Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, IPSJ-DC, IPSJ-FI (Joint) |
2010-03-05 14:45 |
Okinawa |
Okinawaken-Seinen-Kaikan |
User Behavior Visualization System Using Web Browsing History Yusuke Ichikawa, Hisaharu Ishii, Shouichi Nagano, Toru Kobayashi (NTT Corp.) LOIS2009-96 |
In this paper, we propose the Web-browsing-activity visualization system by summarizing web browsing history for user’s ... [more] |
LOIS2009-96 pp.103-108 |
NS, IN (Joint) |
2010-03-05 11:40 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Scheme of Detecting Malware for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200 |
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] |
IN2009-200 pp.337-342 |
IA, SITE, IPSJ-IOT [detail] |
2010-03-02 14:05 |
Miyagi |
|
Data Link Layer Monitoring with IPFIX/PSAMP Shingo Kashima, Atsushi Kobayashi (NTT) SITE2009-73 IA2009-125 |
IPFIX/PSAMP is a standard protocol of flow technology, but not available in the traffic monitoring of data link layer wh... [more] |
SITE2009-73 IA2009-125 pp.311-316 |
IN |
2009-12-11 11:15 |
Hyogo |
KOBE UNIVERSITY |
Proposal of Trust and Public Key Management over MANET Hideaki Kawabata (Tokai Univ.), Yoshiko Sueda (NTT), Osamu Mizuno (Kogakuin Univ.), Hiroshi Ishii (Tokai Univ.) IN2009-102 |
There have been a number of proposals for self-organizing key management frameworks using web-of-trust defined in Pretty... [more] |
IN2009-102 pp.87-92 |
IN |
2009-12-11 13:00 |
Hyogo |
KOBE UNIVERSITY |
An improvement of Target Contents Holder Discovery Method using GPS over MANET Naohide Fukushi, Keisuke Utsu (Tokai Univ.), Yoshiko Sueda (NTT), Osamu Mizuno (Kogakuin Univ.), Hiroshi Ishii (Tokai Univ.) IN2009-103 |
There have been many researches on Mobile Ad Hoc Network (MANET) that is infrastructureless wireless network. It is diff... [more] |
IN2009-103 pp.93-98 |
ISEC, LOIS |
2009-11-13 10:30 |
Gifu |
Gifu Univ. |
Javas Crypto Satoshi Oda, Gembu Morohashi (NTT Corp.) ISEC2009-62 LOIS2009-51 |
The information security in Web 1.0, represented by SSL/PKI,
is the security for communication channels. As computing
... [more] |
ISEC2009-62 LOIS2009-51 pp.75-80 |
ISEC, LOIS |
2009-11-13 11:30 |
Gifu |
Gifu Univ. |
Identifying Purchase Behavior on Web Access Log Hisaharu Ishii, Yusuke Ichikawa, Hiroyuki Sato, Toru Kobayashi (NTT Corp.) ISEC2009-64 LOIS2009-53 |
There are many studies of recommender systems, which provide users with suited items to their preferences. Besides it is... [more] |
ISEC2009-64 LOIS2009-53 pp.89-94 |
CQ, NS, ICM (Joint) |
2009-11-12 15:50 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
An implementation of a personal communicator with privacy management control Yuki Tomita (UEC), Osamu Mizuno (Kogakuin Univ./NTT), Kimihiko Fukami (NTT), Yoshikatsu Tada (UEC) NS2009-108 |
To exchange personal information among users, displayed information should be controlled from the point of view of human... [more] |
NS2009-108 pp.27-32 |
ISEC, LOIS |
2009-11-13 14:55 |
Gifu |
Gifu Univ. |
A Study of the user modeling method for personal life assistance service Koji Ito, Kyoji Iiduka, Takahiko Murayama, Toru Kobayashi (NTT) ISEC2009-69 LOIS2009-58 |
We proposed user modeling method for personal life assistance service by estimating user preference from age, sex, logs... [more] |
ISEC2009-69 LOIS2009-58 pp.121-128 |
CQ, NS, ICM (Joint) |
2009-11-13 10:40 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
A Study of an Efficient Virtual Machine Deployment Strategy Takuya Ogawa, Shingo Tokunaga, Shuichiro Aiba (NTT COMWARE), Yasuhiro Iida (NTT Corp.), Hideyasu Kitayama, Satoshi Matsumoto, Ryouji Horisaka (NTT COMWARE) ICM2009-30 |
“Cloud computing” for enterprise use is an emerging industry-wide trend. Computing resource providers
including data ce... [more] |
ICM2009-30 pp.23-28 |
ISEC |
2009-09-25 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Bit-Decomposition Protocol Using the Baby-Step-Giant-Step Algorithm Koji Chida, Dai Ikarashi, Katsumi Takahashi (NTT) ISEC2009-41 |
[more] |
ISEC2009-41 pp.9-14 |
MoNA, ITE-CE, ITE-BCT |
2009-09-24 16:00 |
Okinawa |
Tenbusu-Naha |
On the Framework of Virtual Client Terminals Yukio Tsuruoka, Michio Shimomura, Kenji Takahashi (NTT) MoMuC2009-30 |
(To be available after the conference date) [more] |
MoMuC2009-30 pp.21-26 |
IN, NS, CS (Joint) |
2009-09-10 15:20 |
Miyagi |
Tohoku University (Miyagi) |
On-demand VPN Operation System Takaaki Koyama, Shuichi Karasawa, Kazuhiro Kishi, Shintaro Mizuno, Sotetsu Iwamura (NTT) IN2009-48 |
We propose “On-demand VPN Operation System” to address the customer’s needs to have inter-connection with multiple VPN ... [more] |
IN2009-48 pp.53-58 |
IN, NS, CS (Joint) |
2009-09-10 15:45 |
Miyagi |
Tohoku University (Miyagi) |
VPN Setting Information Distribution System Yoshinao Kikuchi, Takaaki Koyama, Michio Shimomura (NTT) IN2009-49 |
We propose a VPN Setting Information Distribution System which is suitable for multi-terminal and multi-access point VPN... [more] |
IN2009-49 pp.59-64 |
IN, NS, CS (Joint) |
2009-09-11 13:00 |
Miyagi |
Tohoku University (Miyagi) |
Applying Source-Address-based NAT for IPsec NAT Traversal
-- P to P IPsec with NAT Router -- Katsunori Matsuura (NTT P.F Lab.), Toshihiko Kato (The Univ. of Electro-Comm.) IN2009-55 |
[more] |
IN2009-55 pp.93-98 |
IA |
2009-07-17 16:00 |
Tokyo |
IIJ Kanda Jinbocho Bldg. |
[Special Talk]
Multipurpose Traffic Monitoring with Flow-based Measurement Atsushi Kobayashi (NTT PF Labs.) IA2009-29 |
[more] |
IA2009-29 pp.43-48 |
IA, ICSS |
2009-06-19 10:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Validation of packet origin using public route information Meidai Saito (National Police Academy), Keisuke Ishibashi (NTT Corp.) IA2009-14 ICSS2009-22 |
uRPF is widely used technology to filter source IP spoofed packets, using route information. With uRPF filtering, a rout... [more] |
IA2009-14 ICSS2009-22 pp.73-78 |
IN, NS (Joint) |
2009-03-04 15:40 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Proposal and Implementation of Packet Header Modification Method on NAT Device Akira Kanamaru, Takuji Kishida (NTT PF Lab.) IN2008-193 |
When Network Address Translator (NAT) device modifies the IP addresses which represented by text format in payload, data... [more] |
IN2008-193 pp.363-368 |
ISEC |
2007-12-19 17:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol Masaya Ozawa (Chuo Univ.), Eric Y. Chen, Mitsutaka Itoh (NTT PF Lab.), Mitsutoshi Hatori (Chuo Univ.) ISEC2007-128 |
As the number of VoIP users grows rapidly in recent years, the available attack vectors against VoIP systems also increa... [more] |
ISEC2007-128 pp.115-121 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow. Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT) ISEC2007-28 SITE2007-22 |
An identity escrow scheme called Decentralized Identity Escrow (DECIDE) has three identity tiers,’identity’ (=’real iden... [more] |
ISEC2007-28 SITE2007-22 pp.87-94 |