Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2009/06/25)

Presentation
A Study on the Log Getting Process for Detection of the Remaining Files Copied from Removable Storage Medium

Chikako ISHIZAWA,  Makoto NISHIDA,  

[Date]2009/6/25
[Paper #]ISEC2009-33,SITE2009-25,ICSS2009-47
Risk Assessment Method for Networked Systems using CVSS

Toshiki HARADA,  Akira KANAOKA,  Eiji OKAMOTO,  Masahiko KATO,  

[Date]2009/6/25
[Paper #]ISEC2009-34,SITE2009-26,ICSS2009-48
Clone Resistance Evaluation Based on Attacker's Resources in Artifact-metric Systems

Masashi UNE,  

[Date]2009/6/25
[Paper #]ISEC2009-35,SITE2009-27,ICSS2009-49
Development of FMC Authentication Technique with Mobile Terminal

Katsuyuki UMEZAWA,  Takatoshi KATO,  Satoru TEZUKA,  

[Date]2009/6/25
[Paper #]ISEC2009-36,SITE2009-28,ICSS2009-50
Certification Seal : Random Pattern of Polarized Film Pieces

Yoshihiro Tsukamura,  

[Date]2009/6/25
[Paper #]ISEC2009-37,SITE2009-29,ICSS2009-51
Software Protection Mechasnism Using Tamper-Proof Module

Kazuhide FUKUSHIMA,  Shinsaku KIYOMOTO,  Toshiaki TANAKA,  

[Date]2009/6/25
[Paper #]ISEC2009-38,SITE2009-30,ICSS2009-52
A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying

Kazuomi OISHI,  Tsutomu MATSUMOTO,  

[Date]2009/6/25
[Paper #]ISEC2009-39,SITE2009-31,ICSS2009-53
複写される方へ

,  

[Date]2009/6/25
[Paper #]
Notice for Photocopying

,  

[Date]2009/6/25
[Paper #]
奥付

,  

[Date]2009/6/25
[Paper #]
<<12 21-30hit(30hit)