Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2019-03-05 10:50 |
Okinawa |
Okinawa Convention Center |
A Study on Transferring Authorization Privilege for Granting Permission to Use Services to Multiple Users Omori Yoshihiko, Yamashita Takao (NTT) IN2018-126 |
Recently, it is becoming more popular to share a variety of resources such as facilities used in the sharing economy, ac... [more] |
IN2018-126 pp.253-258 |
NS, IN (Joint) |
2018-03-01 10:30 |
Miyazaki |
Phoenix Seagaia Resort |
A Study on Key Re-registration due to Change of Device for Mobile-Device-based Public Key Authentication Hideo Nishimura, Takao Yamashita, Yasuhiko Yoshimura, Satoru Furukawa (NTT) IN2017-101 |
A mobile-device-based public key authentication method is standardized in the FIDO Alliance to eliminate the passwords i... [more] |
IN2017-101 pp.69-74 |
NS, IN (Joint) |
2018-03-02 15:40 |
Miyazaki |
Phoenix Seagaia Resort |
Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239 |
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] |
NS2017-239 pp.403-408 |
NS, IN (Joint) |
2017-03-03 15:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
A Study on the Secure Sharing of User Authentication Private Keys among Devices Belonging to the Same Owner Hideo Nishimura, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2016-172 |
In recent authentication based on the public-key cryptography, private keys are generated and kept inside the secure are... [more] |
IN2016-172 pp.449-454 |
ICSS, IPSJ-SPT |
2016-03-04 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
ICSS2015-62 pp.89-94 |
NS, IN (Joint) |
2016-03-04 11:20 |
Miyazaki |
Phoenix Seagaia Resort |
A method for establishment of trust relationship between users, devices, and Web services in order to enable use of shared devices Shogo Saito, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-137 |
(To be available after the conference date) [more] |
IN2015-137 pp.171-176 |
IN |
2015-10-15 15:20 |
Osaka |
Osaka University |
A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
IN2015-55 pp.13-18 |
IN |
2014-04-17 13:00 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Elastic and strict load balancing via consistent hashing Yuichi Nakatani, Hiroyuki Kurita, Naoki Takada, Takao Yamashita (NTT) IN2014-1 |
Load balancing is a key function constructing massively distributed systems. Stateful services like SIP and distributed ... [more] |
IN2014-1 pp.1-6 |
NS |
2014-04-17 12:55 |
Okinawa |
Ishigaki-City-Hall |
Access Methods for Distributed Key-Value Stores with Highly SkewedAccess Distribution of Keys Hiroyuki Kurita, Naoki Takada, Takao Yamashita, Tomoharu Motono (NTT) NS2014-6 |
Distributed Key-Value Stores are becoming applicable to various applications, such as not only Web applications but auth... [more] |
NS2014-6 pp.27-32 |
NS |
2014-04-17 13:20 |
Okinawa |
Ishigaki-City-Hall |
Comparison of Load Balancing Designed for Requests Following Zipfian Distribution and Hybrid Load Balancer Using Round-Robin and Consistent Hashing Takao Yamashita, Hiroyuki Kurita, Naoki Takada, Kenji Ota (NTT) NS2014-7 |
In this paper, we evaluate, by simulation, how much amount of memory a load balancing method we previously proposed to p... [more] |
NS2014-7 pp.33-38 |
NS, IN (Joint) |
2013-03-08 09:00 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Load Balancing and Approximate Memory Minimization in Scale-Out System Architecture for Processing Requests That Follow Zipfian Distribution Takao Yamashita, Hiroyuki Kurita, Naoki Takada, Takuya Minami, Kenji Ota (NTT) IN2012-177 |
In this paper, we propose a load balancing method to process requests that follow a Zipfian distribution, which has extr... [more] |
IN2012-177 pp.137-142 |
IN |
2012-04-12 13:55 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Load Balancing Methods for Distribution Contains a Few Frequently Requested Keys and Many Rarely Requested Keys Hiroyuki Kurita, Naoki Takada, Takuya Minami, Takao Yamashita, Yuji Agawa (NTT) IN2012-2 |
The consistent hash method is known as a load balancing method for the case where a large number of requests are to be h... [more] |
IN2012-2 pp.7-12 |