Koji Nakao

Results: 4



#Item
1Technology / Ubiquitous computing / Surveillance / Wireless / Impinj / Clipped tag / Radio-frequency identification / Automatic identification and data capture / Human–computer interaction

3-10 Finding Solution to the Illegal Access in RFID AYOADE John Olurotimi, TAKIZAWA Osamu, and NAKAO Koji In a system where many readers have access to read from and write to a tag, one can fear that ill-intentioned pers

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:30
2Computer architecture / Overlay network / Distributed hash table / Pastry / Routing / Kademlia / Chord / Peer-to-peer / Node / Distributed data storage / Computing / Concurrent computing

2-2 Design and Phase-1 Development of Secure Overlay Networks KADOBAYASHI Youki, NAKAO Koji, and TAKIZAWA Osamu Recently, overlay networks are gaining attention as a means to eliminate single point of failure in the appl

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:55:32
3Medical device / Koji Nakao / Stent / Medical imaging / Medicine / Medical equipment / Medical technology

1 Contribute to Brazilian Medicine with Japanese Medical Devices Koji NAKAO, Chairman The Japan Federation of Medical

Add to Reading List

Source URL: www.jetro.go.jp

Language: English - Date: 2014-08-05 18:48:57
4Computer network security / Science / Statistics / Data analysis / Data mining / Analysis / Threat / Mass spectrometry software / Anomaly detection / Computer security / Data security / Security

2 Technologies for Security of the 2 Internet 2-1 A Study on Process Model for Internet Risk Analysis NAKAO Koji, MARUYAMA Yuko, OHKOUCHI Kazuya, MATSUMOTO Fumiko, and MORIYAMA Eimatsu

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:55:14
UPDATE