|
|
Technical Committee on Social Implications of Technology and Information Ethics (SITE) (Searched in: 2009)
|
|
Search Results: Keywords 'from:2009-07-02 to:2009-07-02'
|
[Go to Official SITE Homepage (Japanese)] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 14:55 |
Akita |
Akita University |
Clone Resistance Evaluation Based on Attacker's Resources in Artifact-metric Systems Masashi Une (BOJ) ISEC2009-35 SITE2009-27 ICSS2009-49 |
[more] |
ISEC2009-35 SITE2009-27 ICSS2009-49 pp.195-202 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 15:20 |
Akita |
Akita University |
Development of FMC Authentication Technique with Mobile Terminal Katsuyuki Umezawa, Takatoshi Kato (Hitachi), Satoru Tezuka (Tech. of Tokyo Univ.) ISEC2009-36 SITE2009-28 ICSS2009-50 |
The meaning of the narrow sense of FMC is a technology and service that can use the same terminals by both a mobile netw... [more] |
ISEC2009-36 SITE2009-28 ICSS2009-50 pp.203-208 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 15:45 |
Akita |
Akita University |
Certification Seal
-- Random Pattern of Polarized Film Pieces -- Yoshihiro Tsukamura ISEC2009-37 SITE2009-29 ICSS2009-51 |
[more] |
ISEC2009-37 SITE2009-29 ICSS2009-51 pp.209-211 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 16:10 |
Akita |
Akita University |
Software Protection Mechanism Using Tamper-Proof Module Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-38 SITE2009-30 ICSS2009-52 |
[more] |
ISEC2009-38 SITE2009-30 ICSS2009-52 pp.213-219 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 16:35 |
Akita |
Akita University |
A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying Kazuomi Oishi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2009-39 SITE2009-31 ICSS2009-53 |
A method of constructing tamper resistant software resistant to
malicious modification is proposed.
It uses a primit... [more] |
ISEC2009-39 SITE2009-31 ICSS2009-53 pp.221-228 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|