Thu, Mar 14 AM Opening 10:30 - 10:40 |
|
10:30-10:40 |
Opening ( 10 min. ) |
Thu, Mar 14 AM IA Security 1 at Room A Chair: Nariyoshi Yamai (Okayama University) 10:40 - 12:20 |
(1) IA |
10:40-11:05 |
A Study of the Anomaly Detection Method Characteristics based on the Traffic Parameter Clustering |
Kouhei Tatsumi, Toyokazu Akiyama (Kyoto Sangyo Univ.) |
(2) IA |
11:05-11:30 |
Design and implementation of mutual authentication based on PAKE in the Web SSO |
Kouhei Sugiyama, Toyokazu Akiyama (Kyoto Sangyo Univ.) |
(3) IA |
11:30-11:55 |
Proposal of DDoS attack mitigation using two-step map table lookup on LISP |
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) |
(4) IA |
11:55-12:20 |
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System |
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) |
Thu, Mar 14 AM IOT Network Service at Room B 10:40 - 12:20 |
(5) |
10:40-11:05 |
|
(6) |
11:05-11:30 |
|
(7) |
11:30-11:55 |
|
(8) |
11:55-12:20 |
|
|
12:20-14:00 |
Lunch Break ( 100 min. ) |
Thu, Mar 14 PM IA Wireless at Room A Chair: Katsuyoshi Iida (Tokyo Institute of Technology) 14:00 - 15:40 |
(9) IA |
14:00-14:25 |
An Efficient Policy Retrieval and Wi-Fi Control for ANDSF System |
Dae Sun Kim, Yujin Noishiki, Yoshinori Kitatsuji, Hidetoshi Yokota (KDDI R&D Labs) |
(10) IA |
14:25-14:50 |
Channel switching-aware TCP for cognitive radio mobile ad hoc networks |
Shun Koba, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie (Kyushu Inst. of Tech.) |
(11) IA |
14:50-15:15 |
Retransmission Control Scheme for Smart Meter Wireless Multi-hop Network |
Makoto Ishizaki, Daiki Nobayashi, Takeshi Ikenaga (Kyushu Inst. of Tech.) |
(12) IA |
15:15-15:40 |
A ZigBee Device Plug-In Architecture for IEEE1888 Networks |
Hideya Ochiai (Univ. of Tokyo/NICT), Yuuichi Teranishi (NICT/Osaka Univ.), Hiroshi Esaki (Univ. of Tokyo) |
Thu, Mar 14 PM 14:00 - 15:40 |
(13) |
14:00-14:25 |
|
(14) |
14:25-14:50 |
|
(15) |
14:50-15:15 |
|
(16) |
15:15-15:40 |
|
|
15:40-16:00 |
Break ( 20 min. ) |
Thu, Mar 14 PM IA Architecture / Application at Room A Chair: Tomoki Yoshihisa (Osaka University) 16:00 - 17:40 |
(17) IA |
16:00-16:25 |
A Proposal of Information Centric Networking in New Generation Network Architecture ZNA |
Takao Kondo, Heryanto, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) |
(18) IA |
16:25-16:50 |
A Flood Hazard Model Based on Damage Situations |
Kei Hiroi (Keio Univ.), Yuzo Taenaka (Univ. of Tokyo), Kanae Matsui (Keio Univ.), Hideya Ochiai (Univ. of Tokyo), Hitoshi Yokoyama (Tokanken), Hideki Sunahara (Keio Univ.) |
(19) IA |
16:50-17:15 |
Proposal and Evaluation of Priority Control Method on Per-Flow Basis Based on Bandwidth Utilization to Keep Response Time Within a Certain Threshold |
Keiya Ishikawa, Yuzo Taenaka, Masaya Nakayama (Univ. of Tokyo) |
(20) IA |
17:15-17:40 |
A Server Configuration with Autonomous Session State Migration to Demand Fluctuation |
Takeshi Usui, Masahiro Jibiki (NICT), Yusuke Sakumoto (Tokyo Metropolitan Univ.), Chisa Takano (Hiroshima City Univ.), Masaki Aida (Tokyo Metropolitan Univ.), Nozomu Nishinaga (NICT) |
Thu, Mar 14 PM 16:00 - 17:40 |
(21) |
16:00-16:25 |
|
(22) |
16:25-16:50 |
|
(23) |
16:50-17:15 |
|
(24) |
17:15-17:40 |
|
Fri, Mar 15 AM IA/SITE Security 2 at Room A Chair: Takeshi Usui (NICT) 10:00 - 11:40 |
(25) IA |
10:00-10:25 |
Identifying User Authentication Methods on SSH Sessions |
Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) |
(26) IA |
10:25-10:50 |
Secure Resrouce Provisioning Across Multiple Domains |
Toru Mano, Kimihiro Mizutani, Osamu Akashi (NTT) |
(27) SITE |
10:50-11:15 |
Study on Cocktail Party Effect Personal Authentication System by Recognizing the Differnce of Voices |
Kosei Taketa, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(28) SITE |
11:15-11:40 |
Proposal of Active IDS by Risk Level Probe |
Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
Fri, Mar 15 AM 10:00 - 11:40 |
(29) |
10:00-10:25 |
|
(30) |
10:25-10:50 |
|
(31) |
10:50-11:15 |
|
|
- |
|
|
11:40-13:00 |
Lunch Break ( 80 min. ) |
Fri, Mar 15 PM SITE Information Security / General at Room A Chair: Michio Nakanishi (Osaka Institute of Technology) 13:00 - 14:40 |
(32) SITE |
13:00-13:25 |
About the International Symposium on Internet Ethics ISIE2012 |
Yoshinori Ezawa (Kansai Univ.) |
(33) SITE |
13:25-13:50 |
Game theoretic analysis of the value exchange system |
Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) |
(34) SITE |
13:50-14:15 |
Consideration about the use possibility to the intellectual property field of digital forensic. |
Masahiro Sugawa (Niigata Univ.) |
|
- |
|
Fri, Mar 15 PM 13:00 - 14:40 |
(35) |
13:00-13:25 |
|
(36) |
13:25-13:50 |
|
(37) |
13:50-14:15 |
|
(38) |
14:15-14:40 |
|
|
14:40-14:50 |
Break ( 10 min. ) |
Fri, Mar 15 PM SITE Privacy at Room A Chair: Hiroki Takakura (Nagoya University) 14:50 - 16:30 |
(39) SITE |
14:50-15:15 |
Notes on Low Distortion Embedding Method of Digital Camera Scannable Invisible Code |
Masaharu Morita, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(40) SITE |
15:15-15:40 |
Proposal on Multi-Bit Patchwork Watermarking for Color Video having Tolerance to Frame Order Manipulation |
Takeshi Shinomiya, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(41) SITE |
15:40-16:05 |
A watermarking method for the Bezier curve |
Takafumi Kudo, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Faculty of Engineering, Toyo Networks and System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) |
(42) SITE |
16:05-16:30 |
A Fieldwork Study on Location Privacy Issues Caused by Wi-Fi/Bluetooth Communication |
Shogo Orio, Hiroshi Ueda (Kyoto Univ.), Tetsutaro Uehara (RIIS), Yu Tsuda (Kyoto Univ.), Katsuyasu Yoshimura, Tomohide Yamamura, Ryouichi Nomura (FXSS) |
Fri, Mar 15 PM 14:50 - 16:30 |
(43) |
14:50-15:15 |
|
(44) |
15:15-15:40 |
|
(45) |
15:40-16:05 |
|
(46) |
16:05-16:30 |
|
Fri, Mar 15 PM Closing 16:30 - 16:40 |
|
16:30-16:40 |
Awards and Closing ( 10 min. ) |