Search Results1-15 of  15

  • Akira Kanaoka ID: 9000346958565

    Articles in CiNii:1

    • METRO: Measurement of End-to-End Route Trust (2015)
  • Akira Kanaoka ID: 9000347538628

    Articles in CiNii:1

    • Detection of Unexpected Services and Communication Paths in Networked Systems (2013)
  • Akira Kanaoka ID: 9000347539145

    Articles in CiNii:1

    • Transparent Probabilistic Packet Marking (2014)
  • Akira Kanaoka ID: 9000347540175

    Articles in CiNii:1

    • METRO: Measurement of End-to-End Route Trust (2015)
  • Akira Kanaoka ID: 9000404332245

    Articles in CiNii:1

    • Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps (2019)
  • Akira Kanaoka ID: 9000404332247

    Articles in CiNii:1

    • Chronological Analysis of Source Code Reuse Impact on Android Application Security (2019)
  • Akira Kanaoka ID: 9000405757007

    Articles in CiNii:1

    • Helping Johnny to Search: Usable Encrypted Search on Webmail System (2019)
  • Akira Kanaoka ID: 9000239848200

    Articles in CiNii:2

    • Detection of Unexpected Services and Communication Paths in Networked Systems (2013)
    • Transparent Probabilistic Packet Marking (2014)
  • KANAOKA Akira ID: 9000004334032

    Articles in CiNii:86

    • Soko Soko Security : Providing Appropriate Security in Required Level (2011)
    • 適切なアクセス制御状態にあるネットワークシステムの特徴抽出 (2009)
    • Trust Framework for Identity-based Cryptography (2010)
  • Kanaoka Akira ID: 9000242080785

    Toho University (2013 from CiNii)

    Articles in CiNii:1

    • Detection of Unexpected Services and Communication Paths in Networked Systems (2013)
  • Kanaoka Akira ID: 9000391664547

    Articles in CiNii:1

    • The Security of Passwords (2015)
  • Kanaoka Akira ID: 9000396091418

    Faculty of Science , Toho University (1999 from CiNii)

    Articles in CiNii:1

    • Blind Equalization with Arbitrarily Fixed Time Delay (1999)
  • Kanaoka Akira ID: 9000404318519

    Toho University (2019 from CiNii)

    Articles in CiNii:1

    • Understanding the Origins of Weak Cryptographic Algorithms Used for Signing Android Apps (2019)
  • Kanaoka Akira ID: 9000404318535

    Toho University (2019 from CiNii)

    Articles in CiNii:1

    • Chronological Analysis of Source Code Reuse Impact on Android Application Security (2019)
  • Kanaoka Akira ID: 9000405706750

    Toho University (2019 from CiNii)

    Articles in CiNii:1

    • Helping Johnny to Search: Usable Encrypted Search on Webmail System (2019)
Page Top