ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

Size: px
Start display at page:

Download "ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策"

Transcription

1 IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... hidemitsu.izawa@boj.or.jp katsuhisa.hirokawa@boj.or.jp / /

2 1. IC 34 IC EMVCo [2015] 1 IC 2014 IC IC EMV 1 EMV IC IC 1 IC IC 2 IC Bond et al. [2014] Pre-play attack ATM 3 Pre-play attack BBC [2012] IC... 1 EuroPay International Mastercard International Visa International IC 3 2 Message Authentication Code 3 IC IC 54 /

3 IC Pre-play attack IC IC Pre-play attack 2 EMV 3 Pre-play attack 4 5 EMV 2. EMV IC EMV EMVCo [2011a, b, c, d] IC EMV IC IC EMV IC 1 IC IC 1 IC 55

4 PIN 4 PIN ATM CAT 5 EMV IC EMV IC 2 EMV EMV 3 SDA: Static Data Authentication DDA: Dynamic Data Authentication AC CDA: Combined DDA/Application Cryptogram Generation 3 EMV SDA PIN PIN 3 PIN PIN 6 PIN 7 PIN PIN PIN PIN... 4 Personal Identification Number 5 Credit Authorization Terminal POS Point-Of-Sale 6 PIN 7 PIN PIN PIN Try Counter PIN PIN 56 /

5 IC Pre-play attack 3 3 EMV EMV AC AC Application Cryptogram EMV Triple DES AES AC AC MAC key key 8 AC 2 4 AC AC MAC key AC AC AC AC AC AC 2 EMV... 8EMV 57

6 4 EMV EMV EMV AC 4 EMV EMV EMV UN UN UN EMV ATC ARQC ARQC ARQC EMV AC AC Replay attack: 10 AC ATC AC... 9EMV 10 EMV ARQC 58 /

7 IC Pre-play attack AC 3 EMV Step1. Unpredictable Number UN UN Step2 AC Step2. Application Transaction Counter ATC AC AC Authorisation Request Cryptogram ARQC ATC ATC Step3. ARQC ATC Step4. ARQC Authorisation Response Code ARC ARC ARQC Application Response Cryptogram ARPC EMV ARQC ARQC 12 EMV 59

8 Step5. ARPC ARC Step6. ARPC 13 Transaction Certificate TC TC AC ATC ARC Step7. TC TC 4 EMV 3. Pre-play attack EMV IC Bond et al. [2014] Bond et al. [2014] Pre-play attack Pre-play attack Replay attack Replay attack Step2 ARQC ARC ARPC ARPC 60 /

9 IC Pre-play attack Pre-play attack 1 Pre-play attack Bond et al. [2014] 2 Random number attack Defective random number generators poor UN generation Protocol flaw attack 1. IC Bond et al. [2014] 2. PIN Bond et al. [2014] SDA 61

10 5. PIN PIN Random number attack Random number attack UN EMV UN 32 bit UN UN UN ARQC UN ARQC 5 62 /

11 IC Pre-play attack 5 Random number attack Step1. PIN Step2. UN Step1 Step2 UN Step3. PIN Step4. UN ARQC ATC UN Step2 Step5. Step4 UN UN ARQC Step3 Step6. UN ARQC Step7. PIN Step4 Step8. UN 63

12 UN 1 UN1 Step9 Step9. UN1 UN ARQC UN1 ARQC ARQC1 ARQC1 ARQC1 Step10. ARQC1 1 ARPC ARC TC 3 Protocol flaw attack Protocol flaw attack UN ARQC 6 64 /

13 IC Pre-play attack 6 Protocol flaw attack Step1. PIN Step2. UN UN1 1 Step3. 1 ARQC ARQC1 Step4. 1 ARQC1 Step1 Step5. PIN Step6. 2 Step7. Step6 2 Step6 Step8. 2 Step6 Step4 1 ARQC1 ARQC Step5 65

14 Step9. ARPC ARC TC 4. Pre-play attack Pre-play attack 1 Pre-play attack. UN A UN UN ARQC Step9 ARQC ARQC. B EMV EMV EMV EMV 66 /

15 IC Pre-play attack 7 EMV EMV 2 Pre-play attack Pre-play attack A B Bond et al. [2014]. UN A UN EMVCo [2014] UN SHA

16 . ATC ARQC ATC ATC ARQC ATC ATC ARQC ATC ATC ATC. TC TC 3 Step3 ARQC Step7 TC TC 14 TC TC 5 Step10 6 Step9 TC IC TC Step3 ARQC TC TC 68 /

17 IC Pre-play attack Bond et al. [2014]. UN UN A UN 2 UN Step3 UN A UN. ARQC ARQC ARQC EMV ARQC MAC key UN ARQC ARQC hh mm ss MAC key UN ARQC ARQC RFC6238 M Raihi et al. [2011] TOTP: Time-Based One-Time Password Algorithm 1 EMV 69

18 . ARQC 15 ARQC ARQC ARQC ARQC ATC MAC key ATC ARQC 16 ARQC RFC4226 M Raihi et al. [2005] HOTP: an HMAC-Based One-Time Password Algorithm UN ARQC 1 1 EMV EMV ATC ATC AAC AC ATC ATC EMV ATC ATC 16 ARQC 1 70 /

19 IC Pre-play attack. ARQC ARQC EMV ATC ATC ARQC ARQC ATC ATC ATC ATC MAC key ATC ATC ATC ATC ARQC ATC ATC ATC ATC EMV Last Online ATC Register ATC EMV ATC Step6 ATC ATC ATC ATC ATC 2 ATC ARQC ATC ATC ATC ATC AAC AC ATC AAC ATC 1 EMV. UN B UN 71

20 UN UN ARQC ARQC EMV UN UN ARQC. 2 8 UN EMV EMV 5. EMV IC Pre-play attack Random number attack Protocol flaw attack 2 IC IC IC IC UN 72 /

21 IC Pre-play attack 8 Pre-play attack EMV EMV EMV EMV Pre-play attack Bond et al. [2014] UN ATC TC UN

22 IC EMV IC Bond et al. [2014] ATM ATM ATM 74 /

23 IC Pre-play attack IC BBC, Chip and pin weakness exposed by Cambridge researchers, BBC News technology, 2012 ( Bond, Mike, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, and Ross Anderson, Chip and Skim: cloning EMV cards with the pre-play attack, IEEE Symposium on Security and Privacy, 2014, pp EMVCo, Book 1 Application Independent ICC to Terminal Interface Requirements, EMV Integrated Circuit Card Specifications for Payment Systems, Version 4.3, EMVCo, 2011a., Book 2 Security and Key Management, EMV Integrated Circuit Card Specifications for Payment Systems, Version 4.3, EMVCo, 2011b., Book 3 Application Specification, EMV Integrated Circuit Card Specifications for Payment Systems, Version 4.3, EMVCo, 2011c., Book 4 Cardholder, Attendant, and Acquirer Interface Requirements, EMV Integrated Circuit Card Specifications for Payment Systems, Version 4.3, EMVCo, 2011d., SB-144: Terminal Unpredictable Number generation (Spec Change), Specification Bulletin 1st Edition, EMVCo, 2014., Worldwide EMV Chip Card Deployment and Adoption, Worldwide EMV Deployment Statistics, EMVCo, 2015 ( EMV_Deployment_Stats.pdf). M Raihi, David, Mihir Bellare, Frank Hoornaert, David Naccache, and Ohad Ranen, HOTP: An HMAC-Based One-Time Password Algorithm, IETF, RFC 4226, 2005., Salah Machani, Mingliang Pei, and Johan Rydell, TOTP: Time-Based One-Time Password Algorithm, IETF, RFC 6238,

24 EMV EMV IC IC EuroPay International Mastercard International Visa International PIN Personal Identification Number SDA Static Data Authentication AC Application Cryptogram MAC key AC MAC key EMV AC ARQC Authorisation Request Cryptogram AAC Application Authentication Cryptogram TC Transaction Certificate 3 ARQC Authorisation Request Cryptogram AC ATC ARQC=MAC key ATC TC Transaction Certificate AC ATC ARC TC= MAC key ATC ARC 76 /

25 IC Pre-play attack UN ATC ARC ARPC Unpredictable Number 32 bit UN EMV UN AC ATC ATC UN ATC UN Application Transaction Counter 1 ATC UN AC UN ATC Authorisation Response Code Application Response Cryptogram ARQC ARQC ARC XOR Triple DES AES 77

26 78 /

ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策

ICカード利用システムにおいて新たに顕現化した中間者攻撃とその対策 IC IC EMV EMV ICIC IC IC EMV IC EMV IC... E-mail: masataka.suzuki@boj.or.jp E-mail: katsuhisa.hirokawa@boj.or.jp E-mail: k-kobara@aist.go.jp //2012.7 107 1 IC EMV 1 EMV EMVCo IC 36% 10 IC 65% 1,540 2009

More information

リテール・バンキング・システムのICカード対応に関する現状とその課題

リテール・バンキング・システムのICカード対応に関する現状とその課題 IC IC IC ATM IC IC ATM IC IC IC IC E-mail: yuuko.tamura@boj.or.jp E-mail: hirokawa@imes.boj.or.jp IC IC MS IC IC IC IC IC IC IC MS IC IC IC IC IC ICIC ICATM ATMIC IC IC ATMMS IC MS IC IC IC IC ATM IC ICIC

More information

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策 IMES DISCUSSION PAPER SERIES IC カード利用システムにおいて新たに顕現化した Pre-play attack とその対策 いざわひでみつひろかわかつひさ 廣川勝久 井澤秀益 Discussion Paper No. 2015-J-10 INSTITUTE FOR MONETARY AND ECONOMIC STUDIES BANK OF JAPAN 日本銀行金融研究所

More information

サイドチャネル攻撃に対する安全性評価の研究動向とEMVカード固有の留意点

サイドチャネル攻撃に対する安全性評価の研究動向とEMVカード固有の留意点 EMV IC IC 20 IC EMV IC EMV IC EMV... E-mail: masataka.suzuki@boj.or.jp E-mail: Sugawara.Takeshi@bp.MitsubishiElectric.co.jp E-mail: Suzuki.Daisuke@bx.MitsubishiElectric.co.jp / /2015.10 107 1. IC 2011

More information

No.7, (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit

No.7, (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit No.7,321-332 (2006) 2 Electronic Funds Transfer as the Foundation of the Monetary Value of Electronic Money - A Study on the JBA 1 Integrated Circuit Cash Card Standard Specifications (Second Edition)

More information

ICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に

ICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に IC IC IC ICIC EMVEMV IC EMVIC EMV ICEMVRSAkey TDES TDES-MAC E-mail: masataka.suzuki@boj.or.jp NTTE-mail: kanda.masayuki@lab.ntt.co.jp IC IC IC IC EMV JCCA ICJCCA ICEMV EMVIC EMV EMV EMVEMVCo EMV EMV EMVICIC

More information

1.0 15 2 10

1.0 15 2 10 1.0 15 2 10 1... 3 2... 4 3 DSRC... 5 3.1... 5 3.2... 6 3.2.1 EMV 2 EMV 1... 6 3.2.2... 6 3.2.3 PIN... 6 3.2.4... 6 3.2.5 I/F... 6 3.2.6 ICCR/W... 6 3.2.7 HMI... 6 3.3 DSRC... 7 3.4... 8 3.4.1... 8 3.4.2...

More information

4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5

4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5 No.5, 185-196 (2004) Conformity to the next-generation currency seen from a Electronic money classification : OSHIMA Kazuchika Nihon University, Graduate School of Social and Cultural Studies Internet

More information

電子マネーと通信産業の戦略

電子マネーと通信産業の戦略 No.7, 55-65 (2006) Vision of Electronic Money Card Distribution Plans in Japan - Discussion of the and Credit Card Distribution Plans - OSHIMA Kazuchika Nihon University, Graduate School of Social and

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション 第 14 回 情 報 セキュリティ シンポジウム 多 様 化 するリテール 取 引 の 安 全 性 モバイル 化 を 支 える 情 報 セキュリティ 技 術 を 中 心 に - 講 演 1- リテール 取 引 システムにおける ICキャッシュカード 機 能 の 活 用 と 将 来 の 発 展 2012-12-20 日 本 銀 行 金 融 研 究 所 情 報 技 術 研 究 センター テクニカル アドバイザー

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs

IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPs IPSEC VPN IPSEC-VPN IPsec(Security Architecture for Internet Protocol) IP SA(Security Association, ) SA IKE 1 2 2 IKE 1 1 ISAKMP SA( ) IKE 2 2 IPSec SA( 1 ) IPsec SA IKE Initiator Responder IPsec-VPN ISAKMP

More information

中田真佐男 323‐352/323‐352

中田真佐男 323‐352/323‐352 IT FinTech Finance Technology e SNS (AI) (2013) (2015) ATM IC EMV VISA MasterJCB VISA Master (Union Pay) VISA Master JCB J-Debit J-Debit VISA IC Alipay QR POS nanaco WAON EdyJR Suica PASMO au Master au

More information

完成卒論.PDF

完成卒論.PDF LAN 4 9920449 2 0 LAN Bluetooth LAN 1 LAN LAN LAN LAN 2 LAN Bluetooth LAN Bluetooth 3 Bluetooth 4 Bluetooth 5 Bluetooth Bluetooth 6 LAN Bluetooth LAN LocalAreaNetwork 1 LAN LAN LAN LAN Ethernet Ethernet

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて 1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008

More information

はじめに

はじめに 19 1.1 19 1.2 21 1.3 22 1.3.1 DES 24 1.4 25 1.4.1 DH 26 1.4.2 RSA 26 1.4.3 ElGamal 27 1.4.4 DSA 27 1.5 27 1.6 28 1.6.1 SHA-1 28 1.6.2 MD5 Message Digest 5 28 1.7 29 1.7.1 MIC 29 1.7.2 HMAC 29 1.7.3 30

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information

VRSP Japanese PDF.indd

VRSP Japanese PDF.indd 1 2 1. 1 2 1.2 3 1.3 Visa 3 1.4 Visa 4 2 5 2. 1 5 2.2 PCI DSS 6 2.3 PIN 7 2.4 3-D(ACS) 7 3 8 3. 1 8 3.2 9 3.3 10 4 1 1 4.1 1 1 4.2 12 5 13 14 1 1.1 Visa Visa www.visa-asia.com/spregistry Visa Visa 2 1.2

More information

モバイルプリペイド決済の実現モデルの調査研究

モバイルプリペイド決済の実現モデルの調査研究 ECOM 2005 Gift 1...1 2...4 2.1... 4 2.2... 5 2.2.1... 5 2.2.2... 7 2.2.3... 8 2.2.4... 9 2.3... 10 2.3.1... 10 2.3.2... 12 2.3.3... 14 3... 16 3.1... 17 3.1.2... 18 3.1.3... 20 3.1.4... 21 3.1.5... 23

More information

IBM Presentations: Smart Planet Template

IBM Presentations: Smart Planet Template PCI DSS PCI DSS ITS IAS. PCI QSA PCI DSS PCI DSS PCI DSS 2 PCI DSS VISA AIS MasterCard SDP AMEX DSOP DISCOVER DISC JCB DSP PCI SSC (Payment Card Industry Security Standards Council) PCI URL https://www.pcisecuritystandards.org/index.shtml

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

技術的条件集別表 26.2 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 (IPv4 トンネル方式 -10GBASE LR インタフェース )

技術的条件集別表 26.2 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 (IPv4 トンネル方式 -10GBASE LR インタフェース ) 技術的条件集別表 26.2 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 (IPv4 トンネル方式 -10GBASE LR インタフェース ) [ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ 1998.5.20) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) IETF RFC791(Internet Protocol 1981.9)

More information

生体認証システムにおける情報漏洩対策技術の研究動向

生体認証システムにおける情報漏洩対策技術の研究動向 ATM 1 IC ATM ATM IC IC ATM E-mail: masataka.suzuki@boj.or.jp E-mail: inuma.manabu@aist.go.jp E-mail: a-otsuka@aist.go.jp //2010.4 229 1. 2004 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM

More information

25 About what prevent spoofing of misusing a session information

25 About what prevent spoofing of misusing a session information 25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

P.1P.3 P.4P.7 P.8P.12 P.13P.25 P.26P.32 P.33

P.1P.3 P.4P.7 P.8P.12 P.13P.25 P.26P.32 P.33 : : P.1P.3 P.4P.7 P.8P.12 P.13P.25 P.26P.32 P.33 27 26 10 26 10 25 10 0.7% 331 % 26 10 25 10 287,018 280,446 6,572 30,236 32,708 2,472 317,254 313,154 4,100 172,724 168,173 4,551 6,420 6,579 159 179,144

More information

技術的条件集別表 26.3 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 (IPv6 トンネル方式 )

技術的条件集別表 26.3 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 (IPv6 トンネル方式 ) 技術的条件集別表 26.3 ISP 接続用ルータ接続インタフェース仕様 (IPv6 トンネル方式 ) [ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ 1998.5.20) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) IETF RFC791(Internet Protocol 1981.9) IETF RFC792(Internet Control

More information

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /

Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR / SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices

More information

スライド 1

スライド 1 IPA 2010 3 25 1 1 / / 2 (DRBG) DRBG NIST SP800-90 2 1 3 JCMVP 2009 1 JCATT AES 15 4 5 OK/NG OK ( ) ( ) 6 JCMVP JCATT JCATT http://www.ipa.go.jp/security/jcmvp/open_documents.html 7 332 (DES, Triple-DES,

More information

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra 1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular

More information

橡セキュリティポリシー雛形策定に関する調査報告書

橡セキュリティポリシー雛形策定に関する調査報告書 13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site

More information

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi 3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.

More information

IC API

IC API IC API Handa-F@mail.dnp.co.jp 2004 8 26 Copyright (c) 2004 NPO Page 2 IC API PKI IC PKCS#11 CSP (Cryptographic Service Provider) PKCS#11 CSP PKCS#15 GSC-IS Copyright (c) 2004 NPO Page 3 (identity token)

More information

橡sirahasi.PDF

橡sirahasi.PDF Internet Week 2000 T5 IPsec VPN 2000/12/18 1 Virtual Private Network 2 IPsec 3 IPsec VPN 4 IPsec VPN 2 1 Virtual Private Network 3 Ethernet, WAN PPTP(PPP) IPSec SSL/TLS SOCKS V5 SSH, SSL-Telnet, PET PGP,

More information

JP1/Integrated Management - Service Support 操作ガイド

JP1/Integrated Management - Service Support 操作ガイド JP1 Version 9 JP1/Integrated Management - Service Support 3020-3-R92-10 P-242C-8F94 JP1/Integrated Management - Service Support 09-50 OS Windows Server 2008 Windows Server 2003 OS JP1/Integrated Management

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

[ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ ) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) JIS C6832 ( 石英系マルチモード光ファイバ素線 1995) IETF RFC791(Internet Protocol

[ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ ) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) JIS C6832 ( 石英系マルチモード光ファイバ素線 1995) IETF RFC791(Internet Protocol 技術的条件集別表 26.1 IP 通信網 ISP 接続用ルータ接続インタフェース仕様 ( IPv4 PPPoE 方式 -IPv6 機能部 ) 注 : 本別表については NTT 西日本のみの適用です [ 参照規格一覧 ] JIS C5973 (F04 形単心光ファイバコネクタ 1998.5.20) JIS C6835 ( 石英系シングルモード光ファイバ素線 1991) JIS C6832 ( 石英系マルチモード光ファイバ素線

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

Dec , IS p. 1/60

Dec , IS p. 1/60 Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60

More information

22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener

22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener 22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Generator PF-Web for Constructing Web Applications. Tomohiro

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

昭和恐慌期における長野県下農業・農村と産業組合の展開過程

昭和恐慌期における長野県下農業・農村と産業組合の展開過程 No. 3, 96-107 (2002) Electronic Money and Strategy of Telecommunication Industry Oshima Kazuchika Nihon University, Graduate School of Social and Cultural Studies Information technology innovation came

More information

2008

2008 2008 1 1 2 2 2.1 NIST Fingerprint Image Software 2.............. 2 2.2 Reference Vector........................ 2 2.2.1.................. 2 2.2.2.................. 4 3 5 3.1............................

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1

12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 12 NEC 2003/3/6 Copy ight (C) NEC Corporation 1 Biometrics Biometrics 01.9.11 2003/3/6 Copy ight (C) NEC Corporation 2 AFIS Internet ID(PID) 2003/3/6 Copy ight (C) NEC Corporation 3 2003/3/6 Copy ight

More information

Flow Control Information Network 1 /

Flow Control Information Network 1 / (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Flow Control Information Network 1 / 2012 2 Flow Control DLL : Automatic Repeat Request (ARQ) Stop-and-wait

More information

<B54CB5684E31A4E9C0CBA4E5AA6BC160BEE3B27AA544A5552E706466>

<B54CB5684E31A4E9C0CBA4E5AA6BC160BEE3B27AA544A5552E706466> N1 2 3 1 16 17 18 19 20 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 4 2 38 39 40 41 42 44 45 46 47 48 50 51 52 53 54 55 56 57 58 59 60 61 5 3 62 63 64 65 66 68 69 70 70 72 74 75 76 77 78 80 81 82 83

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

Si-R180 ご利用にあたって

Si-R180 ご利用にあたって P3NK-2472-01Z0 GeoStream Si-R 180 LAN 2007 7 Microsoft Corporation All rights reserved, Copyright 2007 2 ...2...5...5...5...5...6...7...8...8...11...11 LAN...11...11...12...12...12...12...12...13 ISO/IEC15408...14

More information

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: alex@ee.tokushima-u.ac.jp Id: itrc20th-20061005.tex,v

More information

Cisco Aironet 1130AG アクセス ポイント クイック スタート ガイド

Cisco Aironet 1130AG アクセス ポイント クイック スタート ガイド CONTENTS 1 IP 2 3 6 7 9 12 15 17 18 IP 20 CLI IP 21 Telnet CLI 23 24 28 802.11G 802.11A 34 38 Express Security 40 Express Security 41 SSID 42 47 LED 48 50 SSID50 WEP 50 51 52 MODE 52 Web 53 55 1 56 IP

More information

FEEL Prod Grap PH_Artwork_P0AVS QSG JP A4_ _Rev.11.indd

FEEL Prod Grap PH_Artwork_P0AVS QSG JP A4_ _Rev.11.indd EUROPORT MPA40BT-PRO/MPA40BT All-in-One Portable 40-Watt PA System with Bluetooth Connectivity, Battery Operation and Transport Handle 2 EUROPORT MPA40BT-PRO/MPA40BT 3 ¼" TS 1. 2. 3. 4. 5. 6. 7. 8. 9.

More information

暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std e 使用したツール :S

暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std e 使用したツール :S 暗号プロトコル評価結果 独立行政法人情報通信研究機構 1. プロトコル名 :PKM 2. 関連する標準 IEEE Std 802.16e-2005 http://standards.ieee.org/getieee802/download/802.16e-2005.pdf 3. 使用したツール :Scyther 4. 評価の概要 :Scyther による評価では weak agreement への攻撃の可能性が指摘されているが

More information

n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i

n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i 15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and

More information

total-all-nt.dvi

total-all-nt.dvi XI W I D E P R O J E C T 1 WIDE Reliable Multicast 1.1 TV 1 1 TCP WIDE JGN/JB SOI (DV) Reliable Multicast (RM) US Reliable Multicast IETF RMT-WG PGM Digital Fountain FEC Tornado Code Ruby Code 1.2 WIDE

More information

Encryption Security

Encryption Security 200426 XML Consortium WG XML Signature XML Encryption XKMS2.0 X-KRSS:Register X-KISS:Locate X-KISS:Validate WS-Security XACML WG 2004/02/06 1 XML WG 2004/02/06 2 2001 2002 2003 XKMS XML SAML SSO SAML XML

More information

2/ PPPoE AC(Access Concentrator) PPPoE PPPoE Ping FTP PP

2/ PPPoE AC(Access Concentrator) PPPoE PPPoE Ping FTP PP PPPoE HATS LAN 2/31... 4... 4... 5... 6... 6... 7... 8... 8... 9... 10 PPPoE... 10 AC(Access Concentrator)... 10...11 PPPoE... 11 PPPoE... 13 Ping... 13 FTP... 14 PPPoE... 14... 15... 15 3/31... 17 PPPoE...

More information

Testing XML Performance

Testing XML Performance - DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER

More information

Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc.

Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. SRX DYNAMIC VPN Dynamic VPN Dynamic VPN IPSec VPN PC SRX IPSec VPN SRX PC IPSec 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net DYNAMIC VPN Netscreen Remote(NS-R) (NS-R) PC SRX Dynamic VPN SRX

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

RFID RFID + ) (RFID IC transponder) RFID Tag Antenna wired-line Reader Ethernet/ RS232c Antenna RFID Tag Reader id command id interrogation id radio s

RFID RFID + ) (RFID IC transponder) RFID Tag Antenna wired-line Reader Ethernet/ RS232c Antenna RFID Tag Reader id command id interrogation id radio s RFID 1 RFID 2 RFID 3. RFID 4. RFID E-mail: ichiro@nii.ac.jp RFID RFID RFID (Radio Frequency IDentification system) c.f. IC E-mail: ichiro@nii.ac.jp RFID 2006 6,000 RFID RFID + ) (RFID IC transponder) RFID

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

A book

A book Hitachi Multi Payment Network communications server 3000-3-493-40 P-1B43-6111 Hitachi Multi Payment Network communications server Base 01-03( OS HP-UX 11.0 HP-UX 11i) P-1B43-6311 Hitachi Multi Payment

More information

PX-105

PX-105 NPD4717-00 ...4... 4... 4...5 /...6...8... 8... 9...10...10...11...11...11...12...12...14...16...17...17...17...18...20...20...21...22...24...25 /...25 /...26...26 2 ...26 USB...27...28...29...31...31...32...32

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

DocuCentre-III C3300 / C2200

DocuCentre-III C3300 / C2200 C3300 / C2200 2 3 50 45 35 35 35 35 G4 G3 Management Ecology Scan Fax Print Copy C3300 / C2200 Product Summary 4 5 SCAN 6 7 COPY 8 9 PRINT 10 FAX 11 SECURITY 12 12 13 13 MANAGEMENT IC Card Gate IC Card

More information

1 2 3 1 34060120 1,00040 2,000 1 5 10 50 2014B 305,000140 285 5 6 9 1,838 50 922 78 5025 50 10 1 2

1 2 3 1 34060120 1,00040 2,000 1 5 10 50 2014B 305,000140 285 5 6 9 1,838 50 922 78 5025 50 10 1 2 0120-563-506 / 9001800 9001700 123113 0120-860-777 163-8626 6-13-1 Tel.03-6742-3111 http://www.himawari-life.co.jp 1 2 3 1 34060120 1,00040 2,000 1 5 10 50 2014B 305,000140 285 5 6 9 1,838 50 922 78 5025

More information

2.1...3 2.2...3 2.3...4 2.3.1...4 2.3.2...6 2.3.3...9 2.3.4...16 2.4...18 2.4.1...18 2.4.2...22 3.1...27 3.2...28 3.3...32 3.3.1 Public Key Infrastruc

2.1...3 2.2...3 2.3...4 2.3.1...4 2.3.2...6 2.3.3...9 2.3.4...16 2.4...18 2.4.1...18 2.4.2...22 3.1...27 3.2...28 3.3...32 3.3.1 Public Key Infrastruc 2.1...3 2.2...3 2.3...4 2.3.1...4 2.3.2...6 2.3.3...9 2.3.4...16 2.4...18 2.4.1...18 2.4.2...22 3.1...27 3.2...28 3.3...32 3.3.1 Public Key Infrastructure Card Consortium...32 3.3.2 BuySmart Web for i-mode...33

More information

The Institute for Economic Studies Seijo University 6 1 20, Seijo, Setagaya Tokyo 157-8511, Japan The Institute for Economic Studies Green Paper No. 59 Consumers Decision on the Choice of Small Payment

More information

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre 3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

00.目次_ope

00.目次_ope 816XL ii iii iv iv User Entry 1 3 v vi vii viii 1 1 C: >VTTERM 1- 1 1-3 1 1-4 1 1-5 1 1-6 1 1-7 1 1-8 1 1-9 1 1-10 C: >VTN 1 Host Name: 1-11 1 01 1-1 0.0.0.0 1 1-13 1 1-14 - -3 Port status and configuration

More information

0-表紙

0-表紙 openehr EHR openehr openehr CEN/ISO 13606 HL7 CDA Health Record An extract of an EHR Extract of EHR Multi document message Folder Composition (versions) Folder Composition (+/- versions) Document (Version

More information

Microsoft Word - Œ{Ł¶.doc

Microsoft Word - Œ{Ł¶.doc 17 59.0% 41.0% 60.8% 76.0%71.9% 65.3% 17 2.6% 3.5% 25.9% 57.3% 16.7% 28.1% 52.2% 11.1% 2.6% =270 18 2 (=199) 1 17 71.0% 76.0% 44.2% 71.9% 36.2% 18.1% 65.3% 16.7% 34.1% 16.3% 47.1% 14.9% 13.8% 5.0% 3.6%

More information

by CASIO W61CA For Those Requiring an English/Chinese Instruction

by CASIO W61CA     For Those Requiring an English/Chinese Instruction by CASIO W61CA http://www.au.kddi.com/torisetsu/index.html http://www.au.kddi.com/manual/index.html For Those Requiring an English/Chinese Instruction Manual English/Chinese Simple Manual can be read on

More information

100 7 ( ) ( ) ( )

100 7 ( ) ( ) ( ) (1) 100 1 102 2 ( 1) 111 100 7 ( ) ( ) ( ) (1) 101 1 ( ) 2 ( 1) 3 ( ) 102 7 4 4 ( ) 5 ( 2) 1 2 ( 1) 1 1 ( ) 1 ( ) ( ) (1) 103 ( 318 ) 2 ( ) 104 7 2 ( ) ( 247 ) ( 248 ) ( ) (1) ( 189 2 ) ( 191 1 ) ( 193

More information

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN

More information

3: OFF WEB 4 4: 30 (3) Radio Frequency Identification RFID RFID RFID IC Suica ICOCA PASMO PiTaPa Edy id 1 RFID RFID RFID 1 1mm 2.3 ON/OFF 3 3 (1) (2)

3: OFF WEB 4 4: 30 (3) Radio Frequency Identification RFID RFID RFID IC Suica ICOCA PASMO PiTaPa Edy id 1 RFID RFID RFID 1 1mm 2.3 ON/OFF 3 3 (1) (2) RC-009 Multifunctional Outlet With Method Of Cutting Standby Power By Scheduler Hiroshi Akeyama Takao Kawamura Kazunori Sugahara Takeshi Saitoh Ryosuke Konishi 1. IT [1, 2, 3, 4] ON/OFF PC cogma [5] cogma

More information

B 20 Web

B 20 Web B 20 Web 0753018 21 1 29 1 1 6 2 8 3 UI 10 3.1........................ 10 3.2 Web............ 11 3.3......... 12 4 UI 14 4.1 Web....................... 15 4.2 Web........... 16 4.3 Web....................

More information

1. - - - 2 - - 3 - - 4 - 1 Muser KT, Bond GR, Drake RE, et al(1998). Model of community care for severe mental illness: A review of research on case management. Schizophrenia Bulletin, 24(1): 33-74. -

More information

RBA RBA TSM 2) RBA Visa MC RBA RBA RBA

RBA RBA TSM 2) RBA Visa MC RBA RBA RBA RBA No-Surcharge NSR 1) RBA RBA TSM RBA RBA RBAReserve Bank of Australia USA RBA RBA TSM 2) RBA Visa MC RBA RBA RBA 3) MSF 4) default ATM Two-sided Markets Two-sidedMarkets Two-sided MarketsTSM 5) Platform

More information

情報科学研究 第19号

情報科学研究 第19号 Research on Organizational Information Security Management and Privacy Protection of Personal Data in the Digital Surveillance Society Tadaaki Nemoto, Yoshihito Hattori, Ken-ichi Sato p. Mark Weiser 4.

More information

日立評論2013年1月号 : ITソリューション・クラウドサービス

日立評論2013年1月号 : ITソリューション・クラウドサービス IT Solutions and Cloud Services IT IT IT 1 2 SNS Social Networking Service Field to Future Technology Harmonious Cloud IT Information Technology 2012 4 6 IT Field to Future Technology Big Data Ex IT 1

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information