IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 79

Internet Architecture

Workshop Date : 2016-06-06 - 2016-06-07 / Issue Date : 2016-05-30

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IA2016-1
Design of a flow-level monitoring middleware for automatic flow categorization
Xuliang Wang, Pongsakorn U-chupala, Kohei Ichikawa, Yasuhiro Watashiba (NAIST), Chantana Chantrapornchai, Putchong Uthayopas (Kasetsart Univ.), Hajimu Iida (NAIST)
pp. 1 - 6

IA2016-2
Analysis of recursive queries from the Internet to the authoritative name servers in Oita University
Masashi Nakamura, Minoru Ikebe, Kazuyuki Yoshida (Oita Univ.)
pp. 7 - 12

IA2016-3
A Visualization system of network packets with alert function for suspicious communications
Reido Horigome, Naoya Kitagawa, Nariyoshi Yamai (Tokyo Univ. of Agriculture and Technology)
pp. 13 - 18

IA2016-4
Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN
Nariaki Tamaki, Takehiro Kawata (NTT)
pp. 19 - 24

IA2016-5

Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
pp. 25 - 30

IA2016-6
Multidimensional Lamport-like one-time password authentication schemes
Yuji Suga (IIJ)
p. 31

IA2016-7

Daiki Ito (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.)
pp. 33 - 38

IA2016-8
Report on the 2016 Network and Distributed System Security Symposium
Shinichi Matsumoto (ISIT), Daiki Chiba (NTT), Kuniyasu Suzaki (AIST), Mirang Park (Kanagawa Institute of Technology)
pp. 39 - 44

IA2016-9
An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure
Kishi Yuya, Eguchi Ken, Ishikawa Tsuyoshi, Suzuki Ryusei, Miyaguchi Yuki, Ohsawa Kazuo, Yogosawa Mamoru, Sano Kaoru, Yamaki Hiroshi, Ueno Yoichirou, Sasaki Ryoichi, Kobayashi Hiroshi (Tokyo Denki Univ)
pp. 45 - 50

IA2016-10
Measuring BGP Origin Validation Effect for Mis-Origination
Masahito Ando (Toho Univ.), Masayuki Okada (JPNIC), Akira Kanaoka (Toho Univ.)
pp. 51 - 56

IA2016-11
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis
Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
pp. 57 - 62

IA2016-12

Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.)
pp. 63 - 68

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan