Yuji Sugiyama

According to our database1, Yuji Sugiyama authored at least 24 papers between 1979 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Experimental Analysis of Chatter Vibration in End-Milling Using Laser Doppler Vibrometers.
Int. J. Autom. Technol., 2008

2005
An Efficient On-Line Electronic Cash with Unlinkable Exact Payments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

A Group Signature Scheme with Efficient Membership Revocation for Middle-Scale Groups.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
An Efficient Online Electronic Cash with Unlinkable Exact Payments.
Proceedings of the Information Security, 7th International Conference, 2004

A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
An Efficient Anonymous Survey for Attribute Statistics Using a Group Signature Scheme with Attribute Tracing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Sealed-Bid Auctions with Efficient Bids.
Proceedings of the Information Security and Cryptology, 2003

2002
An Efficiency Improvement on an Unlinkable Divisible Electronic Cash System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Group Signature Scheme Committing the Group.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
A fast method for timing verification that uses the conditions that cause changes in the output values of gates.
Syst. Comput. Jpn., 2001

Anonymous Statistical Survey of Attributes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Unlinkable Divisible Electronic Cash.
Proceedings of the Information Security, Third International Workshop, 2000

1999
Unlinkable Electronic Coupon Protocol with Anonymity Control.
Proceedings of the Information Security, Second International Workshop, 1999

1996
A method of shortening metastable operation duration time by the use of feedback.
Syst. Comput. Jpn., 1996

Timing verification of asynchronous sequential circuits with specifications - A method of reducing state transitions to be verified in detail.
Syst. Comput. Jpn., 1996

1995
The Number of Elements in Minimum Test Set for Locally Exhaustive Testing of Combinational Circuits with Five Outputs.
IEICE Trans. Inf. Syst., 1995

1992
ASL program written in abstract sequential machine style and its compiler.
Syst. Comput. Jpn., 1992

1989
Quantifying a design process based on experiments.
J. Syst. Softw., 1989

1988
An attribute grammar with common attributes and its evaluator in prolog.
Syst. Comput. Jpn., 1988

1987
Principles of algebraic language ASL.
Syst. Comput. Jpn., 1987

Logical Programming for the Telegram Analysis Problem.
Comput. Lang., 1987

1984
An Algebraic Specification of HDLC Procedures and Its Verification.
IEEE Trans. Software Eng., 1984

Functional Programming and Logical Programming for the Telegram Analysis Problem.
Proceedings of the Proceedings, 1984

1979
On equivalence of safe Petri nets.
Proceedings of the Fundamentals of Computation Theory, 1979


  Loading...