This map shows the geographic impact of Shigeo Tsujii's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shigeo Tsujii with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shigeo Tsujii more than expected).
This network shows the impact of papers produced by Shigeo Tsujii. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shigeo Tsujii. The network helps show where Shigeo Tsujii may publish in the future.
Co-authorship network of co-authors of Shigeo Tsujii
This figure shows the co-authorship network connecting the top 25 collaborators of Shigeo Tsujii.
A scholar is included among the top collaborators of Shigeo Tsujii based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Shigeo Tsujii. Shigeo Tsujii is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Tsujii, Shigeo, et al.. (2013). Cryptosystems for Social Organizations Managed by Receiving Administrator -- TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations. IEICE Technical Report; IEICE Tech. Rep.. 113(135). 281–288.1 indexed citations
2.
Tsujii, Shigeo, et al.. (2012). Proposal on Concept of Encrypted State Processing at Semantic Layerbased on Logic -- Toward Realization of Confidentiality Preserving Retrieval and Creation of Answer by Natural Language. 112(305). 53–60.2 indexed citations
3.
Tsujii, Shigeo, et al.. (2012). Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization. IEICE Technical Report; IEICE Tech. Rep.. 111(455). 149–155.
4.
Tsujii, Shigeo, et al.. (2011). On Electronic Government System for Overcoming Contradiction between Protection and Utilization of Personal Information and Privacy -- Part 1. IEICE Technical Report; IEICE Tech. Rep.. 111(363). 19–24.
5.
Tsujii, Shigeo, et al.. (2009). Improvement of the Internal Perturbation Modifier -- An example of Perturbed Matsumoto-Imai. IEICE Technical Report; IEICE Tech. Rep.. 109(337). 51–55.1 indexed citations
6.
Tsujii, Shigeo, et al.. (2008). Design Policy of MPKC based on Piece in Hand Concept. IEICE Technical Report; IEICE Tech. Rep.. 108(161). 15–22.1 indexed citations
Furukawa, Toshihiro, et al.. (2007). Affine Projection Type Blind Multiuser Detection with Desired Symbol Estimation. IEICE Technical Report; IEICE Tech. Rep.. 107(2). 121–126.
9.
Takahashi, Y. & Shigeo Tsujii. (2007). The study for the position authentication and the security of location information. IEICE Technical Report; IEICE Tech. Rep.. 107(140). 1–6.1 indexed citations
Tsujii, Shigeo, et al.. (2006). Noise Suppression with High Performance using Kalman Filter. IEICE technical report. Speech. 106(371). 61–66.1 indexed citations
12.
Tsujii, Shigeo, et al.. (2004). Proposal of MOCHIGOMA(Piece in Hand) Concept for Multivariate Type Public Key Cryptosystem. IEICE Technical Report; IEICE Tech. Rep.. 104(315). 47–54.3 indexed citations
13.
Furukawa, Toshihiro, et al.. (2004). A practical subspace blind identification algorithm with reduced computational complexity. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 87(12). 3360–3371.
14.
Chao, Jinhui, et al.. (2003). Baby Step Giant Step Algorithms in Point Counting of Hyperelliptic Curves. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 86(5). 1127–1134.1 indexed citations
15.
Yamaguchi, Hiroshi, et al.. (2003). An Electronic Voting Protocol Preserving Voter's Privacy. IEICE Transactions on Information and Systems. 86(9). 1868–1878.1 indexed citations
16.
Morii, Masakatu, et al.. (2002). Implementation of Damage Analysis Support System against Illegal Access. IPSJ SIG Notes. 2002(68). 21–26.
17.
Tsujii, Shigeo. (1992). A new ID-based key distribution system. 576. 288–299.
18.
Chao, Jinhui & Shigeo Tsujii. (1987). On Estimation of Noncausal Vector AR Processes. International Symposium on Circuits and Systems. 105–110.2 indexed citations
Tsujii, Shigeo, et al.. (1976). Optimum receiver for digital signal with multiplicative noise, additive noise and intersymbol interference. 59. 53–61.1 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.