Author of the publication

New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.

, , , and . IEICE Transactions, 87-A (1): 182-189 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nakao, Koji
add a person with the name Nakao, Koji
 

Other publications of authors with the same name

A study on cost-effective P2P traffic classification., , , , and . IJCNN, page 1-7. IEEE, (2012)TCP gateway for satellite-based Internet service accommodating multiple subscribers., , , and . WCNC, page 849-854. IEEE, (2002)Implementation and evaluation of SCSE for OSI secure communications., , , and . Systems and Computers in Japan, 25 (9): 17-31 (1994)Integration of Multi-modal Features for Android Malware Detection Using Linear SVM., , , , and . AsiaJCIS, page 141-146. IEEE, (2016)Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet., , , , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 341-349. IEEE, (2016)OC-48c traffic tester for generating and analyzing long-range dependence traffic., , , and . ISCC, page 975-982. IEEE Computer Society, (2002)Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities., , , , and . IEICE Transactions, 92-D (5): 945-954 (2009)An Incident Analysis System NICTER and Its Analysis Engines Based on Data Mining Techniques., , , , , , , and . ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 579-586. Springer, (2008)DAEDALUS-VIZ: novel real-time 3D visualization for darknet monitoring-based alert system., , , , and . VizSEC, page 72-79. ACM, (2012)A study on association rule mining of darknet big data., , , , , and . IJCNN, page 1-7. IEEE, (2015)