and …, 2009
Verifying data authenticity and integrity in server-aided confidential forensic investigation
S Hou, R Sasaki, T Uehara, S Yiu
Information and Communication Technology-EurAsia Conference, 312-317, 2013
Integrating fingerprint with cryptosystem for internet‐based live pay‐TV system
S Hou, T Uehara, T Satoh, Y Morimura, M Minoh
Security and Communication Networks 1 (6), 461-472, 2008
Fingerprinting codes for Internet-based live pay-TV system using balanced incomplete block designs
S Hou, T Uehara, T Satoh, Y Morimura, M Minoh
IEICE transactions on information and systems 92 (5), 876-887, 2009
On socialization of personal computing
G Hagiwara, K Ikeda, M Mori, T Uehara, KH Kita
Fifth International Conference on Creating, Connecting and Collaborating …, 2007
コンパイラによる制御が可能な DSM システム Fagus の実現
横手聡, 齋藤彰一, 上原哲太郎, 國枝義敏
情報処理学会研究報告システムソフトウェアとオペレーティング・システム (OS) 2000 (75 …, 2000
Resource allocation optimization for GSD projects
S Doma, L Gottschalk, T Uehara, J Liu
International Conference on Computational Science and Its Applications, 13-28, 2009
Improving computer ethics video clips for higher education
I Fuse, S Okabe, T Yamanoue, A Nakamura, M Nakanishi, S Fukada, ...
Proceedings of the 36th annual ACM SIGUCCS fall conference: moving mountains …, 2008
Secure streaming forensic data transmission for trusted cloud
A Liu, J Liu, T Uehara
Proceedings of the 2nd international workshop on Security and forensics in …, 2014
Semi-blind fingerprinting utilizing ordinary existing watermarking techniques
M Okada, Y Okabe, T Uehara
International Workshop on Digital Watermarking, 14-28, 2009
Socialized computers and collaborative learning
M Mori, K Ikeda, G Hagiwara, M Saga, T Uehara, H Kita
Annual Conference of the Japanese Society for Artificial Intelligence, 48-61, 2008
論文 1–20