Tetsutaro Uehara
TitleCited byYear
Successive Change in Conformation Caused by p-Y Groups in 1-(MeSe)-8-(p-YC6H4Se)C10H6:  Role of Linear Se···Se−C Three-Center−Four-Electron …
W Nakanishi, S Hayashi, T Uehara
The Journal of Physical Chemistry A 103 (48), 9906-9912, 1999
Fog computing: Issues and challenges in security and forensics
Y Wang, T Uehara, R Sasaki
2015 IEEE 39th Annual Computer Software and Applications Conference 3, 53-59, 2015
Structure of 1‐(Arylselanyl)naphthalenes − Y Dependence in 1‐(p‐YC6H4Se)C10H7
W Nakanishi, S Hayashi, T Uehara
European Journal of Organic Chemistry 2001 (20), 3933-3943, 2001
Privacy preserving confidential forensic investigation for shared or remote servers
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Seventh International Conference on Intelligent Information Hiding and …, 2011
Privacy preserving multiple keyword search for confidential investigation of remote forensics
S Hou, T Uehara, SM Yiu, LCK Hui, KP Chow
2011 Third International Conference on Multimedia Information Networking and …, 2011
A web-based privacy-secure content trading system for small content providers using semi-blind digital watermarking
M Okada, Y Okabe, T Uehara
2010 7th IEEE Consumer Communications and Networking Conference, 1-2, 2010
Security analysis on privacy-secure image trading framework using blind watermarking
M Okada, Y Okabe, T Uehara
2009 Ninth Annual International Symposium on Applications and the Internet …, 2009
Benchmarking vector indirect load/store instructions
T Uehara
Supercomputer 46, 15-29, 1991
A privacy-preserving approach for collecting evidence in forensic investigation
S Hou, SM Yiu, T Uehara, R Sasaki
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2 (1 …, 2013
Development of a multiple user quiz system on a shared display
M Saga, K Ikeda, M Mori, T Uehara, H Kita, Y Naya, N Nagata, H Ueda, ...
2009 Seventh International Conference on Creating, Connecting and …, 2009
Verifying data authenticity and integrity in server-aided confidential forensic investigation
S Hou, R Sasaki, T Uehara, S Yiu
Information and Communication Technology-EurAsia Conference, 312-317, 2013
Integrating fingerprint with cryptosystem for internet‐based live pay‐TV system
S Hou, T Uehara, T Satoh, Y Morimura, M Minoh
Security and Communication Networks 1 (6), 461-472, 2008
On socialization of personal computing
G Hagiwara, K Ikeda, M Mori, T Uehara, KH Kita
Fifth International Conference on Creating, Connecting and Collaborating …, 2007
Fingerprinting codes for Internet-based live pay-TV system using balanced incomplete block designs
S Hou, T Uehara, T Satoh, Y Morimura, M Minoh
IEICE transactions on information and systems 92 (5), 876-887, 2009
コンパイラによる制御が可能な DSM システム Fagus の実現
横手聡, 齋藤彰一, 上原哲太郎, 國枝義敏
情報処理学会研究報告システムソフトウェアとオペレーティング・システム (OS) 2000 (75 …, 2000
Resource allocation optimization for GSD projects
S Doma, L Gottschalk, T Uehara, J Liu
International Conference on Computational Science and Its Applications, 13-28, 2009
Improving computer ethics video clips for higher education
I Fuse, S Okabe, T Yamanoue, A Nakamura, M Nakanishi, S Fukada, ...
Proceedings of the 36th annual ACM SIGUCCS fall conference: moving mountains …, 2008
Socialized computers and collaborative learning
M Mori, K Ikeda, G Hagiwara, M Saga, T Uehara, H Kita
Annual Conference of the Japanese Society for Artificial Intelligence, 48-61, 2008
Secure streaming forensic data transmission for trusted cloud
A Liu, J Liu, T Uehara
Proceedings of the 2nd international workshop on Security and forensics in …, 2014
Semi-blind fingerprinting utilizing ordinary existing watermarking techniques
M Okada, Y Okabe, T Uehara
International Workshop on Digital Watermarking, 14-28, 2009
The system can't perform the operation now. Try again later.
Articles 1–20