Tokyo City University

Researchers Information System

inspection-site

Japanese English

TOP
Search by Faculty
or Department
Search by Keyword
Search by Research
Field
Detailed Search

Tokyo City University top

SEKI Yoshiaki

Profile Research field Research achievement Educational achievement Social contribution achievement

 

Published Papers  
No.TitleJournalVolNoStart PageEnd PagePublication dateDOIReferee
1A Method for Smartphone Theft Prevention when the Owner Dozes off IEICE Transactions on Information and Systems E102-D Sep. 2019  Refereed 
2The Influence of Friend Relationships on Information SecurityBehavior——Investigation on Passwords Sharing among Univer-sity Students IEICE Transactions J101-D 10 1438 1442 Oct. 2018  Refereed 
3A Study of Information Leakage Risk Management Plans for theEmployee’s Twitter Use IEICE Transactions J97-D 12 1714 1718 Dec. 2014  Refereed 
4Risk Assessment of Information Leak in Twitter Use ofEmployee — Experience and Consciousness on Tweet aboutBusiness IEICE Transactions J97-D 12 1709 1713 Dec. 2014  Refereed 
5A Concept of Compromised Cryptographic Check Service on HTTPS for PersonalUsers IEICE Transactions J97-D 975 983 May. 2014  Refereed 
6Proposal and Consideration of the Securitter which Tweets Behavior of Information Security 情報処理学会論文誌 55 210 220 Jan. 15, 2014  Refereed 
7A Study of Home Measures for Children's Safe Internet Use 情報処理学会論文誌 55 311 324 Jan. 15, 2014  Refereed 
8International Comparative Study of Users' Awareness to Harmful Information on the Internet 情報処理学会論文誌 54 1619 1631 Apr. 15, 2013  Refereed 
9Risk Assessment of Big Data Relating Service The Transactions of the Institute of Electronics, Information and Communication Engineers. A 96 189 194 Apr. 1, 2013  Refereed 
10情報セキュリティ行動をツイートする情報共有システムの検討 信学技報 112 466 95 100 2013  Not refereed 
11情報セキュリティ行動をツイートする情報共有システムの実装 信学技報 112 466 101 106 2013  Not refereed 
12Behavior Model of Information Security 情報処理学会論文誌 53 2204 2212 Sep. 15, 2012  Refereed 
13Construction of Information Security Behavior model-Why don’t people practice security behavior?- WCSS2012 12pages Sep. 2012  Refereed 
14A Receiver Controllable Private Key Management Mechanism for Identity-Based Encryption The IEICE transactions on information and systems (Japanese edetion) 95 1183 1192 May. 1, 2012  Refereed 
15ライフログサービスにおけるリスクマネジメントに関する基本検討 電子情報通信学会ライフインテリジェンスとオフィス情報システム研究会(LOIS)研究報告 127 132 May. 2012  Not refereed 
16A Method to Find Cryptographic Algorithms in Security Protocols ―A Security Measure against Cryptosystem Security Compromises 情報処理学会論文誌 53 474 484 Feb. 15, 2012  Refereed 
17Proposal and Evaluation of Research Information Expression Technique Based on Document Investigation Socio-Informatics 49 59 2012 https://doi.org/10.14836/ssi.1.2_491Refereed 
18LEAVES; Legend Enhanced Application Virtual Environment System 情報処理学会論文誌 52 121 130 Jan. 15, 2011  Refereed 
19暗号危殆化に対するHTTPS暗号確認サービスの提案 電子情報通信学会総合大会講演論文集2011年_情報システム(1) 107 107 2011  Not refereed 
20暗号危殆化に対するHTTPS暗号可視化手法の提案 日本社会情報学会(JSIS & JASI)合同研究大会研究発表論文集2011年 26 335 338 2011 https://doi.org/10.14836/jasi.26.0.335.01Not refereed 
21研究グループにおける文献を基にした情報共有指標の考察 第17回社会情報システム学シンポジウム学術講演論文集 73 78 2011  Not refereed 
22A Proposal of Dynamic Multi-homing Group Service with Personal Context Information 情報処理学会論文誌 51 575 589 Feb. 15, 2010  Refereed 
23“研究グループにおける文献を基にした研究情報可視化インタフェースRIAS_spaceの提案” GNワークショップ2010 2010 75 80 2010  Not refereed 
24研究グループにおける文献を基にした知識共有指標の提案 2010年日本社会情報学会(JASI & JSIS)合同大会研究発表論文集 347 352 2010 https://doi.org/10.14836/jasi.25.0.347.01Not refereed 
25短期的な世代交代のある組織における注記事項伝承システムの構築 第72回情報処理学会全国大会 5ZG-5 2010  Not refereed 
26組織における文献を基にした知識共有手法の提案 第72回情報処理学会全国大会 5ZG-6 2010  Not refereed 
27短期的な世代交代のある組織における注記事項伝承システムの提案 グループウェアとネットワークサービスワークショップ2009論文集 105 110 2009  Not refereed 
28多重帰属グループサービスアーキテクチャの検討―グループ間競合制御方式についての考察― 電子情報通信学会, 情報セキュリティ研究会, 研究報告 ISEC2006-89 351 12 Nov. 2006  Not refereed 
29Fly-fishing - a dynamic linking module Systems and Computers in Japan 31 38 46 Jun. 30, 2000 https://doi.org/10.1002/(SICI)1520-684X(200007)31:7<38::AID-SCJ5>3.0.CO;2-W1Refereed 
30Development and Evaluation of a Prototype System for Communication Navigator on Driving Environment The Transactions of the Institute of Electronics,Information and Communication Engineers B 82 11 1966 1973 Nov. 25, 1999  Refereed 
31Dynamic Linking Module Fly-Fishing The Transactions of the Institute of Electronics,Information and Communication Engineers. 82 1202 1209 Sep. 25, 1999  Refereed 
32NetLibra: toward advanced digital library systems NTT R and D 48 520 525 1999  
33Toward networking library systems: NetLibra NTT Review 11 61 64 1999  Refereed 
34Networking Library System : NetLibra The Journal of Information Science and Technology Association 49 10 498 498 1999 https://doi.org/10.18919/jkg.49.10_4981
35A New Framework of Communication Navigator ITE Technical Report 21 55 25 30 Sep. 26, 1997 https://doi.org/10.11485/itetr.21.55.0_251
36GoldFISH : Group Oriented Long - term Distribution with FISH IPSJ Journal 36 1359 1366 Jun. 15, 1995  Refereed 
37FISH : Flexible Information Sharing and Handling System The Transactions of the Institute of Electronics,Information and Communication Engineers. 76 1223 1231 Jun. 25, 1993  Refereed 
38Analysis of the Stored Knowledge in a Multi-group Environment ITE Technical Report 17 50 1993 https://doi.org/10.11485/tvtr.17.50_11

 

MISC  
No.TitleJournalVolNoStart PageEnd PagePublication date
1User Authentication Keeping Method Using Watch Type Devices : Case of Acceleration Sensors 117 286 13 18 Nov. 9, 2017 
2Consciousness Investigation of Passwords Management in University Students : Questionnaire Design based on Friend Relationships 117 286 12 Nov. 9, 2017 
3Risks of approval in the SNS using the OAuth authentication 116 289 57 62 Nov. 7, 2016 
4Risk Assessment of Privacy Disclosure in Facebook Use : Privacy Setting and Awareness of the Young Members in Society 115 27 85 90 May. 14, 2015 
5Analysis of Congestion in Sightseeing Spots by using Twitter Logs 115 27 91 96 May. 14, 2015 
6Risk Assessment of Privacy Disclosure in Facebook Use ?Privacy Setting and Awareness of the Young Members in Society? IPSJ SIG Notes 2015 14 May. 7, 2015 
7Analysis of Congestion in Sightseeing Spots by using Twitter Logs IPSJ SIG Notes 2015 15 May. 7, 2015 
8Systematic analysis for the decision guidelines in the adoption and operation of BYOD : Contradiction between rules and information security IEICE technical report. Life intelligence and office information systems 114 150 29 34 Jul. 24, 2014 
9A Questionnaire Survey on the Divulging of Information among Twitter Users Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo 30 53 109 Mar. 28, 2014 
10Risk Assessment of Information Leak in Twitter Use of Employee : Tweet Experience and Consciousness about Business IEICE technical report. Life intelligence and office information systems 113 479 125 130 Mar. 7, 2014 
11Risk Assessment of Information Leak in Twitter Use of Employee : The Actual Situation and Effectiveness of Company's Measures for Employee Tweets IEICE technical report. Life intelligence and office information systems 113 479 131 136 Mar. 7, 2014 
12The Difference between the Network Service Categories about Anxieties by Web Investigation 2013 239 246 Oct. 14, 2013 
13A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites IEICE technical report. Life intelligence and office information systems 113 43 71 78 May. 16, 2013 
14A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites 2013 11 May. 9, 2013 
15Teenagers'Usage of Smartphones and Their Exposure to Harmful Information on the Internet : A Questionnaire Survey of Junior/Senior High School Students and Their Parents in Tokyo Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo 29 51 104 Mar. 27, 2013 
16Consideration of Information Sharing System which tweets Behavior of Information Security 19 19 24 Jan. 23, 2013 
17Internet Addiction among adolescents by Smartphone usage and its relation to child-parent relationship 2013 101 106 2013 
18A Study of Parent Focus Group Interviews about Children's Internet Usage 2012 450 457 Oct. 23, 2012 
19Consideration from the Result of Investigation about Anxieties on an Online Game/Auction 2012 547 554 Oct. 23, 2012 
20Consideration from the Result of Investigation about Anxieties on Online Games 2012 19 Oct. 10, 2012 
21A Study of the Risk Management in Life Log Service 2012 22 May. 10, 2012 
22A Study of the Risk Management in Life Log Service 2012 22 May. 10, 2012 
23Why don't people do Information Security Behaviors? 18 121 126 Jan. 26, 2012 
24Information Behavior and Communication Anxiety on Twitter after the Great East Japan Earthquake : Web Survey of Twitter Users in the Kanto Region Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo 28 115 160 2012 
25Information Behavior and Communication Anxiety of Residents in Disaster Areas : Survey of Residents in Sendai and Morioka Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo 28 64 2012 
262 Proposal of Information Sharing System which tweets Behavior of Information Security 2012 85 90 2012 
27Information Behavior in Tokyo Metropolitan Area after the Great East Japan Earthquake Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo 28 65 113 2012 
28"Anshin" and anxieties of Twitter users after the 2011 off the Pacific coast of Tohoku Earthquake 2011 Dec. 19, 2011 
29The actual condition and users' psychology of ICT usage in the event of a major earthquake -The online survey to residents of the Tokyo metropolitan area- 2011 Dec. 19, 2011 
30A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol IEICE technical report. Life intelligence and office information systems 111 286 123 128 Nov. 14, 2011 
31A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Technical report of IEICE. ISEC 111 285 123 128 Nov. 7, 2011 
32A Study on Constitution of Authentication and AuthorizationFunctions in Information Sharing Systems 2009 Oct. 12, 2011 
33A Study of Security Architecture in Multi-homing VPN Service 2009 Oct. 12, 2011 
34A Consideration of Security Risk in Compromising Hash Function An Exposure of Vulnerability against Information Storage System IEICE technical report 110 450 95 100 Feb. 24, 2011 
35LEAVES : Legend Enhanced Application Virtual Environment System 52 121 130 Jan. 2011 
36RO-004 A Proposal and Evaluation of a Tool to Check Cryptographic Settings in SSL 119 126 2011 
37Sample Investigation and the Consideration to Compromising Cryptosystems in SSL IEICE technical report 110 282 65 72 Nov. 10, 2010 
38A Proposal of a method to Check Cryptographic Algorithms in Security Protocols : A Countermeasure against Compromising of Cryptosystems in SSL IEICE technical report 110 282 73 80 Nov. 10, 2010 
39A Proposal of Dynamic Multi-homing Group Service with Personal Context Information 51 575 589 Feb. 2010 
40RM-012 Virtual Private Device : Encryption for Storages 87 94 Aug. 20, 2009 
41A Proposal of the patrimony of the notes in an organization conducting short-term alternation of generations 71 111 112 Mar. 10, 2009 
42Consideration of management assistant in a research organization IEICE technical report 108 53 43 48 May. 23, 2008 
43Consideration of management assistant in a research organization IPSJ SIG Notes 2008 48 43 48 May. 16, 2008 
44Editor's Message to Special Issue on Networked Services to be Placed in the Social Contexts IPSJ Journal 48 Jan. 15, 2007 
45A Security Consideration in ID Information Sharing Service IEICE technical report 106 55 49 54 May. 19, 2006 
46ID-linker : Towards Remote control technique which uses RFID IEICE technical report 106 55 May. 12, 2006 
47B-7-176 A Consideration on Notification System with IC Tag for Entering Proceedings of the IEICE General Conference 2006 272 272 Mar. 8, 2006 
48ID-linker: Remote control technique which uses RFID 2005 12 Nov. 10, 2005 
49A study on automatic hyperlink generation for cross selling Technical report of IEICE. OFC 101 43 19 24 May. 15, 2001 
50A Study on the Trend and View of the Office Systems Research Technical report of IEICE. OFC 100 679 Mar. 9, 2001 
51Cyber Shopping Plaza which provide Product Recommendation Function Technical report of IEICE. OFC 100 540 12 Jan. 12, 2001 
52A Digital Exhibition based on Contents Networking Technology Technical report of IEICE. OFC 100 102 29 34 May. 30, 2000 
53A Digital Exhibition based on Contents Networking Technology Proceedings of the IEICE General Conference 2000 141 141 Mar. 7, 2000 
54A Contents Distribution System for Digital Library IPSJ SIG Notes 1999 102 81 89 Nov. 30, 1999 
55A Contents Distribution System for Digital Library Digital libraries 16 60 68 Nov. 1999 
56Contents Distribution and Contents - Mediation System IPSJ SIG Notes 1999 88 57 62 Oct. 21, 1999 
57Net - X : A Contents Distribution System based on Information Organizing Technology IPSJ SIG Notes 1999 40 10 May. 19, 1999 
58Toward Contents Networking System "Net-x" Proceedings of the IEICE General Conference 1999 196 196 Mar. 8, 1999 
59Performance evaluation of information linking module Fly - fishing IPSJ SIG Notes 1999 Jan. 25, 1999 
60Distributed Networking Library : NetLibra 57 Oct. 5, 1998 
61Personalized Digital Library System Proceedings of the Society Conference of IEICE 1998 104 104 Sep. 7, 1998 
62An Information Distribution Method dased on Users' Characteristics 56 85 86 Mar. 17, 1998 
63Driver's Communication Assistant for Safety and Comfort Driving Proceedings of the IEICE General Conference 1998 351 351 Mar. 6, 1998 
64Development of Dukas '98 : Driving Environments-based Communication Navigator Proceedings of the Society Conference of IEICE 66 67 1998 
65An Information Structuring Method for Communication Navigator IPSJ SIG Notes 1997 105 Nov. 13, 1997 
66GoldFISH : Group Oriented Long - term Distribution with FISH IPSJ SIG Notes 1993 75 17 24 Aug. 27, 1993 
67A Knowledge - awareness oriented knowledge transfer support environment : CATFISH 1993 12 57 64 Jan. 29, 1993 
68Analysis of the Stored Knowledge on FISH Technical report of IEICE. OFC OFS92 1993 
69Know - how Management System Extension with Cooperation Process Oriented Design 1992 23 30 Jan. 23, 1992 
70Know-how management system 39 2205 2206 Oct. 16, 1989 
71Office Data Models on Clearing Systems 37 1330 1331 Sep. 12, 1988 

 

Conference Activities & Talks  
No.TitleConferencePublication datePromoterVenue
1User Authentication Keeping Method Using Watch Type Devices : Case of Acceleration Sensors 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 Nov. 9, 2017 
2Consciousness Investigation of Passwords Management in University Students : Questionnaire Design based on Friend Relationships 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 Nov. 9, 2017 
3Risk Assessment for PrivacyProtection of Information Literacy Beginners in Big Data Era The 20th International Conference on Network-Based InformationSystems (NBiS-2017), Advances in Network-Based InformationSystems, The 11 International Workshop on Advanced Distributedand Parallel Network Applications (ADPNA-2017) Aug. 24, 2017 
4Risks of approval in the SNS using the OAuth authentication 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 Nov. 7, 2016 
5Risk assessment quantification of social-media utilization in enterprise 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings Aug. 23, 2016 
6Risk assessment of social-media utilization in an enterprise 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings Aug. 3, 2015 
7Analysis of Congestion in Sightseeing Spots by using Twitter Logs 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 May. 14, 2015 
8Risk Assessment of Privacy Disclosure in Facebook Use : Privacy Setting and Awareness of the Young Members in Society 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 May. 14, 2015 
9Risk Assessment of Privacy Disclosure in Facebook Use ?Privacy Setting and Awareness of the Young Members in Society? IPSJ SIG technical reports May. 7, 2015 
10Risk Assessment of Privacy Disclosure in Facebook Use ?Privacy Setting and Awareness of the Young Members in Society? IPSJ SIG Notes May. 7, 2015 
11Analysis of Congestion in Sightseeing Spots by using Twitter Logs IPSJ SIG Notes May. 7, 2015 
12Analysis of Congestion in Sightseeing Spots by using Twitter Logs IPSJ SIG technical reports May. 7, 2015 
13Systematic analysis for the decision guidelines in the adoption and operation of BYOD : Contradiction between rules and information security IEICE technical report. Life intelligence and office information systems Jul. 24, 2014 
14A Questionnaire Survey on the Divulging of Information among Twitter Users Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo Mar. 28, 2014 
15Risk Assessment of Information Leak in Twitter Use of Employee : Tweet Experience and Consciousness about Business IEICE technical report. Life intelligence and office information systems Mar. 7, 2014 
16Risk Assessment of Information Leak in Twitter Use of Employee : The Actual Situation and Effectiveness of Company's Measures for Employee Tweets IEICE technical report. Life intelligence and office information systems Mar. 7, 2014 
17A study of risk assessment quantification in cloud computing Proceedings - 2014 International Conference on Network-Based Information Systems, NBiS 2014 Jan. 26, 2014 
18The Difference between the Network Service Categories about Anxieties by Web Investigation コンピュータセキュリティシンポジウム2013論文集 Oct. 14, 2013 
19A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites IEICE technical report. Life intelligence and office information systems May. 16, 2013 
20A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites 研究報告セキュリティ心理学とトラスト(SPT) May. 9, 2013 
21A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites 研究報告グループウェアとネットワークサービス(GN) May. 9, 2013 
22Teenagers'Usage of Smartphones and Their Exposure to Harmful Information on the Internet : A Questionnaire Survey of Junior/Senior High School Students and Their Parents in Tokyo Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo Mar. 27, 2013 
23Implementation of Information Sharing System which tweets Behavior of Information Security IEICE technical report. Life intelligence and office information systems Mar. 7, 2013 
24Investigation of Information Sharing System which tweets Behavior of Information Security IEICE technical report. Life intelligence and office information systems Mar. 7, 2013 
25Consideration of Information Sharing System which tweets Behavior of Information Security 社会情報システム学シンポジウム学術講演論文集 Jan. 23, 2013 
26Internet Addiction among adolescents by Smartphone usage and its relation to child-parent relationship 社会情報学会(SSI)学会大会研究発表論文集 2013 
27A Study of Parent Focus Group Interviews about Children's Internet Usage コンピュータセキュリティシンポジウム2012論文集 Oct. 23, 2012 
28Consideration from the Result of Investigation about Anxieties on an Online Game/Auction コンピュータセキュリティシンポジウム2012論文集 Oct. 23, 2012 
29Consideration from the Result of Investigation about Anxieties on Online Games 研究報告デジタルコンテンツクリエーション(DCC) Oct. 10, 2012 
30Consideration from the Result of Investigation about Anxieties on Online Games 研究報告コンシューマ・デバイス&システム(CDS) Oct. 10, 2012 
31A Study of the Risk Management in Life Log Service 研究報告情報セキュリティ心理学とトラスト(SPT) May. 10, 2012 
32A Study of the Risk Management in Life Log Service IEICE technical report. Life intelligence and office information systems May. 10, 2012 
33A Study of the Risk Management in Life Log Service 研究報告グループウェアとネットワークサービス(GN) May. 10, 2012 
34Information behavior in Tokyo Metropolitan Area after the Great East Japan Earthquake Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo Mar. 28, 2012 
35Information behavior and communication anxiety on Twitter after the Great East Japan Earthquake : Web survey of Twitter user in Kanto Region Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo Mar. 28, 2012 
36Information behavior and communication anxiety of residents in disaster areas : survey of residents in Sendai and Morioka Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo Mar. 28, 2012 
37Why don't people do Information Security Behaviors? 社会情報システム学シンポジウム学術講演論文集 Jan. 26, 2012 
382 Proposal of Information Sharing System which tweets Behavior of Information Security 社会情報学会(SSI)学会大会研究発表論文集 2012 
39"Anshin" and anxieties of Twitter users after the 2011 off the Pacific coast of Tohoku Earthquake 研究報告情報セキュリティ心理学とトラスト(SPT) Dec. 19, 2011 
40The actual condition and users' psychology of ICT usage in the event of a major earthquake -The online survey to residents of the Tokyo metropolitan area- 研究報告情報セキュリティ心理学とトラスト(SPT) Dec. 19, 2011 
41A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol IEICE technical report. Life intelligence and office information systems Nov. 14, 2011 
42A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol 電子情報通信学会技術研究報告. LOIS, ライフインテリジェンスとオフィス情報システム = IEICE technical report. LOIS, Life intelligence and office information systems Nov. 7, 2011 
43A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Technical report of IEICE. ISEC Nov. 7, 2011 
44A Study of Security Architecture in Multi-homing VPN Service コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集 Oct. 12, 2011 
45A Study on Constitution of Authentication and AuthorizationFunctions in Information Sharing Systems コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集 Oct. 12, 2011 
46A Consideration of Security Risk in Compromising Hash Function An Exposure of Vulnerability against Information Storage System IEICE technical report Feb. 24, 2011 
47D-9-31 A Proposal of Cryptographic Confirmation Service in HTTPS Proceedings of the IEICE General Conference 2011 
48A Proposal of a Method to Visualize the Safety in HTTPS to Compromising Cryptosystems Problems Proceedings of Annual Conference of Japan Association for Social Informatics 2011 
49RO-004 A Proposal and Evaluation of a Tool to Check Cryptographic Settings in SSL FIT2011 (情報科学技術フォーラム), Sept. 2011 
50A Proposal of a method to Check Cryptographic Algorithms in Security Protocols : A Countermeasure against Compromising of Cryptosystems in SSL IEICE technical report Nov. 10, 2010 
51Sample Investigation and the Consideration to Compromising Cryptosystems in SSL IEICE technical report Nov. 10, 2010 
52Sample Investigation and the Consideration to Compromising Cryptosystems in SSL IEICE technical report Nov. 10, 2010 
53A Proposal of a method to Check Cryptographic Algorithms in Security Protocols : A Countermeasure against Compromising of Cryptosystems in SSL IEICE technical report Nov. 10, 2010 
54RIAS_space : Research Information Accumulation and Sharing space ワークショップ2010 (GN Workshop 2010) 論文集 Sep. 9, 2010 
55A development of the patrimony of the notes in an organization conducting short-term alternation of generations 全国大会講演論文集 Mar. 8, 2010 
56Suggestion about knowledge sharing technique based on documents in the organization 全国大会講演論文集 Mar. 8, 2010 
57The suggestion of a knowledge sharing index based on documents in the research group Proceedings of Annual Conference of Japan Association for Social Informatics 2010 
58A patrimony notes system in an organization of short-term alternation generations ワークショップ2009 (GN Workshop 2009) 論文集 Sep. 10, 2009 
59RM-012 Virtual Private Device : Encryption for Storages 情報科学技術フォーラム講演論文集 Aug. 20, 2009 
60A Proposal of the patrimony of the notes in an organization conducting short-term alternation of generations 全国大会講演論文集 Mar. 10, 2009 
61Consideration of management assistant in a research organization IEICE technical report May. 23, 2008 
62Consideration of management assistant in a research organization IPSJ SIG Notes May. 16, 2008 
63Simulation of User-Behavior using a 2-Dimensional Cellular Automaton for Theme Park Problem Proceedings of Annual Conference of Japan Association for Social Informatics 2007 
64A study of Multi-Homing Group service Architecture : A Consideration of inter-group collision control method IEICE technical report Nov. 9, 2006 
65A study of Multi-Homing Group service Architecture : A Consideration of inter-group collision control method IEICE technical report Nov. 9, 2006 
66A Security Consideration in ID Information Sharing Service IEICE technical report May. 19, 2006 
67A Security Consideration in ID Information Sharing Service 電子情報通信学会技術研究報告. OIS, オフィスインフォメーションシステム May. 12, 2006 
68ID-linker : Towards Remote control technique which uses RFID IEICE technical report May. 12, 2006 
69B-7-176 A Consideration on Notification System with IC Tag for Entering Proceedings of the IEICE General Conference Mar. 8, 2006 
70ID-linker: Remote control technique which uses RFID ワークショップ2005 (GN Workshop 2005) 論文集 Nov. 10, 2005 
71A study on automatic hyperlink generation for cross selling Technical report of IEICE. OFC May. 15, 2001 
72A Study on the Trend and View of the Office Systems Research Technical report of IEICE. OFC Mar. 9, 2001 
73Cyber Shopping Plaza which provide Product Recommendation Function IEICE technical report. Information networks Jan. 12, 2001 
74Cyber Shopping Plaza which provide Product Recommendation Function Technical report of IEICE. OFC Jan. 12, 2001 
75Cyber Shopping Plaza which provide Product Recommendation Function Technical report of IEICE. TM Jan. 5, 2001 
76A Digital Exhibition based on Contents Networking Technology Technical report of IEICE. OFC May. 30, 2000 
77A Digital Exhibition based on Contents Networking Technology Proceedings of the IEICE General Conference Mar. 7, 2000 
78A Contents Distribution System for Digital Library IPSJ SIG Notes Nov. 30, 1999 
79A Contents Distribution System for Digital Library Digital libraries Nov. 1999 
80Contents Distribution and Contents - Mediation System IPSJ SIG Notes Oct. 21, 1999 
81Net - X : A Contents Distribution System based on Information Organizing Technology IPSJ SIG Notes May. 19, 1999 
82Toward Contents Networking System "Net-x" Proceedings of the IEICE General Conference Mar. 8, 1999 
83Performance evaluation of information linking module Fly - fishing IPSJ SIG Notes Jan. 25, 1999 
84Networking Library System : NetLibra JOHO NO KAGAKU TO GIJUTSU 1999 
85Distributed Networking Library : NetLibra 全国大会講演論文集 Oct. 5, 1998 
86Personalized Digital Library System Proceedings of the Society Conference of IEICE Sep. 7, 1998 
87An Information Distribution Method dased on Users' Characteristics 全国大会講演論文集 Mar. 17, 1998 
88Driver's Communication Assistant for Safety and Comfort Driving Proceedings of the IEICE General Conference Mar. 6, 1998 
89Development of Dukas '98 : Driving Environments-based Communication Navigator Proceedings of the Society Conference of IEICE 1998 
90An Information Structuring Method for Communication Navigator IPSJ SIG Notes Nov. 13, 1997 
91A New Framework of Communication Navigator Technical report of IEICE. OFC Sep. 26, 1997 
92A New Framework of Communication Navigator IEICE technical report. Image engineering Sep. 26, 1997 
93A New Framework of Communication Navigator 電気学会研究会資料. CMN, 通信研究会 Sep. 26, 1997 
94A New Framework of Communication Navigator ITE Technical Report 1997 
95Analysis of the Stored Knowledge in a Multi-group Environment Technical report of IEICE. OFC Sep. 17, 1993 
96GoldFISH : Group Oriented Long - term Distribution with FISH IPSJ SIG Notes Aug. 27, 1993 
97A Knowledge - awareness oriented knowledge transfer support environment : CATFISH 情報処理学会研究報告マルチメディア通信と分散処理(DPS) Jan. 29, 1993 
98Analysis of the Stored Knowledge in a Multi-group Environment ITE Technical Report 1993 
99Know - how Management System Extension with Cooperation Process Oriented Design 情報処理学会研究報告マルチメディア通信と分散処理(DPS) Jan. 23, 1992 
100Know-how management system 全国大会講演論文集 Oct. 16, 1989 
101Office Data Models on Clearing Systems 全国大会講演論文集 Sep. 12, 1988 

 

Research Grants & Projects  
No.Offer organizationSystem nameTitleFund classificationDate
1Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Authentication misuse prevention method on application cooperation in SNS use  Apr. 2016 - Mar. 2019