IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Social Implications of Technology and Information Ethics (SITE)  (Searched in: 2009)

Search Results: Keywords 'from:2009-07-02 to:2009-07-02'

[Go to Official SITE Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 25 of 25 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
14:55
Akita Akita University Clone Resistance Evaluation Based on Attacker's Resources in Artifact-metric Systems
Masashi Une (BOJ) ISEC2009-35 SITE2009-27 ICSS2009-49
 [more] ISEC2009-35 SITE2009-27 ICSS2009-49
pp.195-202
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
15:20
Akita Akita University Development of FMC Authentication Technique with Mobile Terminal
Katsuyuki Umezawa, Takatoshi Kato (Hitachi), Satoru Tezuka (Tech. of Tokyo Univ.) ISEC2009-36 SITE2009-28 ICSS2009-50
The meaning of the narrow sense of FMC is a technology and service that can use the same terminals by both a mobile netw... [more] ISEC2009-36 SITE2009-28 ICSS2009-50
pp.203-208
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
15:45
Akita Akita University Certification Seal -- Random Pattern of Polarized Film Pieces --
Yoshihiro Tsukamura ISEC2009-37 SITE2009-29 ICSS2009-51
 [more] ISEC2009-37 SITE2009-29 ICSS2009-51
pp.209-211
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
16:10
Akita Akita University Software Protection Mechanism Using Tamper-Proof Module
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-38 SITE2009-30 ICSS2009-52
 [more] ISEC2009-38 SITE2009-30 ICSS2009-52
pp.213-219
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
16:35
Akita Akita University A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying
Kazuomi Oishi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2009-39 SITE2009-31 ICSS2009-53
A method of constructing tamper resistant software resistant to
malicious modification is proposed.
It uses a primit... [more]
ISEC2009-39 SITE2009-31 ICSS2009-53
pp.221-228
 Results 21 - 25 of 25 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan