Author of the publication

Experimental Research on Personal Awareness and Behavior for Information Security Protection.

, , , , , , and . NBiS, page 213-220. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Inomata, Atsuo
add a person with the name Inomata, Atsuo
 

Other publications of authors with the same name

Uncompressed 4K2K and HD live transmission on global internet., , , , and . SIGGRAPH ASIA Posters, page 28:1. ACM, (2009)Location tracking prevention with dummy messages for vehicular communications., , , , and . ITST, page 56-61. IEEE, (2013)A Secure Cloud-centric IoT Framework for Smart Device Registration., , and . J. Inf. Process., (2021)Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks., , , , and . ICUCT, volume 4412 of Lecture Notes in Computer Science, page 140-149. Springer, (2006)Migrating to Zero Trust Architecture: Reviews and Challenges., , and . Secur. Commun. Networks, (2021)A Proposal of Short Proxy Signature using Pairing., , and . ITCC (1), page 631-635. IEEE Computer Society, (2005)A Two-tier Overlay Publish/Subscribe System for Sensor Data Stream Using Geographic Based Load Balancing., , , and . AINA Workshops, page 749-756. IEEE Computer Society, (2013)Implementation and Evaluation of a Multi-Factor Web Authentication System with Individual Number Card and WebUSB., , and . APNOMS, page 1-4. IEEE, (2019)Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code., , , and . IEEE Access, (2022)On Collecting Onion Server Fingerprints and Identification of Their Operators., , , and . QRS Companion, page 540-548. IEEE, (2023)