Search Results1-20 of  145

  • 菊池 浩明 ID: 9000017506469

    Articles in CiNii:1

    • Proposal on a Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items (2010)
  • 菊池 浩明 ID: 9000019179330

    Articles in CiNii:1

    • Parts Procurement Evaluation by Real Options Approach (2012)
  • 菊池 浩明 ID: 9000025003830

    Articles in CiNii:1

    • A mathematical model of trust and its application to security (2008)
  • 菊池 浩明 ID: 9000025005114

    Articles in CiNii:1

    • Heuristics for Detecting Botnet Coordinated Attacks (2010)
  • 菊池 浩明 ID: 9000025022372

    Articles in CiNii:1

    • Privacy-Preserving Reputation Protocols (2009)
  • 菊池 浩明 ID: 9000239194302

    東海大学情報通信学部通信ネットワーク工学科 (2013 from CiNii)

    Articles in CiNii:1

    • ビッグデータ時代を支えるセキュリティ・プライバシー保護技術論文小特集の発行にあたって (2013)
  • 菊池 浩明 ID: 9000239848165

    Articles in CiNii:1

    • Proposal of CAPTCHA Using Artificial Synthesis Sentences and Its Security Evaluation (2013)
  • 菊池 浩明 ID: 9000241202756

    Articles in CiNii:1

    • ファジィ真理値の双束について : FI同値類 (2006)
  • 菊池 浩明 ID: 9000242671179

    Articles in CiNii:1

    • Privacy Protection in Big Data Era (2014)
  • 菊池 浩明 ID: 9000248958801

    Articles in CiNii:1

    • Privacy-preserving Logistic Regression Analysis for Vertically Partitioned Data (2014)
  • 菊池 浩明 ID: 9000248959118

    Articles in CiNii:1

    • When and why do users of membership card feel privacy violations? (2014)
  • 菊池 浩明 ID: 9000273033384

    Articles in CiNii:1

    • Privacy-Preserving Epidemic Analysis on Risk of H. Pylori (2012)
  • 菊池 浩明 ID: 9000287141266

    Articles in CiNii:1

    • The Heisei 27 IPSJ Outstanding Paper Award : We Are the Scanners (2010)
  • 菊池 浩明 ID: 9000287149965

    Articles in CiNii:1

    • How Many Botnets are Running?Number of Linear Independent Basses in Log of DownLoading (2011)
  • 菊池 浩明 ID: 9000287149972

    Articles in CiNii:1

    • Mining Association rules consisting of Download Servers fromDistributed Honeypot Observation (2011)
  • 菊池 浩明 ID: 9000287149999

    Articles in CiNii:1

    • Heuristics for Detecting Types of Infections from CapturedPackets (2011)
  • 菊池 浩明 ID: 9000287150108

    Articles in CiNii:1

    • Privacy-Preserving Automated Trust Negotiation (2011)
  • 菊池 浩明 ID: 9000287150269

    Articles in CiNii:1

    • Asymmetric Biometric Authentication Based on SimilarityDefined of Intersecton of Two Sets (2011)
  • 菊池 浩明 ID: 9000287150404

    Articles in CiNii:1

    • Proposal on a Privacy-Preserving Collaborative FilteringProtocol based on Similarity between Items (2011)
  • 菊池 浩明 ID: 9000287154205

    Articles in CiNii:1

    • Perturbation based Privacy Preserving for "Slope One" Recommendation Method (2011)
Page Top