Published Papers |
No. | Title | Journal | Vol | No | Start Page | End Page | Publication date | DOI | Referee |
1 | A Method for Smartphone Theft Prevention when the Owner Dozes off | IEICE Transactions on Information and Systems | E102-D | 9 | | | Sep. 2019 | | Refereed |
2 | The Influence of Friend Relationships on Information SecurityBehavior——Investigation on Passwords Sharing among Univer-sity Students | IEICE Transactions | J101-D | 10 | 1438 | 1442 | Oct. 2018 | | Refereed |
3 | A Study of Information Leakage Risk Management Plans for theEmployee’s Twitter Use | IEICE Transactions | J97-D | 12 | 1714 | 1718 | Dec. 2014 | | Refereed |
4 | Risk Assessment of Information Leak in Twitter Use ofEmployee — Experience and Consciousness on Tweet aboutBusiness | IEICE Transactions | J97-D | 12 | 1709 | 1713 | Dec. 2014 | | Refereed |
5 | A Concept of Compromised Cryptographic Check Service on HTTPS for PersonalUsers | IEICE Transactions | J97-D | 5 | 975 | 983 | May. 2014 | | Refereed |
6 | Proposal and Consideration of the Securitter which Tweets Behavior of Information Security | 情報処理学会論文誌 | 55 | 1 | 210 | 220 | Jan. 15, 2014 | | Refereed |
7 | A Study of Home Measures for Children's Safe Internet Use | 情報処理学会論文誌 | 55 | 1 | 311 | 324 | Jan. 15, 2014 | | Refereed |
8 | International Comparative Study of Users' Awareness to Harmful Information on the Internet | 情報処理学会論文誌 | 54 | 4 | 1619 | 1631 | Apr. 15, 2013 | | Refereed |
9 | Risk Assessment of Big Data Relating Service | The Transactions of the Institute of Electronics, Information and Communication Engineers. A | 96 | 4 | 189 | 194 | Apr. 1, 2013 | | Refereed |
10 | 情報セキュリティ行動をツイートする情報共有システムの実装 | 信学技報 | 112 | 466 | 101 | 106 | 2013 | | Not refereed |
11 | 情報セキュリティ行動をツイートする情報共有システムの検討 | 信学技報 | 112 | 466 | 95 | 100 | 2013 | | Not refereed |
12 | Behavior Model of Information Security | 情報処理学会論文誌 | 53 | 9 | 2204 | 2212 | Sep. 15, 2012 | | Refereed |
13 | Construction of Information Security Behavior model-Why don’t people practice security behavior?- | WCSS2012 | | | 12pages | | Sep. 2012 | | Refereed |
14 | A Receiver Controllable Private Key Management Mechanism for Identity-Based Encryption | The IEICE transactions on information and systems (Japanese edetion) | 95 | 5 | 1183 | 1192 | May. 1, 2012 | | Refereed |
15 | ライフログサービスにおけるリスクマネジメントに関する基本検討 | 電子情報通信学会ライフインテリジェンスとオフィス情報システム研究会(LOIS)研究報告 | | | 127 | 132 | May. 2012 | | Not refereed |
16 | A Method to Find Cryptographic Algorithms in Security Protocols ―A Security Measure against Cryptosystem Security Compromises | 情報処理学会論文誌 | 53 | 2 | 474 | 484 | Feb. 15, 2012 | | Refereed |
17 | Proposal and Evaluation of Research Information Expression Technique Based on Document Investigation | Socio-Informatics | 1 | 2 | 49 | 59 | 2012 | https://doi.org/10.14836/ssi.1.2_491 | Refereed |
18 | LEAVES; Legend Enhanced Application Virtual Environment System | 情報処理学会論文誌 | 52 | 1 | 121 | 130 | Jan. 15, 2011 | | Refereed |
19 | 研究グループにおける文献を基にした情報共有指標の考察 | 第17回社会情報システム学シンポジウム学術講演論文集 | | | 73 | 78 | 2011 | | Not refereed |
20 | 暗号危殆化に対するHTTPS暗号確認サービスの提案 | 電子情報通信学会総合大会講演論文集2011年_情報システム(1) | 107 | | 107 | | 2011 | | Not refereed |
21 | 暗号危殆化に対するHTTPS暗号可視化手法の提案 | 日本社会情報学会(JSIS & JASI)合同研究大会研究発表論文集2011年 | 26 | | 335 | 338 | 2011 | https://doi.org/10.14836/jasi.26.0.335.01 | Not refereed |
22 | A Proposal of Dynamic Multi-homing Group Service with Personal Context Information | 情報処理学会論文誌 | 51 | 2 | 575 | 589 | Feb. 15, 2010 | | Refereed |
23 | “研究グループにおける文献を基にした研究情報可視化インタフェースRIAS_spaceの提案” | GNワークショップ2010 | 2010 | | 75 | 80 | 2010 | | Not refereed |
24 | 研究グループにおける文献を基にした知識共有指標の提案 | 2010年日本社会情報学会(JASI & JSIS)合同大会研究発表論文集 | | | 347 | 352 | 2010 | https://doi.org/10.14836/jasi.25.0.347.01 | Not refereed |
25 | 短期的な世代交代のある組織における注記事項伝承システムの構築 | 第72回情報処理学会全国大会 | 5ZG-5 | | | | 2010 | | Not refereed |
26 | 組織における文献を基にした知識共有手法の提案 | 第72回情報処理学会全国大会 | 5ZG-6 | | | | 2010 | | Not refereed |
27 | 短期的な世代交代のある組織における注記事項伝承システムの提案 | グループウェアとネットワークサービスワークショップ2009論文集 | | | 105 | 110 | 2009 | | Not refereed |
28 | 多重帰属グループサービスアーキテクチャの検討―グループ間競合制御方式についての考察― | 電子情報通信学会, 情報セキュリティ研究会, 研究報告 | ISEC2006-89 | 351 | 7 | 12 | Nov. 2006 | | Not refereed |
29 | Fly-fishing - a dynamic linking module | Systems and Computers in Japan | 31 | 7 | 38 | 46 | Jun. 30, 2000 | https://doi.org/10.1002/(SICI)1520-684X(200007)31:7<38::AID-SCJ5>3.0.CO;2-W1 | Refereed |
30 | Development and Evaluation of a Prototype System for Communication Navigator on Driving Environment | The Transactions of the Institute of Electronics,Information and Communication Engineers B | 82 | 11 | 1966 | 1973 | Nov. 25, 1999 | | Refereed |
31 | Dynamic Linking Module Fly-Fishing | The Transactions of the Institute of Electronics,Information and Communication Engineers. | 82 | 9 | 1202 | 1209 | Sep. 25, 1999 | | Refereed |
32 | Networking Library System : NetLibra | The Journal of Information Science and Technology Association | 49 | 10 | 498 | 498 | 1999 | https://doi.org/10.18919/jkg.49.10_4981 | |
33 | Toward networking library systems: NetLibra | NTT Review | 11 | 6 | 61 | 64 | 1999 | | Refereed |
34 | NetLibra: toward advanced digital library systems | NTT R and D | 48 | 6 | 520 | 525 | 1999 | | |
35 | A New Framework of Communication Navigator | ITE Technical Report | 21 | 55 | 25 | 30 | Sep. 26, 1997 | https://doi.org/10.11485/itetr.21.55.0_251 | |
36 | GoldFISH : Group Oriented Long - term Distribution with FISH | IPSJ Journal | 36 | 6 | 1359 | 1366 | Jun. 15, 1995 | | Refereed |
37 | FISH : Flexible Information Sharing and Handling System | The Transactions of the Institute of Electronics,Information and Communication Engineers. | 76 | 6 | 1223 | 1231 | Jun. 25, 1993 | | Refereed |
38 | Analysis of the Stored Knowledge in a Multi-group Environment | ITE Technical Report | 17 | 50 | 1 | 8 | 1993 | https://doi.org/10.11485/tvtr.17.50_11 | |
MISC |
No. | Title | Journal | Vol | No | Start Page | End Page | Publication date |
1 | Consciousness Investigation of Passwords Management in University Students : Questionnaire Design based on Friend Relationships | | 117 | 286 | 7 | 12 | Nov. 9, 2017 |
2 | User Authentication Keeping Method Using Watch Type Devices : Case of Acceleration Sensors | | 117 | 286 | 13 | 18 | Nov. 9, 2017 |
3 | Risks of approval in the SNS using the OAuth authentication | | 116 | 289 | 57 | 62 | Nov. 7, 2016 |
4 | Risk Assessment of Privacy Disclosure in Facebook Use : Privacy Setting and Awareness of the Young Members in Society | | 115 | 27 | 85 | 90 | May. 14, 2015 |
5 | Analysis of Congestion in Sightseeing Spots by using Twitter Logs | | 115 | 27 | 91 | 96 | May. 14, 2015 |
6 | Risk Assessment of Privacy Disclosure in Facebook Use ?Privacy Setting and Awareness of the Young Members in Society? | IPSJ SIG Notes | 2015 | 14 | 1 | 6 | May. 7, 2015 |
7 | Analysis of Congestion in Sightseeing Spots by using Twitter Logs | IPSJ SIG Notes | 2015 | 15 | 1 | 6 | May. 7, 2015 |
8 | Systematic analysis for the decision guidelines in the adoption and operation of BYOD : Contradiction between rules and information security | IEICE technical report. Life intelligence and office information systems | 114 | 150 | 29 | 34 | Jul. 24, 2014 |
9 | A Questionnaire Survey on the Divulging of Information among Twitter Users | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | 30 | | 53 | 109 | Mar. 28, 2014 |
10 | Risk Assessment of Information Leak in Twitter Use of Employee : The Actual Situation and Effectiveness of Company's Measures for Employee Tweets | IEICE technical report. Life intelligence and office information systems | 113 | 479 | 131 | 136 | Mar. 7, 2014 |
11 | Risk Assessment of Information Leak in Twitter Use of Employee : Tweet Experience and Consciousness about Business | IEICE technical report. Life intelligence and office information systems | 113 | 479 | 125 | 130 | Mar. 7, 2014 |
12 | The Difference between the Network Service Categories about Anxieties by Web Investigation | | 2013 | 4 | 239 | 246 | Oct. 14, 2013 |
13 | A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites | IEICE technical report. Life intelligence and office information systems | 113 | 43 | 71 | 78 | May. 16, 2013 |
14 | A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites | | 2013 | 11 | 1 | 8 | May. 9, 2013 |
15 | Teenagers'Usage of Smartphones and Their Exposure to Harmful Information on the Internet : A Questionnaire Survey of Junior/Senior High School Students and Their Parents in Tokyo | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | 29 | | 51 | 104 | Mar. 27, 2013 |
16 | Consideration of Information Sharing System which tweets Behavior of Information Security | | 19 | | 19 | 24 | Jan. 23, 2013 |
17 | Internet Addiction among adolescents by Smartphone usage and its relation to child-parent relationship | | 2013 | | 101 | 106 | 2013 |
18 | Consideration from the Result of Investigation about Anxieties on an Online Game/Auction | | 2012 | 3 | 547 | 554 | Oct. 23, 2012 |
19 | A Study of Parent Focus Group Interviews about Children's Internet Usage | | 2012 | 3 | 450 | 457 | Oct. 23, 2012 |
20 | Consideration from the Result of Investigation about Anxieties on Online Games | | 2012 | 19 | 1 | 8 | Oct. 10, 2012 |
21 | A Study of the Risk Management in Life Log Service | | 2012 | 22 | 1 | 6 | May. 10, 2012 |
22 | A Study of the Risk Management in Life Log Service | | 2012 | 22 | 1 | 6 | May. 10, 2012 |
23 | Why don't people do Information Security Behaviors? | | 18 | | 121 | 126 | Jan. 26, 2012 |
24 | 2 Proposal of Information Sharing System which tweets Behavior of Information Security | | 2012 | | 85 | 90 | 2012 |
25 | Information Behavior and Communication Anxiety of Residents in Disaster Areas : Survey of Residents in Sendai and Morioka | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | 0 | 28 | 1 | 64 | 2012 |
26 | Information Behavior and Communication Anxiety on Twitter after the Great East Japan Earthquake : Web Survey of Twitter Users in the Kanto Region | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | 0 | 28 | 115 | 160 | 2012 |
27 | Information Behavior in Tokyo Metropolitan Area after the Great East Japan Earthquake | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | 0 | 28 | 65 | 113 | 2012 |
28 | The actual condition and users' psychology of ICT usage in the event of a major earthquake -The online survey to residents of the Tokyo metropolitan area- | | 2011 | 2 | 1 | 8 | Dec. 19, 2011 |
29 | "Anshin" and anxieties of Twitter users after the 2011 off the Pacific coast of Tohoku Earthquake | | 2011 | 3 | 1 | 8 | Dec. 19, 2011 |
30 | A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol | IEICE technical report. Life intelligence and office information systems | 111 | 286 | 123 | 128 | Nov. 14, 2011 |
31 | A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol | Technical report of IEICE. ISEC | 111 | 285 | 123 | 128 | Nov. 7, 2011 |
32 | A Study of Security Architecture in Multi-homing VPN Service | | 2009 | | 1 | 6 | Oct. 12, 2011 |
33 | A Study on Constitution of Authentication and AuthorizationFunctions in Information Sharing Systems | | 2009 | | 1 | 6 | Oct. 12, 2011 |
34 | A Consideration of Security Risk in Compromising Hash Function An Exposure of Vulnerability against Information Storage System | IEICE technical report | 110 | 450 | 95 | 100 | Feb. 24, 2011 |
35 | LEAVES : Legend Enhanced Application Virtual Environment System | | 52 | 1 | 121 | 130 | Jan. 2011 |
36 | RO-004 A Proposal and Evaluation of a Tool to Check Cryptographic Settings in SSL | | | | 119 | 126 | 2011 |
37 | A Proposal of a method to Check Cryptographic Algorithms in Security Protocols : A Countermeasure against Compromising of Cryptosystems in SSL | IEICE technical report | 110 | 282 | 73 | 80 | Nov. 10, 2010 |
38 | Sample Investigation and the Consideration to Compromising Cryptosystems in SSL | IEICE technical report | 110 | 282 | 65 | 72 | Nov. 10, 2010 |
39 | A Proposal of Dynamic Multi-homing Group Service with Personal Context Information | | 51 | 2 | 575 | 589 | Feb. 2010 |
40 | RM-012 Virtual Private Device : Encryption for Storages | | 8 | 4 | 87 | 94 | Aug. 20, 2009 |
41 | A Proposal of the patrimony of the notes in an organization conducting short-term alternation of generations | | 71 | | 111 | 112 | Mar. 10, 2009 |
42 | Consideration of management assistant in a research organization | IEICE technical report | 108 | 53 | 43 | 48 | May. 23, 2008 |
43 | Consideration of management assistant in a research organization | IPSJ SIG Notes | 2008 | 48 | 43 | 48 | May. 16, 2008 |
44 | Editor's Message to Special Issue on Networked Services to be Placed in the Social Contexts | IPSJ Journal | 48 | 1 | 1 | 1 | Jan. 15, 2007 |
45 | A Security Consideration in ID Information Sharing Service | IEICE technical report | 106 | 55 | 49 | 54 | May. 19, 2006 |
46 | ID-linker : Towards Remote control technique which uses RFID | IEICE technical report | 106 | 55 | 1 | 6 | May. 12, 2006 |
47 | B-7-176 A Consideration on Notification System with IC Tag for Entering | Proceedings of the IEICE General Conference | 2006 | 2 | 272 | 272 | Mar. 8, 2006 |
48 | ID-linker: Remote control technique which uses RFID | | 2005 | | 7 | 12 | Nov. 10, 2005 |
49 | A study on automatic hyperlink generation for cross selling | Technical report of IEICE. OFC | 101 | 43 | 19 | 24 | May. 15, 2001 |
50 | A Study on the Trend and View of the Office Systems Research | Technical report of IEICE. OFC | 100 | 679 | 1 | 6 | Mar. 9, 2001 |
51 | Cyber Shopping Plaza which provide Product Recommendation Function | Technical report of IEICE. OFC | 100 | 540 | 7 | 12 | Jan. 12, 2001 |
52 | A Digital Exhibition based on Contents Networking Technology | Technical report of IEICE. OFC | 100 | 102 | 29 | 34 | May. 30, 2000 |
53 | A Digital Exhibition based on Contents Networking Technology | Proceedings of the IEICE General Conference | 2000 | 1 | 141 | 141 | Mar. 7, 2000 |
54 | A Contents Distribution System for Digital Library | IPSJ SIG Notes | 1999 | 102 | 81 | 89 | Nov. 30, 1999 |
55 | A Contents Distribution System for Digital Library | Digital libraries | 16 | | 60 | 68 | Nov. 1999 |
56 | Contents Distribution and Contents - Mediation System | IPSJ SIG Notes | 1999 | 88 | 57 | 62 | Oct. 21, 1999 |
57 | Net - X : A Contents Distribution System based on Information Organizing Technology | IPSJ SIG Notes | 1999 | 40 | 5 | 10 | May. 19, 1999 |
58 | Toward Contents Networking System "Net-x" | Proceedings of the IEICE General Conference | 1999 | 1 | 196 | 196 | Mar. 8, 1999 |
59 | Performance evaluation of information linking module Fly - fishing | IPSJ SIG Notes | 1999 | 7 | 1 | 6 | Jan. 25, 1999 |
60 | Distributed Networking Library : NetLibra | | 57 | | 1 | 2 | Oct. 5, 1998 |
61 | Personalized Digital Library System | Proceedings of the Society Conference of IEICE | 1998 | | 104 | 104 | Sep. 7, 1998 |
62 | An Information Distribution Method dased on Users' Characteristics | | 56 | | 85 | 86 | Mar. 17, 1998 |
63 | Driver's Communication Assistant for Safety and Comfort Driving | Proceedings of the IEICE General Conference | 1998 | | 351 | 351 | Mar. 6, 1998 |
64 | Development of Dukas '98 : Driving Environments-based Communication Navigator | Proceedings of the Society Conference of IEICE | | | 66 | 67 | 1998 |
65 | An Information Structuring Method for Communication Navigator | IPSJ SIG Notes | 1997 | 105 | 1 | 6 | Nov. 13, 1997 |
66 | GoldFISH : Group Oriented Long - term Distribution with FISH | IPSJ SIG Notes | 1993 | 75 | 17 | 24 | Aug. 27, 1993 |
67 | A Knowledge - awareness oriented knowledge transfer support environment : CATFISH | | 1993 | 12 | 57 | 64 | Jan. 29, 1993 |
68 | Analysis of the Stored Knowledge on FISH | Technical report of IEICE. OFC | | | OFS92 | 2 | 1993 |
69 | Know - how Management System Extension with Cooperation Process Oriented Design | | 1992 | 6 | 23 | 30 | Jan. 23, 1992 |
70 | Know-how management system | | 39 | | 2205 | 2206 | Oct. 16, 1989 |
71 | Office Data Models on Clearing Systems | | 37 | | 1330 | 1331 | Sep. 12, 1988 |
Conference Activities & Talks |
No. | Title | Conference | Publication date | Promoter | Venue |
1 | User Authentication Keeping Method Using Watch Type Devices : Case of Acceleration Sensors | 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 | Nov. 9, 2017 | | |
2 | Consciousness Investigation of Passwords Management in University Students : Questionnaire Design based on Friend Relationships | 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 | Nov. 9, 2017 | | |
3 | Risk Assessment for PrivacyProtection of Information Literacy Beginners in Big Data Era | The 20th International Conference on Network-Based InformationSystems (NBiS-2017), Advances in Network-Based InformationSystems, The 11 International Workshop on Advanced Distributedand Parallel Network Applications (ADPNA-2017) | Aug. 24, 2017 | | |
4 | Risks of approval in the SNS using the OAuth authentication | 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 | Nov. 7, 2016 | | |
5 | Risk assessment quantification of social-media utilization in enterprise | 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings | Aug. 23, 2016 | | |
6 | Risk assessment of social-media utilization in an enterprise | 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015 - Proceedings | Aug. 3, 2015 | | |
7 | Risk Assessment of Privacy Disclosure in Facebook Use : Privacy Setting and Awareness of the Young Members in Society | 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 | May. 14, 2015 | | |
8 | Analysis of Congestion in Sightseeing Spots by using Twitter Logs | 電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 | May. 14, 2015 | | |
9 | Analysis of Congestion in Sightseeing Spots by using Twitter Logs | IPSJ SIG Notes | May. 7, 2015 | | |
10 | Risk Assessment of Privacy Disclosure in Facebook Use ?Privacy Setting and Awareness of the Young Members in Society? | IPSJ SIG technical reports | May. 7, 2015 | | |
11 | Analysis of Congestion in Sightseeing Spots by using Twitter Logs | IPSJ SIG technical reports | May. 7, 2015 | | |
12 | Risk Assessment of Privacy Disclosure in Facebook Use ?Privacy Setting and Awareness of the Young Members in Society? | IPSJ SIG Notes | May. 7, 2015 | | |
13 | Systematic analysis for the decision guidelines in the adoption and operation of BYOD : Contradiction between rules and information security | IEICE technical report. Life intelligence and office information systems | Jul. 24, 2014 | | |
14 | A Questionnaire Survey on the Divulging of Information among Twitter Users | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | Mar. 28, 2014 | | |
15 | Risk Assessment of Information Leak in Twitter Use of Employee : Tweet Experience and Consciousness about Business | IEICE technical report. Life intelligence and office information systems | Mar. 7, 2014 | | |
16 | Risk Assessment of Information Leak in Twitter Use of Employee : The Actual Situation and Effectiveness of Company's Measures for Employee Tweets | IEICE technical report. Life intelligence and office information systems | Mar. 7, 2014 | | |
17 | A study of risk assessment quantification in cloud computing | Proceedings - 2014 International Conference on Network-Based Information Systems, NBiS 2014 | Jan. 26, 2014 | | |
18 | The Difference between the Network Service Categories about Anxieties by Web Investigation | コンピュータセキュリティシンポジウム2013論文集 | Oct. 14, 2013 | | |
19 | A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites | IEICE technical report. Life intelligence and office information systems | May. 16, 2013 | | |
20 | A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites | 研究報告セキュリティ心理学とトラスト(SPT) | May. 9, 2013 | | |
21 | A Consideration to the Results of an Investigation about Anxieties on Image Sharing Sites | 研究報告グループウェアとネットワークサービス(GN) | May. 9, 2013 | | |
22 | Teenagers'Usage of Smartphones and Their Exposure to Harmful Information on the Internet : A Questionnaire Survey of Junior/Senior High School Students and Their Parents in Tokyo | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | Mar. 27, 2013 | | |
23 | Implementation of Information Sharing System which tweets Behavior of Information Security | IEICE technical report. Life intelligence and office information systems | Mar. 7, 2013 | | |
24 | Investigation of Information Sharing System which tweets Behavior of Information Security | IEICE technical report. Life intelligence and office information systems | Mar. 7, 2013 | | |
25 | Consideration of Information Sharing System which tweets Behavior of Information Security | 社会情報システム学シンポジウム学術講演論文集 | Jan. 23, 2013 | | |
26 | Internet Addiction among adolescents by Smartphone usage and its relation to child-parent relationship | 社会情報学会(SSI)学会大会研究発表論文集 | 2013 | | |
27 | A Study of Parent Focus Group Interviews about Children's Internet Usage | コンピュータセキュリティシンポジウム2012論文集 | Oct. 23, 2012 | | |
28 | Consideration from the Result of Investigation about Anxieties on an Online Game/Auction | コンピュータセキュリティシンポジウム2012論文集 | Oct. 23, 2012 | | |
29 | Consideration from the Result of Investigation about Anxieties on Online Games | 研究報告デジタルコンテンツクリエーション(DCC) | Oct. 10, 2012 | | |
30 | Consideration from the Result of Investigation about Anxieties on Online Games | 研究報告コンシューマ・デバイス&システム(CDS) | Oct. 10, 2012 | | |
31 | A Study of the Risk Management in Life Log Service | 研究報告グループウェアとネットワークサービス(GN) | May. 10, 2012 | | |
32 | A Study of the Risk Management in Life Log Service | 研究報告情報セキュリティ心理学とトラスト(SPT) | May. 10, 2012 | | |
33 | A Study of the Risk Management in Life Log Service | IEICE technical report. Life intelligence and office information systems | May. 10, 2012 | | |
34 | Information behavior and communication anxiety on Twitter after the Great East Japan Earthquake : Web survey of Twitter user in Kanto Region | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | Mar. 28, 2012 | | |
35 | Information behavior and communication anxiety of residents in disaster areas : survey of residents in Sendai and Morioka | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | Mar. 28, 2012 | | |
36 | Information behavior in Tokyo Metropolitan Area after the Great East Japan Earthquake | Research survey reports in information studies interfaculty initiative in information studies, the University of Tokyo | Mar. 28, 2012 | | |
37 | Why don't people do Information Security Behaviors? | 社会情報システム学シンポジウム学術講演論文集 | Jan. 26, 2012 | | |
38 | 2 Proposal of Information Sharing System which tweets Behavior of Information Security | 社会情報学会(SSI)学会大会研究発表論文集 | 2012 | | |
39 | "Anshin" and anxieties of Twitter users after the 2011 off the Pacific coast of Tohoku Earthquake | 研究報告情報セキュリティ心理学とトラスト(SPT) | Dec. 19, 2011 | | |
40 | The actual condition and users' psychology of ICT usage in the event of a major earthquake -The online survey to residents of the Tokyo metropolitan area- | 研究報告情報セキュリティ心理学とトラスト(SPT) | Dec. 19, 2011 | | |
41 | A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol | IEICE technical report. Life intelligence and office information systems | Nov. 14, 2011 | | |
42 | A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol | 電子情報通信学会技術研究報告. LOIS, ライフインテリジェンスとオフィス情報システム = IEICE technical report. LOIS, Life intelligence and office information systems | Nov. 7, 2011 | | |
43 | A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol | Technical report of IEICE. ISEC | Nov. 7, 2011 | | |
44 | A Study of Security Architecture in Multi-homing VPN Service | コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集 | Oct. 12, 2011 | | |
45 | A Study on Constitution of Authentication and AuthorizationFunctions in Information Sharing Systems | コンピュータセキュリティシンポジウム2009 (CSS2009) 論文集 | Oct. 12, 2011 | | |
46 | A Consideration of Security Risk in Compromising Hash Function An Exposure of Vulnerability against Information Storage System | IEICE technical report | Feb. 24, 2011 | | |
47 | D-9-31 A Proposal of Cryptographic Confirmation Service in HTTPS | Proceedings of the IEICE General Conference | 2011 | | |
48 | A Proposal of a Method to Visualize the Safety in HTTPS to Compromising Cryptosystems Problems | Proceedings of Annual Conference of Japan Association for Social Informatics | 2011 | | |
49 | RO-004 A Proposal and Evaluation of a Tool to Check Cryptographic Settings in SSL | FIT2011 (情報科学技術フォーラム), Sept. | 2011 | | |
50 | Sample Investigation and the Consideration to Compromising Cryptosystems in SSL | IEICE technical report | Nov. 10, 2010 | | |
51 | A Proposal of a method to Check Cryptographic Algorithms in Security Protocols : A Countermeasure against Compromising of Cryptosystems in SSL | IEICE technical report | Nov. 10, 2010 | | |
52 | Sample Investigation and the Consideration to Compromising Cryptosystems in SSL | IEICE technical report | Nov. 10, 2010 | | |
53 | A Proposal of a method to Check Cryptographic Algorithms in Security Protocols : A Countermeasure against Compromising of Cryptosystems in SSL | IEICE technical report | Nov. 10, 2010 | | |
54 | RIAS_space : Research Information Accumulation and Sharing space | ワークショップ2010 (GN Workshop 2010) 論文集 | Sep. 9, 2010 | | |
55 | A development of the patrimony of the notes in an organization conducting short-term alternation of generations | 全国大会講演論文集 | Mar. 8, 2010 | | |
56 | Suggestion about knowledge sharing technique based on documents in the organization | 全国大会講演論文集 | Mar. 8, 2010 | | |
57 | The suggestion of a knowledge sharing index based on documents in the research group | Proceedings of Annual Conference of Japan Association for Social Informatics | 2010 | | |
58 | A patrimony notes system in an organization of short-term alternation generations | ワークショップ2009 (GN Workshop 2009) 論文集 | Sep. 10, 2009 | | |
59 | RM-012 Virtual Private Device : Encryption for Storages | 情報科学技術フォーラム講演論文集 | Aug. 20, 2009 | | |
60 | A Proposal of the patrimony of the notes in an organization conducting short-term alternation of generations | 全国大会講演論文集 | Mar. 10, 2009 | | |
61 | Consideration of management assistant in a research organization | IEICE technical report | May. 23, 2008 | | |
62 | Consideration of management assistant in a research organization | IPSJ SIG Notes | May. 16, 2008 | | |
63 | Simulation of User-Behavior using a 2-Dimensional Cellular Automaton for Theme Park Problem | Proceedings of Annual Conference of Japan Association for Social Informatics | 2007 | | |
64 | A study of Multi-Homing Group service Architecture : A Consideration of inter-group collision control method | IEICE technical report | Nov. 9, 2006 | | |
65 | A study of Multi-Homing Group service Architecture : A Consideration of inter-group collision control method | IEICE technical report | Nov. 9, 2006 | | |
66 | A Security Consideration in ID Information Sharing Service | IEICE technical report | May. 19, 2006 | | |
67 | A Security Consideration in ID Information Sharing Service | 電子情報通信学会技術研究報告. OIS, オフィスインフォメーションシステム | May. 12, 2006 | | |
68 | ID-linker : Towards Remote control technique which uses RFID | IEICE technical report | May. 12, 2006 | | |
69 | B-7-176 A Consideration on Notification System with IC Tag for Entering | Proceedings of the IEICE General Conference | Mar. 8, 2006 | | |
70 | ID-linker: Remote control technique which uses RFID | ワークショップ2005 (GN Workshop 2005) 論文集 | Nov. 10, 2005 | | |
71 | A study on automatic hyperlink generation for cross selling | Technical report of IEICE. OFC | May. 15, 2001 | | |
72 | A Study on the Trend and View of the Office Systems Research | Technical report of IEICE. OFC | Mar. 9, 2001 | | |
73 | Cyber Shopping Plaza which provide Product Recommendation Function | Technical report of IEICE. OFC | Jan. 12, 2001 | | |
74 | Cyber Shopping Plaza which provide Product Recommendation Function | IEICE technical report. Information networks | Jan. 12, 2001 | | |
75 | Cyber Shopping Plaza which provide Product Recommendation Function | Technical report of IEICE. TM | Jan. 5, 2001 | | |
76 | A Digital Exhibition based on Contents Networking Technology | Technical report of IEICE. OFC | May. 30, 2000 | | |
77 | A Digital Exhibition based on Contents Networking Technology | Proceedings of the IEICE General Conference | Mar. 7, 2000 | | |
78 | A Contents Distribution System for Digital Library | IPSJ SIG Notes | Nov. 30, 1999 | | |
79 | A Contents Distribution System for Digital Library | Digital libraries | Nov. 1999 | | |
80 | Contents Distribution and Contents - Mediation System | IPSJ SIG Notes | Oct. 21, 1999 | | |
81 | Net - X : A Contents Distribution System based on Information Organizing Technology | IPSJ SIG Notes | May. 19, 1999 | | |
82 | Toward Contents Networking System "Net-x" | Proceedings of the IEICE General Conference | Mar. 8, 1999 | | |
83 | Performance evaluation of information linking module Fly - fishing | IPSJ SIG Notes | Jan. 25, 1999 | | |
84 | Networking Library System : NetLibra | JOHO NO KAGAKU TO GIJUTSU | 1999 | | |
85 | Distributed Networking Library : NetLibra | 全国大会講演論文集 | Oct. 5, 1998 | | |
86 | Personalized Digital Library System | Proceedings of the Society Conference of IEICE | Sep. 7, 1998 | | |
87 | An Information Distribution Method dased on Users' Characteristics | 全国大会講演論文集 | Mar. 17, 1998 | | |
88 | Driver's Communication Assistant for Safety and Comfort Driving | Proceedings of the IEICE General Conference | Mar. 6, 1998 | | |
89 | Development of Dukas '98 : Driving Environments-based Communication Navigator | Proceedings of the Society Conference of IEICE | 1998 | | |
90 | An Information Structuring Method for Communication Navigator | IPSJ SIG Notes | Nov. 13, 1997 | | |
91 | A New Framework of Communication Navigator | IEICE technical report. Image engineering | Sep. 26, 1997 | | |
92 | A New Framework of Communication Navigator | 電気学会研究会資料. CMN, 通信研究会 | Sep. 26, 1997 | | |
93 | A New Framework of Communication Navigator | Technical report of IEICE. OFC | Sep. 26, 1997 | | |
94 | A New Framework of Communication Navigator | ITE Technical Report | 1997 | | |
95 | Analysis of the Stored Knowledge in a Multi-group Environment | Technical report of IEICE. OFC | Sep. 17, 1993 | | |
96 | GoldFISH : Group Oriented Long - term Distribution with FISH | IPSJ SIG Notes | Aug. 27, 1993 | | |
97 | A Knowledge - awareness oriented knowledge transfer support environment : CATFISH | 情報処理学会研究報告マルチメディア通信と分散処理(DPS) | Jan. 29, 1993 | | |
98 | Analysis of the Stored Knowledge in a Multi-group Environment | ITE Technical Report | 1993 | | |
99 | Know - how Management System Extension with Cooperation Process Oriented Design | 情報処理学会研究報告マルチメディア通信と分散処理(DPS) | Jan. 23, 1992 | | |
100 | Know-how management system | 全国大会講演論文集 | Oct. 16, 1989 | | |
101 | Office Data Models on Clearing Systems | 全国大会講演論文集 | Sep. 12, 1988 | | |