• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1991 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2003

    Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

    David, M. W. & Sakurai, K., 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response

    Iwanaga, M., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 214-219 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

    Fukushima, K., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 108-113 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Mobile agent based security monitoring and analysis for the electric power infrastructure

    David, M. W. & Sakurai, K., 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 159-164 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the security of SELinux with a simplified policy

    Sueyasu, K., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 79-84 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2004

    A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model

    Imamoto, K. & Sakurai, K., Jul 6 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 327-332 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • A merging method of certification authorities without using cross-certifications

    Koga, S. & Sakurai, K., Jul 7 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 174-177 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Protecting the electric power infrastructure with a mobile agent monitoring and analysis system

    David, M. W. & Sakurai, K., 2004, Proceedings - 2004 Iternational Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004. p. 497-498 2 p. (Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2005

    A framework for protecting private information through user-trusted-program and its realizability

    Takahashi, K., Sakurai, K. & Amamiya, M., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 433-442 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An evenhanded certified email system for contract signing

    Imamoto, K., Zhou, J. & Sakurai, K., Dec 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Generic, optimistic, and efficient schemes for fair certified email delivery

    Wang, G., Bao, F., Imamoto, K. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 40-52 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Grouping proof for RFID tags

    Saito, J. & Sakurai, K., Dec 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. p. 621-624 4 p. 1423764. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    147 Citations (Scopus)
  • Group key distribution scheme for reducing required rekey message size

    Nishi, R. & Sakurai, K., Sep 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). p. 280-284 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Program obfuscation scheme using random numbers to complicate control flow

    Toyofuku, T., Tabata, T. & Sakurai, K., Dec 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 916-925 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Query forwarding algorithm supporting initiator anonymity in GNUnet

    Tatara, K., Hori, Y. & Sakurai, K., Sep 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). Vol. 2. p. 235-239 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Reassignment scheme of an RFID tag's key for owner transfer

    Saito, J., Imamoto, K. & Sakurai, K., Dec 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 1303-1312 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    46 Citations (Scopus)
  • Simple power analysis on fast modular reduction with NIST recommended elliptic curves

    Sakai, Y. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 169-180 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Some remarks on security of receipt-free E-auction

    Her, Y. S., Imamoto, K. & Sakurai, K., 2005, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. p. 560-563 4 p. 1489023. (Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005; vol. II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Trends and issues for security of home-network based on power line communication

    Nishi, R., Morioka, H. & Sakurai, K., Dec 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. Vol. 2. p. 655-660 6 p. 1423770

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2006

    Actively modifying control flow of program for efficient anormaly detection

    Tatara, K., Tabata, T. & Sakurai, K., Jan 1 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 737-744 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4252 LNAI - II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A framework for the user-oriented personal information protection

    Takahashi, K. & Sakurai, K., Dec 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An intrusion detection system using alteration of data

    Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., Nov 22 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 243-248 6 p. 1620199. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • An RFID system based MCLT system with improved privacy

    Kwak, J., Rhee, K., Park, N., Kim, H., Kim, S., Sakurai, K. & Won, D., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 579-590 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Application and evaluation of Bayesian filter for Chinese spam

    Zhan, W., Hori, Y. & Sakurai, K., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, Vol. 4318 LNCS. p. 253-263 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A proactive secret sharing for server assisted threshold signatures

    Yang, J. P., Rhee, K. H. & Sakurai, K., Jan 1 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 250-259 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • A proposal of one-time biometric authentication

    Ueshige, Y. & Sakurai, K., Dec 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Ciphertext-auditable public key encryption

    Hada, S. & Sakurai, K., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 308-321 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Design and implementation of an extended reference monitor for trusted operating systems

    Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. Springer Verlag, p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Distributing security-mediated PKI revisited

    Yang, J. P., Sakurai, K. & Rhee, K. H., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., Jan 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Enhanced privacy in key-exchange protocols by one-time ID

    Imamoto, K. & Sakurai, K., Dec 1 2006, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. p. 63-68 6 p. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Grid based network address space browsing for network traffic visualization

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., Jan 1 2006, Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, p. 261-267 7 p. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Interactively combining 2D and 3D visualization for network traffic monitoring

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 123-127 5 p. 1179600. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • One-round protocol for two-party verifier-based password-authenticated key exchange

    Kwon, J. O., Sakurai, K. & Lee, D. H., Jan 1 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Citations (Scopus)
  • On studying P2P topology construction based on virtual regions and its effect on search performance

    Wang, Y., Wang, W., Sakurai, K. & Hori, Y., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1008-1018 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

    Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems. 11. (ACM International Conference Proceeding Series; vol. 270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

    Hori, Y. & Sakurai, K., Dec 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06. 1292344. (Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06; vol. 270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2007

    An adaptive spreading activation approach to combating the front-peer attack in trust and reputation system

    Wang, Y., Hori, Y. & Sakurai, K., 2007, Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings. Springer Verlag, p. 249-258 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4610 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Analysis of privacy disclosure in DNS query

    Zhao, F., Hori, Y. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 952-957 6 p. 4197398. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • An approach of program analysis prevention for information protection

    Takahashi, K., Liu, Z. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 35-40 6 p. 4197246. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An approach of trusted program generation for user-responsible privacy

    Takahashi, K., Liu, Z., Sakurai, K. & Amamiya, M., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 1159-1170 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., Aug 24 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An intrusion detection system which can restore altered data

    Nagano, F., Tatara, K., Tabata, T. & Sakurai, K., 2007, Fourth International Conference on Information Technology and Applications, ICITA 2007. p. 29-34 6 p. (Fourth International Conference on Information Technology and Applications, ICITA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A note on the (Im)possibility of using obfuscators to transform private-key encryption into public-key encryption

    Hada, S. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • A policy language for the extended reference monitor in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., Aug 29 2007, Proceedings - The Second International Conference on Availability, Reliability and Security, ARES 2007. p. 1160-1166 7 p. 4159922. (Proceedings - Second International Conference on Availability, Reliability and Security, ARES 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A practical proxy device for protecting RFID tag's identifier

    Yeo, S. S., Sakurai, K. & Kwak, J., 2007, Proceedings - 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, BLISS 2007. p. 55-58 4 p. 4290939

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A proposal of efficient scheme of key management using ID-based encryption and biometrics

    Izumi, A., Ueshige, Y. & Sakurai, K., Dec 31 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 29-34 6 p. 4197245. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Bot detection based on traffic analysis

    Kugisaki, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2007, Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007. p. 303-306 4 p. 4438445. (Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • Economic-inspired truthful reputation feedback mechanism in P2P networks

    Wang, Y., Hori, Y. & Sakurai, K., Aug 2 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 80-85 6 p. 4144617. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Enforcement of integrated security policy in trusted operating systems

    Kim, H. C., Ramakrishna, R. S., Shin, W. & Sakurai, K., 2007, Advances in Information and Computer Security - Second International Workshop on Security, IWSEC 2007, Proceedings. Springer Verlag, p. 214-229 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4752 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)