From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proposal of Risk Communications Supporting Method in Multiplex Risk Communicator., , и . ETFA, стр. 255-260. IEEE, (2006)Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion).. Security Protocols Workshop, том 1550 из Lecture Notes in Computer Science, стр. 90-94. Springer, (1998)Proposal of Collaborative Learning Support Method in Risk Communications., , и . HCI (1), том 8510 из Lecture Notes in Computer Science, стр. 457-465. Springer, (2014)A Method for Rapid RSA Key Generation., , и . Syst. Comput. Jpn., 21 (8): 11-20 (1990)Social consensus making support system by qualitative and quantitative hybrid simulation., , , и . SMC, стр. 896-901. IEEE, (2010)A Proposed Web Access Control System Request Policy Framework for Cooperation of DNS and a Web Browser., , , и . ARES, стр. 549-554. IEEE Computer Society, (2011)Development and Evaluation of Defaced Sites Automatic Detection System DICE., , , и . IIH-MSP, стр. 196-201. IEEE Computer Society, (2011)Development of Intellectual Network Forensic System LIFT against Targeted Attacks., , , , , , , и . CyberSec, стр. 16-21. IEEE Computer Society, (2015)Proposal for Combinatorial Optimization Technology in Consideration of the Dynamic Characteristic of IT Risks., , и . COMPSAC Workshops, стр. 40-46. IEEE Computer Society, (2015)Proposal and Evaluation of Methods Using the Quantification Theory and Machine Learning for Detecting C&C Server Used in a Botnet., и . COMPSAC Workshops, стр. 24-29. IEEE Computer Society, (2015)