IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, NS
(Joint)
2019-03-05
10:50
Okinawa Okinawa Convention Center A Study on Transferring Authorization Privilege for Granting Permission to Use Services to Multiple Users
Omori Yoshihiko, Yamashita Takao (NTT) IN2018-126
Recently, it is becoming more popular to share a variety of resources such as facilities used in the sharing economy, ac... [more] IN2018-126
pp.253-258
NS, IN
(Joint)
2018-03-01
10:30
Miyazaki Phoenix Seagaia Resort A Study on Key Re-registration due to Change of Device for Mobile-Device-based Public Key Authentication
Hideo Nishimura, Takao Yamashita, Yasuhiko Yoshimura, Satoru Furukawa (NTT) IN2017-101
A mobile-device-based public key authentication method is standardized in the FIDO Alliance to eliminate the passwords i... [more] IN2017-101
pp.69-74
NS, IN
(Joint)
2018-03-02
15:40
Miyazaki Phoenix Seagaia Resort Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices
Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] NS2017-239
pp.403-408
NS, IN
(Joint)
2017-03-03
15:50
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL A Study on the Secure Sharing of User Authentication Private Keys among Devices Belonging to the Same Owner
Hideo Nishimura, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2016-172
In recent authentication based on the public-key cryptography, private keys are generated and kept inside the secure are... [more] IN2016-172
pp.449-454
ICSS, IPSJ-SPT 2016-03-04
10:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] ICSS2015-62
pp.89-94
NS, IN
(Joint)
2016-03-04
11:20
Miyazaki Phoenix Seagaia Resort A method for establishment of trust relationship between users, devices, and Web services in order to enable use of shared devices
Shogo Saito, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-137
(To be available after the conference date) [more] IN2015-137
pp.171-176
IN 2015-10-15
15:20
Osaka Osaka University A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] IN2015-55
pp.13-18
IN 2014-04-17
13:00
Kyoto Kyotofu-Chusho-Kigyo-Kaikan Elastic and strict load balancing via consistent hashing
Yuichi Nakatani, Hiroyuki Kurita, Naoki Takada, Takao Yamashita (NTT) IN2014-1
Load balancing is a key function constructing massively distributed systems. Stateful services like SIP and distributed ... [more] IN2014-1
pp.1-6
NS 2014-04-17
12:55
Okinawa Ishigaki-City-Hall Access Methods for Distributed Key-Value Stores with Highly SkewedAccess Distribution of Keys
Hiroyuki Kurita, Naoki Takada, Takao Yamashita, Tomoharu Motono (NTT) NS2014-6
Distributed Key-Value Stores are becoming applicable to various applications, such as not only Web applications but auth... [more] NS2014-6
pp.27-32
NS 2014-04-17
13:20
Okinawa Ishigaki-City-Hall Comparison of Load Balancing Designed for Requests Following Zipfian Distribution and Hybrid Load Balancer Using Round-Robin and Consistent Hashing
Takao Yamashita, Hiroyuki Kurita, Naoki Takada, Kenji Ota (NTT) NS2014-7
In this paper, we evaluate, by simulation, how much amount of memory a load balancing method we previously proposed to p... [more] NS2014-7
pp.33-38
NS, IN
(Joint)
2013-03-08
09:00
Okinawa Okinawa Zanpamisaki Royal Hotel Load Balancing and Approximate Memory Minimization in Scale-Out System Architecture for Processing Requests That Follow Zipfian Distribution
Takao Yamashita, Hiroyuki Kurita, Naoki Takada, Takuya Minami, Kenji Ota (NTT) IN2012-177
In this paper, we propose a load balancing method to process requests that follow a Zipfian distribution, which has extr... [more] IN2012-177
pp.137-142
IN 2012-04-12
13:55
Kyoto Kyotofu-Chusho-Kigyo-Kaikan Load Balancing Methods for Distribution Contains a Few Frequently Requested Keys and Many Rarely Requested Keys
Hiroyuki Kurita, Naoki Takada, Takuya Minami, Takao Yamashita, Yuji Agawa (NTT) IN2012-2
The consistent hash method is known as a load balancing method for the case where a large number of requests are to be h... [more] IN2012-2
pp.7-12
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan