Yoshimi Teshigawara
According to our database1,
Yoshimi Teshigawara
authored at least 18 papers
between 1976 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Enhancement of a Company-Wide Information Security Management System Through Incident Learning.
SN Comput. Sci., May, 2023
2016
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
2015
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation.
Proceedings of the Fourth International Conference on Cyber Security, 2015
2013
J. Inf. Process., 2013
2011
A method for calculating system similarity for the evaluation of practical accomplishments in person-in-charge allocation support.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2011
2010
Inf. Manag. Comput. Secur., 2010
A Security Measure Selection Scheme with Consideration of Potential Lawsuits.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic Sensors.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008
2007
A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones.
Proceedings of the Information Modelling and Knowledge Bases XIX, 2007
2006
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones.
Proceedings of the Information Security Applications, 7th International Workshop, 2006
2005
A Study of Security Policy Making Adaptable to Users' Environments Based on International Standards.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005
2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
Design of a Development Environment for Web-based Asynchronous and Synchronous Integrated Groupware Systems.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
1996
Proceedings of the 1996 Network Operations and Management Symposium, 1996
1978
Delay and Throughput Evaluation of Switching Methods in Computer Communication Networks.
IEEE Trans. Commun., 1978
1976