Author of the publication

A Security Measure Selection Scheme with Consideration of Potential Lawsuits.

, , , , , and . Security and Management, page 104-110. CSREA Press, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Measure Selection Scheme with Consideration of Potential Lawsuits., , , , , and . Security and Management, page 104-110. CSREA Press, (2010)A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones., and . WISA, volume 4298 of Lecture Notes in Computer Science, page 225-236. Springer, (2006)A Personal Information Protection Model for Web Applications by Utilizing Mobile Phones., , , and . EJC, volume 166 of Frontiers in Artificial Intelligence and Applications, page 346-353. IOS Press, (2007)A threat model for security specification in security evaluation by ISO/IEC 19791., and . APNOMS, page 1-8. IEEE, (2012)LAN fault management ensemble., , , and . NOMS, page 540-551. IEEE, (1996)A Study on Sensor Multiplicity in Optical Fiber Sensor Networks., , , , , and . AINA, page 519-525. IEEE Computer Society, (2010)Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its Evaluation., , and . CyberSec, page 46-51. IEEE Computer Society, (2015)Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks., , , , , , , and . HCI (20), volume 9750 of Lecture Notes in Computer Science, page 77-88. Springer, (2016)A method for calculating system similarity for the evaluation of practical accomplishments in person-in-charge allocation support., , and . SoMeT, volume 231 of Frontiers in Artificial Intelligence and Applications, page 127-140. IOS Press, (2011)A Threat Model for Security Specification in Security Evaluation by ISO/IEC 19791., and . J. Inf. Process., 21 (4): 624-631 (2013)