Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CQ |
2024-06-28 14:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Statistical Analysis on Traffic and Communication Quality of Thin-Telework System Keisuke Ishibashi (ICU), Yoshiaki KItaguchi (Titech), Kenichi Nagami (Intec), Ichiro Mizukoshi (NTT East), Akira Sato (ITF) |
[more] |
|
IA |
2020-10-09 17:15 |
Online |
Online |
Correspondence of Event Exhibition at Online Conference Yoshifumi Atarashi (Alaxala), Akira Sato (Univ. of Tsukuba) IA2020-17 |
Some meetings and events have come to be held online for COVID-19. So we have been holding an event exhibition at the ve... [more] |
IA2020-17 pp.15-18 |
HWS, VLD |
2019-03-02 10:25 |
Okinawa |
Okinawa Ken Seinen Kaikan |
ASIC Chip Implementation and Evaluation of Elliptic Curve Digital Signature Algorithm Sosuke Sato, Hiroki Yoshida, Kazuki Monta (Kobe Univ.), Takaaki Okidono (ECSEC), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2018-138 HWS2018-101 |
We have designed and fabricated application specific semiconductor integrated circuit (ASIC) chips that embody the gener... [more] |
VLD2018-138 HWS2018-101 pp.267-269 |
HWS, ICD |
2018-10-29 13:25 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
Countermeasures for power noise and side-channel leakage in crypto fmodules (I) Kazuki Monta, Sousuke Sato, Akihiro Tsukioka (Kobe Univ.), Takaaki Okidono (ECSEC), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) HWS2018-48 ICD2018-40 |
[more] |
HWS2018-48 ICD2018-40 pp.7-11 |
IA |
2018-10-12 16:15 |
Tokyo |
Takeda Hall, Tokyo Univ. (No. 88) |
A counter method of unused IP address sweep for router Akira Sato, Shuji Sannomiya (Univ. of Tsukuba), Daiyuu Nobori, Satoshi Matsumoto (ICSCoE of IPA) IA2018-33 |
[more] |
IA2018-33 pp.5-8 |
ICSS, IA |
2018-06-25 14:50 |
Ehime |
Ehime University |
Survey on current situation of incorrect setting of DNS server Akira Sato (Univ. of Tsukuba), Kazunori Fujiwara (JPRS), Takaho Omuro, Kodai Watanabe, Kenichi Yoshida (Univ. of Tsukuba) IA2018-5 ICSS2018-5 |
It is necessary for the stable operation of the Internet that DNS (Domain Name System) can be used normally. Currently, ... [more] |
IA2018-5 ICSS2018-5 pp.27-31 |
IA |
2017-11-16 14:50 |
Overseas |
KMITL, Bangkok, Thailand |
Log analysis for hijacked user account's login detection method based on an autonomous system number of access source Akira Sato, Shuji Sannomiya, Yoshihiro Oyama, Hisashi Nakai, Kenichi Yoshida, Keisuke Kameyama (Univ. of Tsukuba) IA2017-50 |
User accounts may be hijacked carelessly, and system administrators
should detect such hijacked user accounts as soon a... [more] |
IA2017-50 pp.95-98 |
IA |
2016-11-04 10:55 |
Overseas |
Taipei (Taiwan) |
Real-time Abnormal Traffic Detection Circuit Based on Simple Frequent-Itemset-Mining Method Shuji Sannomiya, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2016-47 |
To resist the growth of abnormal traffic such as P2P flows, DDoS attacks and Internet worms, a circuit design to realize... [more] |
IA2016-47 pp.93-98 |
IA |
2015-11-12 16:00 |
Chiba |
NARITA VIEW HOTEL |
Enhancing performance of cardinality analysis for faster network Shinichi Mori, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2015-52 |
Cardinality in network flow data gives useful information for network administrators about suspicious communication on t... [more] |
IA2015-52 pp.81-85 |
IA, ICSS |
2015-06-12 14:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A detect method for an undesirable use of e-mail server using cardinality analysis Akira Sato, Yuki Kato, Kenichi Yoshida, Yasushi Shinjo (Univ. of Tsukuba) IA2015-16 ICSS2015-16 |
[more] |
IA2015-16 ICSS2015-16 pp.87-92 |
IA |
2014-11-05 16:10 |
Overseas |
Thailand |
[Invited Talk]
Vicar in Network Shinichi Mori, Yuki Kato, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2014-38 |
Cardinality is known to be informative to find various network threats. Recently, we have developed methods to analyze I... [more] |
IA2014-38 pp.21-26 |
LQE, LSJ |
2013-05-17 15:45 |
Ishikawa |
|
Spectrum measurement using optically trapped gold nanoparticle Akira Sato, Yoshio Hayasaki (Utsunomiya Univ.) LQE2013-13 |
Gold nanoparticle cause localized surface plasmon resonance, which enhances an incident wave. The scattering light spect... [more] |
LQE2013-13 pp.57-61 |
IA |
2009-10-31 09:30 |
Overseas |
Tsinghua University (Beijing) |
A case study of Analyzed Method for the Number of Varieties in Frequently Found Flows in real network environment Yusuke Shomura, Akira Sato, Kenichi Yoshida, Satoshi Matsumoto, Kozo Itano (Univ. of Tsukuba) IA2009-53 |
Recently, users are using network in various ways. This makes the
network monitoring and network management difficult t... [more] |
IA2009-53 pp.39-44 |
IA, SITE |
2009-03-05 17:40 |
Kumamoto |
|
Shortening Boot Times of Guest OSes on OS Boot/Shutdown Control System using Authentication Devices Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano (Univ. of Tsukuba) SITE2008-70 IA2008-93 |
We are developing an OS boot/shutdown control system which provides a suitable computer environment
by identifying bot... [more] |
SITE2008-70 IA2008-93 pp.155-160 |
IA, SITE |
2009-03-05 21:00 |
Kumamoto |
|
Implementation of an Access Control Mechanism that Enables Delegating Rights of Network Usage Permissions for Guest PCs Mitsuhiro Mabuchi, Tsuyoshi Ozawa, Shingo Takada, Hiraku Toyooka, Keigo Matsui, Akira Sato, Yasushi Shinjo, Kazuhiko Kato (Univ. of Tsukuba) SITE2008-74 IA2008-97 |
When guests access their PCs to an organization's network, it is a challenging task for network administrators to achiev... [more] |
SITE2008-74 IA2008-97 pp.179-184 |
ICM |
2008-05-09 09:55 |
Kagoshima |
Kagoshima Public Access Center |
Secure OS Boot Control System using Authentication Device Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano (Univ. of Tsukuba) ICM2008-14 |
In large enterprise or university campuses, to prepare customized computer environment for users will improve their work... [more] |
ICM2008-14 pp.77-82 |