Search Results1-10 of  10

  • 柿崎 淑郎 ID: 9000366505216

    Articles in CiNii:1

    • Proposal and Evaluation of Method for Detecting C&C Server Using Unobserved Information by Attackers (2017)
  • 柿崎 淑郎 ID: 9000402383143

    Articles in CiNii:1

    • Proposal of Ransomware analysis using Memory Forensics (2019)
  • 柿崎 淑郎 ID: 9000402383393

    Articles in CiNii:1

    • Evaluation and Consideration on File Sharing Services using Multi-Authority Attribute-Based Encryption (2019)
  • 柿崎 淑郎 ID: 9000402383443

    Articles in CiNii:1

    • Proposal of Software Digital Rights Management System on Cloud Using Block-Chain (2019)
  • 柿崎 淑郎 ID: 9000402383459

    Articles in CiNii:1

    • Proposal of detection for mining script using dynamics analysis (2019)
  • 柿崎 淑郎 ID: 9000404293700

    Articles in CiNii:1

    • A Method for Detecting C & C Server Using Unobserved Information by Attackers (2016)
  • 柿崎 淑郎 ID: 9000404302051

    Articles in CiNii:1

    • Development and Enhancement of Intellectual Network Forensic System LIFT against Targeted Attacks (Part2)- Proposed Countermeasure Priority Evaluation Method - (2017)
  • 柿崎 淑郎 ID: 9000404307680

    Articles in CiNii:1

    • プッシュ通知を用いたパスワード管理手法の提案と評価 (2017)
  • 柿崎 淑郎 ID: 9000404309966

    Articles in CiNii:1

    • File Sharing Services using Multi-Authority Attrubute-Based Encryption (2018)
  • KAKIZAKI Yoshio ID: 9000004267957

    東京電機大学 (2015 from CiNii)

    Articles in CiNii:42

    • A Decentralized Management for Attribute Information with Unique Access and Verification of Relationship between Attributes (2010)
    • A New Support Method for Understanding News Using Ontology (2008)
    • A Proposal of Authentication Method Using Attribute Certificate (2004)
Page Top