Yoshimi Teshigawara

According to our database1, Yoshimi Teshigawara authored at least 18 papers between 1976 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancement of a Company-Wide Information Security Management System Through Incident Learning.
SN Comput. Sci., May, 2023

2016
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

2015
Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation.
Proceedings of the Fourth International Conference on Cyber Security, 2015

2013
A Threat Model for Security Specification in Security Evaluation by ISO/IEC 19791.
J. Inf. Process., 2013

2011
A method for calculating system similarity for the evaluation of practical accomplishments in person-in-charge allocation support.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2011

2010
Security Guideline Tool for Home Users Based on International Standards.
Inf. Manag. Comput. Secur., 2010

A Security Measure Selection Scheme with Consideration of Potential Lawsuits.
Proceedings of the 2010 International Conference on Security & Management, 2010

A Study on Sensor Multiplicity in Optical Fiber Sensor Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Optical Fiber Sensor Network Integrating Communication and Sensing Functions Using Hetero-core Spliced Fiber Optic Sensors.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Knowledge-Based Tool to Support Clear Relationship between Threats and Countermeasures Based on International Standards.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones.
Proceedings of the Information Modelling and Knowledge Bases XIX, 2007

2006
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2005
A Study of Security Policy Making Adaptable to Users' Environments Based on International Standards.
Proceedings of the 4th Latin American Network Operations and Management Symposium, 2005

2004
Development and Evaluation of a Minutes System Focusing on Importance in a Meeting.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Design of a Development Environment for Web-based Asynchronous and Synchronous Integrated Groupware Systems.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

1996
LAN fault management ensemble.
Proceedings of the 1996 Network Operations and Management Symposium, 1996

1978
Delay and Throughput Evaluation of Switching Methods in Computer Communication Networks.
IEEE Trans. Commun., 1978

1976
Computer networks in Japan.
Comput. Commun. Rev., 1976


  Loading...