|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2012-03-16 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Quantification Method of Security Measures by Consideration of Reachability of Attacks Tetsuro Kito, Satoshi Kai, Tomohiro Shigemoto, Satoshi Takemoto, Tadashi Kaji (Hitachi) ICSS2011-44 |
There are many users who feel uneasy about security to use cloud computing environment. To provide the cloud computing e... [more] |
ICSS2011-44 pp.31-36 |
ISEC, LOIS |
2010-11-17 15:15 |
Ibaraki |
Tsukuba Univ. |
Similarity Hashing resistant to file modifications Susumu Serita, Yasuhiro Fujii, Satoshi Kai, Takao Murakami, Yoshinori Honda (Hitachi, Ltd.) ISEC2010-54 LOIS2010-33 |
Similar files in PCs and servers need to be identified quickly and accurately, and this can be done by using similarity ... [more] |
ISEC2010-54 LOIS2010-33 pp.31-36 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|