Author of the publication

Security-and-Privacy-Related Issues on IT Systems During Disasters.

, , and . CD-ARES, volume 7465 of Lecture Notes in Computer Science, page 445-459. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Miyake, Yutaka
add a person with the name Miyake, Yutaka
 

Other publications of authors with the same name

A Proposal for the Deterrence of Information Leakage Using Anti-virus Software., , , , and . NBiS, page 90-96. IEEE Computer Society, (2013)Web Tracking Site Detection Based on Temporal Link Analysis., , and . AINA Workshops, page 626-631. IEEE Computer Society, (2010)Intrusion Detection for Encrypted Web Accesses., , , , and . AINA Workshops (1), page 569-576. IEEE Computer Society, (2007)Interoperability Testing System of TCP/IP Based Systems in Operational Environment., , , , , and . TestCom, volume 176 of IFIP Conference Proceedings, page 143-. Kluwer, (2000)Remote Attestation for HDD Files Using Kernel Protection Mechanism., , , and . ICC, page 1-6. IEEE, (2010)LSM-Based Secure System Monitoring Using Kernel Protection Schemes., , , , and . ARES, page 591-596. IEEE Computer Society, (2010)On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters., , and . TrustCom, page 1755-1762. IEEE Computer Society, (2012)Privacy Frost: A User-Oriented Data Anonymization Tool., , and . ARES, page 442-447. IEEE Computer Society, (2011)Secure Host Name Resolution Infrastructure for Overlay Networks., , and . IEICE Transactions, 89-B (9): 2434-2439 (2006)Cross-Domain Access Control via PKI., , and . POLICY, page 202-205. IEEE Computer Society, (2002)