| 発行日 | タイトル | 
著者 | 
| 16-Apr-2010  | Scale free properties of random k-trees | Cooper, Colin; Uehara, Ryuhei | 
| 1-Sep-2013  | Scan Matching Online Cell Decomposition for Coverage Path Planning in an Unknown Environment | Dugarjav, Batsaikhan; Lee, Soon-Geul; Kim, Donghan; Kim, Jong Hyeong; Chong, Nak Young | 
| Aug-2002  | A Second-price Sealed-bid Auction with Public Verifiability | Omote, Kazumasa; Miyaji, Atsuko | 
| 2003  | A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th Root | Omote, Kazumasa; Miyaji, Atsuko | 
| 2012  | A Secure and private RFID authentication protocol under SLPN problem | Mamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S. | 
| Aug-2006  | Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA | MAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki | 
| Mar-2015  | Secure sets and defensive alliances in graphs: A faster algorithm and improved bounds | Amano, Kazuyuki; Oo, Kyaw May; Otachi, Yota; Uehara, Ryuhei | 
| Sep-2007  | The security of RC6 against asymmetric Chi-square test attack | Hinoue, Tomohiko; Miyaji, Atsuko; Wada, Takatomi | 
| 2009  | A Selectable k-Times Relaxed Anonymous Authentication Scheme | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa | 
| 8-Apr-2015  | Self-healing wireless sensor networks | Miyaji, Atsuko; Omote, Kazumasa | 
| 1-Aug-2004  | Self-Reconfigurable Multi-Layer Neural Networks with Genetic Algorithms | SUGAWARA, Eiko; FUKUSHI, Masaru; HORIGUCHI, Susumu | 
| 19-Sep-2009  | Self-stabilizing Human-Like Motion Control Framework for Humanoids Using Neural Oscillators | Yang, Woosung; Chong, Nak Young; Ra, Syungkwon; Bae, Ji-Hun; You, Bum Jae | 
| 30-Aug-2018  | A Self-trainable Depth Perception Method from Eye Pursuit and Motion Parallax | Prucksakorn, Tanapol; Jeong, Sungmoon; Chong, Nak Young | 
| 11-Jan-2024  | Semantic-Forward Relaying: A Novel Framework Towards 6G Cooperative Communications | Lin, Wensheng; Yan, Yuna; Li, Lixin; Han, Zhu; Matsumoto, Tad | 
| 11-Jun-2024  | SemantIC: Semantic Interference Cancellation Towards 6G Wireless Communications | Lin, Wensheng; Yan, Yuna; Li, Lixin; Han, Zhu; Matsumoto, Tad | 
| Dec-2004  | Semi-passive replication and Lazy Consensus | Defago, Xavier; Schiper, Andre | 
| 1-Jan-2011  | Sequential Bitwise Sanitizable Signature Schemes | HANAOKA, Goichiro; HIROSE, Shoichi; MIYAJI, Atsuko; MIYAZAKI, Kunihiko; SANTOSO, Bagus; YANG, Peng | 
| Jan-2019  | Sequentially Swapping Colored Tokens on Graphs | Yamanaka, Katsuhisa; Demaine, Erik D.; Horiyama, Takashi; Kawamura, Akitoshi; Nakano, Shin-ichi; Okamoto, Yoshio; Saitoh, Toshiki; Suzuki, Akira; Uehara, Ryuhei; Uno, Takeaki | 
| 15-Oct-2002  | Shattering a set of objects in 2D | Nandy, Subhas C.; Asano, Tetsuo; Harayama, Tomohiro | 
| 16-Jul-2025  | Shortcut-enhanced Multimodal Backdoor Attack in Vision-guided Robot Grasping | Li, Chenghao; Gao, Ziyan; Chong, Nak Young | 
| 29-Mar-2016  | Shortest Reconfiguration of Sliding Tokens on a Caterpillar | Yamada, Takeshi; Uehara, Ryuhei  |