default search action
Masahito Hayashi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j81]Masahito Hayashi, Ángeles Vázquez-Castro:
Covert Communication With Gaussian Noise: From Random Access Channel to Point-to-Point Channel. IEEE Trans. Commun. 72(3): 1516-1531 (2024) - [j80]Masahito Hayashi, Vincent Y. F. Tan:
Corrections to "Equivocations, Exponents, and Second-Order Coding Rates Under Various Rényi Information Measures". IEEE Trans. Inf. Theory 70(4): 3046-3048 (2024) - [j79]Masahito Hayashi, Yanling Chen:
Non-Adaptive Coding for Two-Way Wiretap Channel With or Without Cost Constraints. IEEE Trans. Inf. Theory 70(7): 4611-4633 (2024) - [j78]Masahito Hayashi, Takeshi Koshiba:
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage. IEEE/ACM Trans. Netw. 32(1): 253-267 (2024) - [i104]Masahito Hayashi:
Reverse em-problem based on Bregman divergence and its application to classical and quantum information theory. CoRR abs/2403.09252 (2024) - [i103]Farzin Salek, Patrick Hayden, Masahito Hayashi:
Three-Receiver Quantum Broadcast Channels: Classical Communication with Quantum Non-unique Decoding. CoRR abs/2406.09854 (2024) - [i102]Yanling Chen, Masahito Hayashi:
Adaptive Coding for Two-Way Wiretap Channel under Strong Secrecy. CoRR abs/2406.16662 (2024) - [i101]Masahito Hayashi:
Bregman-divergence-based Arimoto-Blahut algorithm. CoRR abs/2408.05454 (2024) - [i100]Ayanava Dasgupta, Naqueeb Ahmad Warsi, Masahito Hayashi:
Universal tester for multiple independence testing and classical-quantum arbitrarily varying multiple access channel. CoRR abs/2409.05619 (2024) - [i99]Masahito Hayashi, Hao-Chung Cheng, Li Gao:
Resolvability of classical-quantum channels. CoRR abs/2410.16704 (2024) - 2023
- [j77]Masahito Hayashi, Yuxiang Yang:
Efficient algorithms for quantum information bottleneck. Quantum 7: 936 (2023) - [j76]Masahito Hayashi, Yingkai Ouyang:
Tight Cramér-Rao type bounds for multiparameter quantum metrology through conic programming. Quantum 7: 1094 (2023) - [j75]Masahito Hayashi:
Analytical Algorithm for Capacities of Classical and Classical-Quantum Channels. IEEE Trans. Inf. Theory 69(3): 1381-1393 (2023) - [j74]Ke Li, Yongsheng Yao, Masahito Hayashi:
Tight Exponential Analysis for Smoothing the Max-Relative Entropy and for Quantum Privacy Amplification. IEEE Trans. Inf. Theory 69(3): 1680-1694 (2023) - [j73]Masahito Hayashi:
Bregman Divergence Based Em Algorithm and its Application to Classical and Quantum Rate Distortion Theory. IEEE Trans. Inf. Theory 69(6): 3460-3492 (2023) - [j72]Masahito Hayashi, Naqueeb Ahmad Warsi:
Commitment Capacity of Classical-Quantum Channels. IEEE Trans. Inf. Theory 69(8): 5083-5099 (2023) - [j71]Masahito Hayashi, Seunghoan Song:
Unified Approach to Secret Sharing and Symmetric Private Information Retrieval With Colluding Servers in Quantum Systems. IEEE Trans. Inf. Theory 69(10): 6537-6563 (2023) - [j70]Masahito Hayashi:
Comments on "Analytical Algorithm for Capacities of Classical and Classical-Quantum Channels". IEEE Trans. Inf. Theory 69(11): 7478 (2023) - [i98]Masahito Hayashi:
Minimization on mixture family. CoRR abs/2302.06905 (2023) - [i97]Masahito Hayashi, Yanling Chen:
Non-Adaptive Coding for Two-Way Wiretap Channel with or without Cost Constraints. CoRR abs/2310.13881 (2023) - [i96]Masahito Hayashi, Ángeles Vázquez-Castro:
Covert communication with Gaussian noise: from random access channel to point-to-point channel. CoRR abs/2310.15519 (2023) - [i95]Masahito Hayashi:
Secure network coding with adaptive and active attack. CoRR abs/2311.10297 (2023) - 2022
- [j69]Masahito Hayashi:
Quantum-Inspired Secure Wireless Communication Protocol Under Spatial and Local Gaussian Noise Assumptions. IEEE Access 10: 29040-29068 (2022) - [j68]Masahito Hayashi:
Secure Physical Layer Network Coding versus Secure Network Coding. Entropy 24(1): 47 (2022) - [j67]Matteo Allaix, Seunghoan Song, Lukas Holzbaur, Tefjol Pllaha, Masahito Hayashi, Camilla Hollanti:
On the Capacity of Quantum Private Information Retrieval From MDS-Coded and Colluding Servers. IEEE J. Sel. Areas Commun. 40(3): 885-898 (2022) - [j66]Seunghoan Song, Masahito Hayashi:
Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval With General Access Structure. IEEE J. Sel. Areas Commun. 40(3): 999-1012 (2022) - [j65]Masahito Hayashi, Takeshi Koshiba:
Quantum verifiable protocol for secure modulo zero-sum randomness. Quantum Inf. Process. 21(8): 291 (2022) - [j64]Masahito Hayashi, Ning Cai:
Universal Classical-Quantum Superposition Coding and Universal Classical-Quantum Multiple Access Channel Coding. IEEE Trans. Inf. Theory 68(3): 1822-1850 (2022) - [j63]Masahito Hayashi:
Secure List Decoding and its Application to Bit-String Commitment. IEEE Trans. Inf. Theory 68(6): 3620-3642 (2022) - [c71]Masahito Hayashi:
Analytical calculation formulas for capacities of classical and classical-quantum channels. ISIT 2022: 91-96 - [c70]Masahito Hayashi, Naqueeb Ahmad Warsi:
Commitment capacity of classical-quantum channels. ISIT 2022: 1058-1063 - [c69]Ke Li, Yongsheng Yao, Masahito Hayashi:
Exponents in smoothing the max-relative entropy and of randomness extraction against quantum side information. ISIT 2022: 1862-1867 - [i94]Masahito Hayashi:
Bregman divergence based em algorithm and its application to classical and quantum rate distortion theory. CoRR abs/2201.02447 (2022) - [i93]Masahito Hayashi:
Analytical calculation formulas for capacities of classical and classical-quantum channels. CoRR abs/2201.02450 (2022) - [i92]Masahito Hayashi, Naqueeb Ahmad Warsi:
Commitment capacity of classical-quantum channels. CoRR abs/2201.06333 (2022) - [i91]Masahito Hayashi, Seunghoan Song:
Unified Approach to Secret Sharing and Symmetric Private Information Retrieval with Colluding Servers in Quantum Systems. CoRR abs/2205.14622 (2022) - [i90]Masahito Hayashi:
Oblivious Quantum Computation and Delegated Multiparty Quantum Computation. CoRR abs/2211.00962 (2022) - [i89]Masahito Hayashi, Seunghoan Song:
Two-Server Oblivious Transfer for Quantum Messages. CoRR abs/2211.03308 (2022) - 2021
- [j62]Masahito Hayashi, Tadashi Wadayama, Ángeles Vázquez-Castro:
Secure Computation-and-Forward With Linear Codes. IEEE J. Sel. Areas Inf. Theory 2(1): 139-148 (2021) - [j61]Masahito Hayashi, Ning Cai:
Secure Non-Linear Network Code Over a One-Hop Relay Network. IEEE J. Sel. Areas Inf. Theory 2(1): 296-305 (2021) - [j60]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Symmetric Private Information Retrieval With Collusion of All But One of Servers. IEEE J. Sel. Areas Inf. Theory 2(1): 380-390 (2021) - [j59]Masahito Hayashi, Ning Cai:
Asymptotically Secure Network Code for Active Attacks. IEEE Trans. Commun. 69(5): 3245-3259 (2021) - [j58]Masahito Hayashi, Ángeles Vázquez-Castro:
Physical Layer Computation as NOMA for Integrated Wireless Systems. IEEE Trans. Commun. 69(7): 4520-4535 (2021) - [j57]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval With Multiple Servers. IEEE Trans. Inf. Theory 67(1): 452-463 (2021) - [j56]Kun Wang, Masahito Hayashi:
Permutation Enhances Classical Communication Assisted by Entangled States. IEEE Trans. Inf. Theory 67(6): 3905-3925 (2021) - [j55]Masahito Hayashi, Kun Fang, Kun Wang:
Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction. IEEE Trans. Inf. Theory 67(6): 3926-3944 (2021) - [j54]Go Kato, Masaki Owari, Masahito Hayashi:
Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network With Free One-Way Public Communication. IEEE Trans. Inf. Theory 67(7): 4564-4587 (2021) - [j53]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval With Colluding Servers. IEEE Trans. Inf. Theory 67(8): 5491-5508 (2021) - [c68]Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi:
Refined Density Evolution Analysis of LDPC Codes for Successive Interference Cancellation. GLOBECOM 2021: 1-6 - [c67]Masahito Hayashi, Ning Cai:
Universal classical-quantum multiple access channel coding. ISIT 2021: 402-407 - [c66]Seunghoan Song, Masahito Hayashi:
Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval with General Access Structure. ISIT 2021: 982-987 - [c65]Seunghoan Song, Masahito Hayashi:
Quantum Private Information Retrieval for Quantum Messages. ISIT 2021: 1052-1057 - [c64]Farzin Salek, Masahito Hayashi, Andreas J. Winter:
Asymptotic Separation Between Adaptive and Non-adaptive Strategies in Quantum Channel Discrimination. ISIT 2021: 1194-1199 - [c63]Masahito Hayashi, Kun Fang, Kun Wang:
Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction. ISIT 2021: 1326-1331 - [c62]Masahito Hayashi:
Secure Modulo Sum via Multiple Access Channel. ISIT 2021: 1397-1402 - [i88]Seunghoan Song, Masahito Hayashi:
Quantum Private Information Retrieval for Quantum Messages. CoRR abs/2101.09041 (2021) - [i87]Seunghoan Song, Masahito Hayashi:
Equivalence of Non-Perfect Secret Sharing and Symmetric Private Information Retrieval with General Access Structure. CoRR abs/2101.11194 (2021) - [i86]Masahito Hayashi:
Secure list decoding and its application to bit-string commitment. CoRR abs/2103.11548 (2021) - [i85]Masahito Hayashi, Ángeles Vázquez-Castro:
Computation-aided classical-quantum multiple access to boost network communication speeds. CoRR abs/2105.14505 (2021) - [i84]Matteo Allaix, Seunghoan Song, Lukas Holzbaur, Tefjol Pllaha, Masahito Hayashi, Camilla Hollanti:
On the Capacity of Quantum Private Information Retrieval from MDS-Coded and Colluding Servers. CoRR abs/2106.14719 (2021) - [i83]Jiawei Wu, Gui-Lu Long, Masahito Hayashi:
Quantum secure direct communication with private dense coding using general preshared quantum state. CoRR abs/2112.15113 (2021) - 2020
- [j52]Masahito Hayashi, Shun Watanabe:
Finite-Length Analyses for Source and Channel Coding on Markov Chains. Entropy 22(4): 460 (2020) - [j51]Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai:
Reduction Theorem for Secrecy over Linear Network Code for Active Attacks. Entropy 22(9): 1053 (2020) - [j50]Yuxiang Yang, Giulio Chiribella, Masahito Hayashi:
Communication Cost of Quantum Processes. IEEE J. Sel. Areas Inf. Theory 1(2): 387-400 (2020) - [j49]Masahito Hayashi, Ángeles Vázquez-Castro:
Two-Way Physical Layer Security Protocol for Gaussian Channels. IEEE Trans. Commun. 68(5): 3068-3078 (2020) - [j48]Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi:
Asymptotic Behavior of Spatial Coupling LDPC Coding for Compute-and-Forward Two-Way Relaying. IEEE Trans. Commun. 68(7): 4063-4072 (2020) - [j47]Masahito Hayashi, Ángeles Vázquez-Castro:
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-Middle Attack. IEEE Trans. Inf. Forensics Secur. 15: 2295-2305 (2020) - [j46]Seunghoan Song, Masahito Hayashi:
Secure Quantum Network Code Without Classical Communication. IEEE Trans. Inf. Theory 66(2): 1178-1192 (2020) - [j45]Ning Cai, Masahito Hayashi:
Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes. IEEE Trans. Inf. Theory 66(3): 1428-1448 (2020) - [j44]Ning Cai, Masahito Hayashi:
Corrections to "Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes". IEEE Trans. Inf. Theory 66(6): 3954 (2020) - [j43]Anurag Anshu, Masahito Hayashi, Naqueeb Ahmad Warsi:
Secure Communication Over Fully Quantum Gel'fand-Pinsker Wiretap Channel. IEEE Trans. Inf. Theory 66(9): 5548-5566 (2020) - [c61]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval with Colluding Servers. ISIT 2020: 1077-1082 - [c60]Kun Wang, Masahito Hayashi:
Permutation Enhances Classical Communication Assisted by Entangled States. ISIT 2020: 1840-1845 - [c59]Yuuya Yoshida, Masahito Hayashi:
Classical Mechanism is Optimal in Classical-Quantum Differentially Private Mechanisms. ISIT 2020: 1973-1977 - [i82]Kun Wang, Masahito Hayashi:
Permutation Enhances Classical Communication Assisted by Entangled States. CoRR abs/2001.01845 (2020) - [i81]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval with Colluding Servers. CoRR abs/2001.04436 (2020) - [i80]Masahito Hayashi, Kun Fang:
Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction. CoRR abs/2002.12004 (2020) - [i79]Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai:
Reduction Theorem for Secrecy over Linear Network Code for Active Attacks. CoRR abs/2003.11722 (2020) - [i78]Masahito Hayashi, Ning Cai:
Secure network code over one-hop relay network. CoRR abs/2003.12223 (2020) - [i77]Masahito Hayashi, Ning Cai:
Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution. CoRR abs/2003.12225 (2020) - [i76]Go Kato, Masaki Owari, Masahito Hayashi:
Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication. CoRR abs/2003.13293 (2020) - [i75]Masahito Hayashi, Ning Cai:
Universal classical-quantum superposition coding and universal classical-quantum multiple access channel coding. CoRR abs/2011.00410 (2020) - [i74]Farzin Salek, Masahito Hayashi, Andreas J. Winter:
When are Adaptive Strategies in Asymptotic Quantum Channel Discrimination Useful? CoRR abs/2011.06569 (2020)
2010 – 2019
- 2019
- [j42]Ángeles Vázquez-Castro, Masahito Hayashi:
Physical Layer Security for RF Satellite Channels in the Finite-Length Regime. IEEE Trans. Inf. Forensics Secur. 14(4): 981-993 (2019) - [j41]Masahito Hayashi:
Universal Channel Coding for General Output Alphabet. IEEE Trans. Inf. Theory 65(1): 302-321 (2019) - [j40]Ryo Yaguchi, Masahito Hayashi:
Second Order Analysis for Joint Source-Channel Coding With General Channel and Markovian Source. IEEE Trans. Inf. Theory 65(9): 5750-5770 (2019) - [c58]M. A. Vazquez-Castro, Masahito Hayashi:
One-Way and Two-Way Physical Layer Security Protocols for the Gaussian Satellite Channel. ICC 2019: 1-7 - [c57]Yuuya Yoshida, Man-Hong Yung, Masahito Hayashi:
Optimal Mechanism for Randomized Responses under Universally Composable Security Measure. ISIT 2019: 547-551 - [c56]Masahito Hayashi:
Semi-Finite Length Analysis for Secure Random Number Generation. ISIT 2019: 952-956 - [c55]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval with Multiple Servers. ISIT 2019: 1727-1731 - [c54]Masahito Hayashi:
Secure list decoding. ISIT 2019: 2149-2153 - [c53]Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi:
Asymptotic Analysis on LDPC-BICM Scheme for Compute-and-Forward Relaying. ISIT 2019: 2923-2927 - [c52]Masahito Hayashi, Yanling Chen:
Secrecy and Error Exponents of k-Transmitter Multiple Access Wire-tap Channel. ITW 2019: 1-5 - [c51]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers. ITW 2019: 1-5 - [i73]Masahito Hayashi:
Secure list decoding. CoRR abs/1901.02590 (2019) - [i72]Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi:
Asymptotic Analysis on LDPC-BICM Scheme for Compute-and-Forward Relaying. CoRR abs/1901.05262 (2019) - [i71]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval with Multiple Servers. CoRR abs/1903.10209 (2019) - [i70]Seunghoan Song, Masahito Hayashi:
Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers. CoRR abs/1903.12556 (2019) - [i69]Satoshi Takabe, Tadashi Wadayama, Ángeles Vázquez-Castro, Masahito Hayashi:
Compute-and-forward relaying with LDPC codes over QPSK scheme. CoRR abs/1904.08306 (2019) - [i68]Masahito Hayashi, Takeshi Koshiba:
Verifiable Quantum Secure Modulo Summation. CoRR abs/1910.05976 (2019) - [i67]Masahito Hayashi, Ángeles Vázquez-Castro:
Two-Way Physical Layer Security Protocol for Gaussian Channels. CoRR abs/1911.08150 (2019) - [i66]Masahito Hayashi, Ángeles Vázquez-Castro:
Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack. CoRR abs/1912.13120 (2019) - 2018
- [j39]Masahito Hayashi, Vincent Y. F. Tan:
Minimum Rates of Approximate Sufficient Statistics. IEEE Trans. Inf. Theory 64(2): 875-888 (2018) - [j38]Marco Tomamichel, Masahito Hayashi:
Operational Interpretation of Rényi Information Measures via Composite Hypothesis Testing Against Product and Markov Distributions. IEEE Trans. Inf. Theory 64(2): 1064-1082 (2018) - [j37]Vincent Y. F. Tan, Masahito Hayashi:
Analysis of Remaining Uncertainties and Exponents Under Various Conditional Rényi Entropies. IEEE Trans. Inf. Theory 64(5): 3734-3755 (2018) - [j36]Yuxiang Yang, Ge Bai, Giulio Chiribella, Masahito Hayashi:
Compression for Quantum Population Coding. IEEE Trans. Inf. Theory 64(7): 4766-4783 (2018) - [j35]Wataru Kumagai, Masahito Hayashi:
Corrections to "Second-Order Asymptotics of Conversions of Distributions and Entangled States Based on Rayleigh-Normal Probability Distributions". IEEE Trans. Inf. Theory 64(7): 5455 (2018) - [j34]Wataru Kumagai, Masahito Hayashi:
Corrections to "Random Number Conversion and LOCC Conversion via Restricted Storage". IEEE Trans. Inf. Theory 64(8): 5985 (2018) - [c50]Yuuya Yoshida, Masahito Hayashi:
Asymptotically Decoupling and Mixing Properties in Quantum System. ISIT 2018: 261-265 - [c49]Satoshi Takabe, Yuta Ishimatsu, Tadashi Wadayama, Masahito Hayashi:
Asymptotic Analysis on Spatial Coupling Coding for Two-Way Relay Channels. ISIT 2018: 1021-1025 - [c48]Yuxiang Yang, Giulio Chiribella, Masahito Hayashi:
Compression for Qubit Clocks. ISIT 2018: 2476-2480 - [c47]Masahito Hayashi, Takeshi Koshiba:
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication. ISIT 2018: 2614-2618 - [c46]Anurag Anshu, Masahito Hayashi, Naqueeb Ahmad Warsi:
Secure Communication Over Fully Quantum Gel' Fand-Pinsker Wiretap Channel. ISIT 2018: 2679-2683 - [c45]Masahito Hayashi:
Secure physical layer network coding versus secure network coding. ITW 2018: 1-5 - [c44]Masahito Hayashi, Tadashi Wadayama, Ángeles Vázquez-Castro:
Secure Computation-and-Forward Communication with Linear Codes. ITW 2018: 1-5 - [c43]Seunghoan Song, Masahito Hayashi:
Secure Quantum Network Code without Classical Communication. ITW 2018: 1-5 - [c42]Seunghoan Song, Masahito Hayashi:
Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations. TQC 2018: 10:1-10:20 - [i65]Anurag Anshu, Masahito Hayashi, Naqueeb Ahmad Warsi:
Secure communication over fully quantum Gel'fand-Pinsker wiretap channel. CoRR abs/1801.00940 (2018) - [i64]Satoshi Takabe, Yuta Ishimatsu, Tadashi Wadayama, Masahito Hayashi:
Asymptotic Analysis on Spatial Coupling Coding for Two-Way Relay Channels. CoRR abs/1801.06328 (2018) - [i63]Maria Angeles Vázquez-Castro, Masahito Hayashi:
Physical Layer Security for RF Satellite Channels in the Finite-length Regime. CoRR abs/1803.00884 (2018) - [i62]Masahito Hayashi, Tadashi Wadayama, Ángeles Vázquez-Castro:
Secure Computation-and-Forward with Linear Codes. CoRR abs/1804.10729 (2018) - [i61]Satoshi Takabe, Tadashi Wadayama, Masahito Hayashi:
Asymptotic Analysis of Spatial Coupling Coding for Compute-and-Forward Relaying. CoRR abs/1807.01599 (2018) - [i60]Masahito Hayashi:
Semi-Finite Length Analysis for Information Theoretic Tasks. CoRR abs/1811.00262 (2018) - [i59]Masahito Hayashi:
Secure physical layer network coding versus secure network coding. CoRR abs/1812.00117 (2018) - [i58]Masahito Hayashi:
Secure Modulo Sum via Multiple Access Channel. CoRR abs/1812.10862 (2018) - [i57]Masahito Hayashi, Takeshi Koshiba:
Secure Modulo Zero-Sum Randomness as Cryptographic Resource. IACR Cryptol. ePrint Arch. 2018: 802 (2018) - 2017
- [j33]Masahito Hayashi, Vincent Y. F. Tan:
Equivocations, Exponents, and Second-Order Coding Rates Under Various Rényi Information Measures. IEEE Trans. Inf. Theory 63(2): 975-1005 (2017) - [j32]Wataru Kumagai, Masahito Hayashi:
Second-Order Asymptotics of Conversions of Distributions and Entangled States Based on Rayleigh-Normal Probability Distributions. IEEE Trans. Inf. Theory 63(3): 1829-1857 (2017) - [j31]Wataru Kumagai, Masahito Hayashi:
Random Number Conversion and LOCC Conversion via Restricted Storage. IEEE Trans. Inf. Theory 63(4): 2504-2532 (2017) - [j30]Ryutaroh Matsumoto, Masahito Hayashi:
Universal Secure Multiplex Network Coding With Dependent and Non-Uniform Messages. IEEE Trans. Inf. Theory 63(6): 3773-3782 (2017) - [j29]Masahito Hayashi, Masaki Owari:
Tight Asymptotic Bounds on Local Hypothesis Testing Between a Pure Bipartite State and the White Noise State. IEEE Trans. Inf. Theory 63(6): 4008-4036 (2017) - [c41]Go Kato, Masaki Owari, Masahito Hayashi:
Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free Public Communication. ICITS 2017: 166-187 - [c40]Ryo Yaguchi, Masahito Hayashi:
Second order analysis for joint source-channel coding with Markovian source. ISIT 2017: 918-922 - [c39]Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai:
Secrecy and robustness for active attack in secure network coding. ISIT 2017: 1172-1176 - [c38]Masahito Hayashi:
Secure wireless communication under spatial and local Gaussian noise assumptions. ISIT 2017: 1698-1702 - [c37]Yuxiang Yang, Ge Bai, Giulio Chiribella, Masahito Hayashi:
Compression for quantum population coding. ISIT 2017: 1973-1977 - [c36]Masahito Hayashi, Vincent Y. F. Tan:
Minimum rates of approximate sufficient statistics. ISIT 2017: 3035-3039 - [c35]Masahito Hayashi:
Asymptotic analysis for hidden Markovian process with quantum hidden system. ITW 2017: 469-473 - [i56]Ryo Yaguchi, Masahito Hayashi:
Second Order Analysis for Joint Source-Channel Coding with Markovian Source. CoRR abs/1701.03290 (2017) - [i55]Ryo Yaguchi, Masahito Hayashi:
Finite-Length Bounds for Joint Source-Channel Coding with Markovian Source and Additive Channel Noise to Achieve Large and Moderate Deviation Bounds. CoRR abs/1701.03305 (2017) - [i54]Yuxiang Yang, Ge Bai, Giulio Chiribella, Masahito Hayashi:
Compression for quantum population coding. CoRR abs/1701.03372 (2017) - [i53]Masahito Hayashi, Takeshi Koshiba:
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority. CoRR abs/1701.04470 (2017) - [i52]Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai:
Secrecy and Robustness for Active Attack in Secure Network Coding. CoRR abs/1703.00723 (2017) - [i51]Masahito Hayashi:
Information Geometry Approach to Parameter Estimation in Hidden Markov Models. CoRR abs/1705.06040 (2017) - [i50]Masahito Hayashi, Huangjun Zhu:
Secure uniform random number extraction via incoherent strategies. CoRR abs/1706.04009 (2017) - [i49]Ning Cai, Masahito Hayashi:
Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes. CoRR abs/1712.09035 (2017) - [i48]Masahito Hayashi, Takeshi Koshiba:
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority. IACR Cryptol. ePrint Arch. 2017: 457 (2017) - 2016
- [j28]Masahito Hayashi, Shun Watanabe:
Uniform Random Number Generation From Markov Chains: Non-Asymptotic and Asymptotic Analyses. IEEE Trans. Inf. Theory 62(4): 1795-1822 (2016) - [j27]Masahito Hayashi, Toyohiro Tsurumaru:
More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function. IEEE Trans. Inf. Theory 62(4): 2213-2232 (2016) - [j26]Masahito Hayashi, Ryutaroh Matsumoto:
Secure Multiplex Coding With Dependent and Non-Uniform Multiple Messages. IEEE Trans. Inf. Theory 62(5): 2355-2409 (2016) - [j25]Masahito Hayashi:
Security Analysis of ɛ-Almost Dual Universal2 Hash Functions: Smoothing of Min Entropy Versus Smoothing of Rényi Entropy of Order 2. IEEE Trans. Inf. Theory 62(6): 3451-3476 (2016) - [j24]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Secret Key Agreement: General Capacity and Second-Order Asymptotics. IEEE Trans. Inf. Theory 62(7): 3796-3810 (2016) - [c34]Marco Tomamichel, Masahito Hayashi:
Operational interpretation of Rényi conditional mutual information via composite hypothesis testing against Markov distributions. ISIT 2016: 585-589 - [c33]Masahito Hayashi, Vincent Y. F. Tan:
Remaining uncertainties and exponents under Rényi information measures. ISIT 2016: 1536-1540 - [i47]Masahito Hayashi:
Security guaranteed secure wireless communication based on reverse reconciliation. CoRR abs/1604.00635 (2016) - [i46]Masahito Hayashi:
Finite-Block-Length Analysis in Classical and Quantum Information Theory. CoRR abs/1605.02821 (2016) - [i45]Vincent Yan Fu Tan, Masahito Hayashi:
Analysis of Remaining Uncertainties and Exponents under Various Conditional Rényi Entropies. CoRR abs/1605.09551 (2016) - [i44]Yuxiang Yang, Giulio Chiribella, Masahito Hayashi:
Optimal compression for identically prepared qubit states. CoRR abs/1606.02893 (2016) - [i43]Maria Angeles Vázquez-Castro, Masahito Hayashi:
Information-theoretic Physical Layer Security for Satellite Channels. CoRR abs/1610.07252 (2016) - [i42]Christoph Hirche, Masahito Hayashi, Emilio Bagan, John Calsamiglia:
Discrimination power of a quantum detector. CoRR abs/1610.07644 (2016) - [i41]Masahito Hayashi, Vincent Y. F. Tan:
Minimum Rates of Approximate Sufficient Statistics. CoRR abs/1612.02542 (2016) - 2015
- [j23]Matthieu R. Bloch, Masahito Hayashi, Andrew Thangaraj:
Error-Control Coding for Physical-Layer Secrecy. Proc. IEEE 103(10): 1725-1746 (2015) - [j22]Tomoyuki Morimae, Masahito Hayashi, Harumichi Nishimura, Keisuke Fujii:
Quantum Merlin-Arthur with Clifford Arthur. Quantum Inf. Comput. 15(15&16): 1420-1430 (2015) - [j21]Masahito Hayashi:
Quantum Wiretap Channel With Non-Uniform Random Number and Its Exponent and Equivocation Rate of Leaked Information. IEEE Trans. Inf. Theory 61(10): 5595-5622 (2015) - [j20]Masahito Hayashi, Vincent Yan Fu Tan:
Asymmetric Evaluations of Erasure and Undetected Error Probabilities. IEEE Trans. Inf. Theory 61(12): 6560-6577 (2015) - [j19]Masaki Owari, Masahito Hayashi:
Local Hypothesis Testing Between a Pure Bipartite State and the White Noise State. IEEE Trans. Inf. Theory 61(12): 6995-7011 (2015) - [c32]Masahito Hayashi, Vincent Yan Fu Tan:
Equivocations and exponents under various Rényi information measures. ISIT 2015: 281-285 - [c31]Masahito Hayashi, Masaki Owari:
Tight asymptotic bounds on local hypothesis testing between a pure bipartite state and the white noise state. ISIT 2015: 691-695 - [c30]Masahito Hayashi, Marco Tomamichel:
Correlation detection and an operational interpretation of the Rényi mutual information. ISIT 2015: 1447-1451 - [c29]Masahito Hayashi, Toyohiro Tsurumaru:
More efficient privacy amplification with less random seeds. ISIT 2015: 1786-1790 - [c28]Masahito Hayashi, Vincent Yan Fu Tan:
Erasure and undetected error probabilities in the moderate deviations regime. ISIT 2015: 1821-1825 - [i40]Masahito Hayashi:
Universal channel coding for exponential family of channels. CoRR abs/1502.02218 (2015) - [i39]Masahito Hayashi, Shun Watanabe:
Uniform Random Number Generation from Markov Chains: Non-Asymptotic and Asymptotic Analyses. CoRR abs/1503.04371 (2015) - [i38]Masahito Hayashi, Vincent Yan Fu Tan:
Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures. CoRR abs/1504.02536 (2015) - [i37]Kosuke Ito, Wataru Kumagai, Masahito Hayashi:
Asymptotic Compatibility between LOCC Conversion and Recovery. CoRR abs/1504.02967 (2015) - [i36]Marco Tomamichel, Masahito Hayashi:
Operational Interpretation of Renyi Information Measures via Composite Hypothesis Testing Against Product and Markov Distributions. CoRR abs/1511.04874 (2015) - 2014
- [j18]Masahito Hayashi:
Large Deviation Analysis for Quantum Security via Smoothing of Rényi Entropy of Order 2. IEEE Trans. Inf. Theory 60(10): 6702-6732 (2014) - [c27]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Strong converse for a degraded wiretap channel via active hypothesis testing. Allerton 2014: 148-151 - [c26]Kosuke Ito, Wataru Kumagai, Masahito Hayashi:
Asymptotic reversibility of LOCC conversions. ISIT 2014: 531-535 - [c25]Marco Tomamichel, Mario Berta, Masahito Hayashi:
A duality relation connecting different quantum generalizations of the conditional Rényi entropy. ISIT 2014: 731-735 - [c24]Masahito Hayashi, Shun Watanabe:
Information geometry approach to parameter estimation in Markov chains. ISIT 2014: 1091-1095 - [c23]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Secret key agreement: General capacity and second-order asymptotics. ISIT 2014: 1136-1140 - [c22]Vincent Yan Fu Tan, Shun Watanabe, Masahito Hayashi:
Moderate deviations for joint source-channel coding of systems with Markovian memory. ISIT 2014: 1687-1691 - [c21]Shun Watanabe, Masahito Hayashi:
Strong converse and second-order asymptotics of channel resolvability. ISIT 2014: 1882-1886 - [c20]Wataru Kumagai, Masahito Hayashi:
Random number conversion via restricted storage. ISIT 2014: 2047-2051 - [c19]Masahito Hayashi:
Universal channel coding with continuous output system. ISITA 2014: 21-25 - [c18]Shun Watanabe, Masahito Hayashi:
Finite-length analysis on tail probability and simple hypothesis testing for Markov chain. ISITA 2014: 196-200 - [c17]Masahito Hayashi:
Finite-length analysis for secret random number generation and coding theorems. ISITA 2014: 322-326 - [c16]Masahito Hayashi, Shun Watanabe:
Non-asymptotic and asymptotic analyses on Markov chains in several problems. ITA 2014: 1-10 - [i35]Wataru Kumagai, Masahito Hayashi:
Random Number Conversion and LOCC Conversion via Restricted Storage. CoRR abs/1401.3781 (2014) - [i34]Shun Watanabe, Masahito Hayashi:
Finite-length Analysis on Tail probability and Simple Hypothesis Testing for Markov Chain. CoRR abs/1401.3801 (2014) - [i33]Masahito Hayashi, Shun Watanabe:
Information Geometry Approach to Parameter Estimation in Markov Chains. CoRR abs/1401.3814 (2014) - [i32]Shun Watanabe, Masahito Hayashi:
Strong Converse and Second-Order Asymptotics of Channel Resolvability. CoRR abs/1404.5507 (2014) - [i31]Masahito Hayashi, Vincent Yan Fu Tan:
Asymmetric Evaluations of Erasure and Undetected Error Probabilities. CoRR abs/1407.0142 (2014) - [i30]Masahito Hayashi, Marco Tomamichel:
Composite Hypothesis Testing and an Operational Interpretation of the Renyi Mutual Information. CoRR abs/1408.6894 (2014) - [i29]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Strong Converse for a Degraded Wiretap Channel via Active Hypothesis Testing. CoRR abs/1410.0443 (2014) - [i28]Masahito Hayashi, Himanshu Tyagi, Shun Watanabe:
Secret Key Agreement: General Capacity and Second-Order Asymptotics. CoRR abs/1411.0735 (2014) - 2013
- [j17]Toyohiro Tsurumaru, Masahito Hayashi:
Dual Universality of Hash Functions and Its Applications to Quantum Cryptography. IEEE Trans. Inf. Theory 59(7): 4700-4717 (2013) - [j16]Marco Tomamichel, Masahito Hayashi:
A Hierarchy of Information Quantities for Finite Block Length Analysis of Quantum Tasks. IEEE Trans. Inf. Theory 59(11): 7693-7710 (2013) - [j15]Masahito Hayashi:
Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications. IEEE Trans. Inf. Theory 59(11): 7728-7746 (2013) - [c15]Masahito Hayashi, Shun Watanabe:
Non-asymptotic bounds on fixed length source coding for Markov chains. Allerton 2013: 875-882 - [c14]Wataru Kumagai, Masahito Hayashi:
Second order asymptotics for random number generation. ISIT 2013: 1506-1510 - [c13]Shun Watanabe, Masahito Hayashi:
Non-asymptotic analysis of privacy amplification via Rényi entropy and inf-spectral entropy. ISIT 2013: 2715-2719 - [c12]Kingo Takiguchi, Masahito Hayashi:
Construction of artificial motile cell model. MHS 2013: 1-6 - [i27]Wataru Kumagai, Masahito Hayashi:
Second Order Asymptotics for Random Number Generation. CoRR abs/1303.0669 (2013) - [i26]Wataru Kumagai, Masahito Hayashi:
Second Order Asymptotics of Optimal Approximate Conversion for Probability Distributions and Entangled States and Its Application to LOCC Cloning. CoRR abs/1306.4166 (2013) - [i25]Masahito Hayashi:
Security analysis of epsilon-almost dual universal2 hash functions. CoRR abs/1309.1596 (2013) - [i24]Masahito Hayashi, Shun Watanabe:
Non-Asymptotic and Asymptotic Analyses on Markov Chains in Several Problems. CoRR abs/1309.7528 (2013) - [i23]Marco Tomamichel, Mario Berta, Masahito Hayashi:
A duality relation connecting different quantum generalizations of the conditional Rényi entropy. CoRR abs/1311.3887 (2013) - [i22]Masahito Hayashi, Toyohiro Tsurumaru:
More Efficient Privacy Amplification with Non-Uniform Random Seeds via Dual Universal Hash Function. CoRR abs/1311.5322 (2013) - 2012
- [c11]Masahito Hayashi, Ryutaroh Matsumoto:
Secure multiplex coding with dependent and non-uniform multiple messages. Allerton Conference 2012: 954-959 - [c10]Masahito Hayashi:
Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker. ISIT 2012: 890-894 - [c9]Masahito Hayashi:
Quantum wiretap channel with non-uniform random number and its exponent of leaked information. ISIT 2012: 895-899 - [c8]Masahito Hayashi:
Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2. TQC 2012: 128-140 - [i21]Masahito Hayashi:
Classical and quantum security analysis via smoothing of Renyi entropy of order 2. CoRR abs/1202.0322 (2012) - [i20]Masahito Hayashi:
Quantum wiretap channel with non-uniform random number and its exponent and equivocation rate of leaked information. CoRR abs/1202.0325 (2012) - [i19]Masahito Hayashi:
Precise evaluation of leaked information with universal2 privacy amplification in the presence of quantum attacker. CoRR abs/1202.0601 (2012) - [i18]Masahito Hayashi, Ryutaroh Matsumoto:
Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages. CoRR abs/1202.1332 (2012) - [i17]Shun Watanabe, Masahito Hayashi:
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf-Spectral Entropy. CoRR abs/1211.5252 (2012) - 2011
- [j14]Masahito Hayashi:
Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification. IEEE Trans. Inf. Theory 57(6): 3989-4001 (2011) - [c7]Masahito Hayashi, Ryutaroh Matsumoto:
Universally attainable error and information exponents, and equivocation rate for the broadcast channels with confidential messages. Allerton 2011: 439-444 - [c6]Hideyuki Terazono, Hyonchol Kim, Masahito Hayashi, Akihiro Hattori, Hiroyuki Takei, Kenji Yasuda:
Construction and Analysis of an Artificial Neuronal Network using a Neuron-collecting, Micro-patterning Method based on a Multi-electrode Array System. IJCCI (NCTA) 2011: 304-307 - [c5]Ryutaroh Matsumoto, Masahito Hayashi:
Secure multiplex coding with a common message. ISIT 2011: 1965-1969 - [i16]Toyohiro Tsurumaru, Masahito Hayashi:
Dual universality of hash functions and its applications to classical and quantum cryptography. CoRR abs/1101.0064 (2011) - [i15]Ryutaroh Matsumoto, Masahito Hayashi:
Secure Multiplex Coding with a Common Message. CoRR abs/1101.4036 (2011) - [i14]Ryutaroh Matsumoto, Masahito Hayashi:
Secure Multiplex Network Coding. CoRR abs/1102.3002 (2011) - [i13]Masahito Hayashi, Ryutaroh Matsumoto:
Universally Attainable Error and Information Exponents for the Broadcast Channels with Confidential Messages. CoRR abs/1104.4285 (2011) - [i12]Ryutaroh Matsumoto, Masahito Hayashi:
Universal Strongly Secure Network Coding with Dependent and Non-Uniform Messages. CoRR abs/1111.4174 (2011) - 2010
- [j13]Masahito Hayashi:
Capacity with energy constraint in coherent state channel. IEEE Trans. Inf. Theory 56(8): 4071-4079 (2010) - [c4]Masahito Hayashi, Ryutaroh Matsumoto:
Construction of wiretap codes from ordinary channel codes. ISIT 2010: 2538-2542 - [i11]Masahito Hayashi, Ryutaroh Matsumoto:
Construction of wiretap codes from ordinary channel codes. CoRR abs/1001.1197 (2010) - [i10]Ryutaroh Matsumoto, Masahito Hayashi:
Strong security and separated code constructions for the broadcast channels with confidential messages. CoRR abs/1010.0743 (2010) - [i9]Masahito Hayashi:
Tight exponential evaluation for information theoretical secrecy based on L1 distance. CoRR abs/1010.1358 (2010)
2000 – 2009
- 2009
- [j12]Masahito Hayashi:
Discrimination of two channels by adaptive methods and its application to quantum system. IEEE Trans. Inf. Theory 55(8): 3807-3820 (2009) - [j11]Masahito Hayashi:
Information spectrum approach to second-order coding rate in channel coding. IEEE Trans. Inf. Theory 55(11): 4947-4966 (2009) - [i8]Masahito Hayashi:
Exponential evaluations in universal random privacy amplification. CoRR abs/0904.0308 (2009) - [i7]Donna Dodson, Mikio Fujiwara, Philippe Grangier, Masahito Hayashi, Kentaro Imafuku, Ken-ichi Kitayama, Prem Kumar, Christian Kurtsiefer, Gaby Lenhart, Norbert Lütkenhaus, Tsutomu Matsumoto, William J. Munro, Tsuyoshi Nishioka, Momtchil Peev, Masahide Sasaki, Yutaka Sata, Atsushi Takada, Masahiro Takeoka, Kiyoshi Tamaki, Hidema Tanaka, Yasuhiro Tokura, Akihisa Tomita, Morio Toyoshima, Rodney Van Meter, Atsuhiro Yamagishi, Yoshihisa Yamamoto, Akihiro Yamamura:
Updating Quantum Cryptography Report ver. 1. CoRR abs/0905.4325 (2009) - 2008
- [j10]Masahito Hayashi, Akinori Kawachi, Hirotada Kobayashi:
Quantum measurements for hidden subgroup problems with optimal sample complexity. Quantum Inf. Comput. 8(3): 345-358 (2008) - [j9]Masahito Hayashi:
Second-Order Asymptotics in Fixed-Length Source Coding and Intrinsic Randomness. IEEE Trans. Inf. Theory 54(10): 4619-4637 (2008) - [i6]Masahito Hayashi:
Second-order asymptotics in channel coding. CoRR abs/0801.2242 (2008) - [i5]Masahito Hayashi:
Discrimination of two channels by adaptive methods and its application to quantum system. CoRR abs/0804.0686 (2008) - 2007
- [j8]Hiroshi Nagaoka, Masahito Hayashi:
An Information-Spectrum Approach to Classical and Quantum Hypothesis Testing for Simple Hypotheses. IEEE Trans. Inf. Theory 53(2): 534-549 (2007) - [c3]Masahito Hayashi, Kazuo Iwama, Harumichi Nishimura, Rudy Raymond Harry Putra, Shigeru Yamashita:
Quantum Network Coding. STACS 2007: 610-621 - 2006
- [j7]Masahito Hayashi:
Characterization of several kinds of quantum analogues of relative entropy. Quantum Inf. Comput. 6(7): 583-596 (2006) - [j6]Masahito Hayashi:
General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channel. IEEE Trans. Inf. Theory 52(4): 1562-1575 (2006) - [j5]Masahito Hayashi:
General formulas for fixed-length quantum entanglement concentration. IEEE Trans. Inf. Theory 52(5): 1904-1921 (2006) - [c2]Masahito Hayashi, Kazuo Iwama, Harumichi Nishimura, Rudy Raymond, Shigeru Yamashita:
(4, 1)-Quantum Random Access Coding Does Not Exist. ISIT 2006: 446-450 - [i4]Masahito Hayashi, Kazuo Iwama, Harumichi Nishimura, Rudy Raymond, Shigeru Yamashita:
Quantum Network Coding. Complexity of Boolean Functions 2006 - [i3]Masahito Hayashi:
Channel capacities of classical and quantum list decoding. CoRR abs/quant-ph/0603031 (2006) - 2005
- [j4]Masahito Hayashi, Hiroshi Imai, Keiji Matsumoto, Mary Beth Ruskai, Toshiyuki Shimono:
Qubit channels which require four inputs to achieve capacity: implications for additivity conjectures. Quantum Inf. Comput. 5(1): 13-31 (2005) - [i2]Masahito Hayashi:
General non-asymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to wire-tap channel. CoRR abs/cs/0503088 (2005) - [i1]Masahito Hayashi:
Second order asymptotics in fixed-length source coding and intrinsic randomness. CoRR abs/cs/0503089 (2005) - 2004
- [j3]Tomohiro Ogawa, Masahito Hayashi:
On Error Exponents in Quantum Hypothesis Testing. IEEE Trans. Inf. Theory 50(6): 1368-1372 (2004) - [c1]Keiji Matsumoto, Masahito Hayashi:
Universal distortion-free entanglement concentration. ISIT 2004: 323 - 2003
- [j2]Masahito Hayashi, Hiroshi Nagaoka:
General formulas for capacity of classical-quantum channels. IEEE Trans. Inf. Theory 49(7): 1753-1768 (2003) - 2002
- [j1]Masahito Hayashi, Keiji Matsumoto:
Simple construction of quantum universal variable-length source coding. Quantum Inf. Comput. 2(7): 519-529 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint