BibTeX records: Takuji Tsuda

download as .bib file

@article{DBLP:journals/access/TsudaKHN16,
  author       = {Takuji Tsuda and
                  Yuka Komai and
                  Takahiro Hara and
                  Shojiro Nishio},
  title        = {Top-k Query Processing and Malicious Node Identification Based on
                  Node Grouping in MANETs},
  journal      = {{IEEE} Access},
  volume       = {4},
  pages        = {993--1007},
  year         = {2016},
  url          = {https://doi.org/10.1109/ACCESS.2016.2541864},
  doi          = {10.1109/ACCESS.2016.2541864},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TsudaKHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/TsudaKHN15,
  author       = {Takuji Tsuda and
                  Yuka Komai and
                  Takahiro Hara and
                  Shojiro Nishio},
  title        = {Signature-Based Top-k Query Processing against Data Replacement Attacks
                  in MANETs},
  booktitle    = {34th {IEEE} Symposium on Reliable Distributed Systems, {SRDS} 2015,
                  Montreal, QC, Canada, September 28 - October 1, 2015},
  pages        = {130--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SRDS.2015.34},
  doi          = {10.1109/SRDS.2015.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/TsudaKHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/TsudaKSHN14,
  author       = {Takuji Tsuda and
                  Yuka Komai and
                  Yuya Sasaki and
                  Takahiro Hara and
                  Shojiro Nishio},
  editor       = {Arkady B. Zaslavsky and
                  Panos K. Chrysanthis and
                  Christian Becker and
                  Jadwiga Indulska and
                  Mohamed F. Mokbel and
                  Daniela Nicklas and
                  Chi{-}Yin Chow},
  title        = {Top-k Query Processing and Malicious Node Identification against Data
                  Replacement Attack in MANETs},
  booktitle    = {{IEEE} 15th International Conference on Mobile Data Management, {MDM}
                  2014, Brisbane, Australia, July 14-18, 2014 - Volume 1},
  pages        = {279--288},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MDM.2014.40},
  doi          = {10.1109/MDM.2014.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/TsudaKSHN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics