Engineering Sciences/NOLTA-Information Security(Date:2013/07/11)

Presentation
Attacks on Authenticated Encryption Based on ε-MACs

Hayato KOBAYASHI,  Hiraku MORITA,  Tetsu IWATA,  

[Date]2013/7/11
[Paper #]ISEC2013-50,SITE2013-45,ICSS2013-55,EMM2013-52
Evaluation of Android Malware Detection Method without Code Analysis

KAZUKI IWAMOTO,  MASATA NISHIDA,  KATSUMI WASAKI,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.60,Vol.2013-SPT-6 No.60
A Survey of Application Privacy Policies in Mobile Applications

SAYO ICHINOSE,  HIROMITSU TAKAGI,  RIE YAMAGUCHI,  HAJIME WATANABE,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.61,Vol.2013-SPT-6 No.61
Third party review framework for privacy policy of application/contents

Keisuke TAKEMORI,  Takamasa ISOHARA,  Hideaki KAWABATA,  Ayumu KUBOTA,  Tomoaki TAKANO,  Junya KANI,  Masakatsu NISHIGAKI,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.62,Vol.2013-SPT-6 No.62
Privacy Policy Generation Assistant-mechanism based API and External Module detection for Android Application

TAKAMASA ISOHARA,  HIDEAKI KAWABATA,  KEISUKE TAKEMORI,  AYUMU KUBOTA,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.63,Vol.2013-SPT-6 No.63
複写される方へ

,  

[Date]2013/7/11
[Paper #]
Notice for Photocopying

,  

[Date]2013/7/11
[Paper #]
奥付

,  

[Date]2013/7/11
[Paper #]
裏表紙

,  

[Date]2013/7/11
[Paper #]
<<1234 61-69hit(69hit)