Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
ICSS, IPSJ-SPT |
2023-03-13 14:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions Yushi Hosokawa, Kanai Atushi, qian wu (Hosei Univ.), hatasima ryu (NTT), tanimoto sigeaki (ChibaTech Univ.) ICSS2022-80 |
[more] |
ICSS2022-80 pp.193-198 |
LOIS, IPSJ-DC |
2021-07-15 13:25 |
Online |
Online |
Improvement of Service Acceptability of Visible Light Communication System Teruo Endo (Osaka Shoin Women's Univ.), Akiha Mori, Shigeaki Tanimoto (CIT) LOIS2021-13 |
In general, visible light communication systems have not been sufficiently businessized, although they continue to progr... [more] |
LOIS2021-13 pp.6-11 |
ICM, LOIS |
2015-01-16 13:20 |
Fukuoka |
Kanmon Straits & Mojiko Retro |
A Study of Slow Policy Introduction in Information Security Management System Kenichirou Hata, Akira Sato, Shoichi Yoneda, Shigeaki Tanimoto (CIT), Hiroyuki Sato (The University of Tokyo), Atsushi Kanai (Hosei University) ICM2014-48 LOIS2014-55 |
(To be available after the conference date) [more] |
ICM2014-48 LOIS2014-55 pp.91-96 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:15 |
Hokkaido |
San-Refure Hakodate |
Dynamic Security Control Architecture on Hybrid-cloud Yuuki Kajiura, Atsushi Kanai (Hosei Univ.), Shigeaki Tanimoto (Chiba Inst. of Tech.), Hiroyuki Sato (Univ. of Tokyo) ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14 |
Recently, it is increasing that the multiple cloud services are used because cloud computing has been spread. However, i... [more] |
ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14 pp.61-67 |
LOIS, IPSJ-CN, IPSJ-SPT |
2012-05-18 16:40 |
Chiba |
Chiba Institute of Technology |
A Study of the Risk Management in Life Log Service Shigeaki Tanimoto, Ken Takahashi (CIT), Yoshiaki Seki (NTT), Motoi Iwashita (CIT), Hiroyuki Sato (s.tanimoto@m.ieice.org), Atsushi Kanai (HOSEI University) LOIS2012-8 |
In recent years, Life Log Service treating action records, such as an individual search log and a data on shoppers' brow... [more] |
LOIS2012-8 pp.127-132 |
IE, LOIS, ITE-ME, IEE-CMN [detail] |
2010-09-21 15:20 |
Kochi |
|
A Study of the Cost Structure in Campus PKI Shigeaki Tanimoto, Satoru Kurosaki, Tsuyoshi Takamoto, Kazunori Hayashi, Shinichi Mizuhara, Toshihiko Moriya (CIT), Masahiko Yokoi (NTT Communications), Hiroyuki Sato (The University of Tokyo), Atsushi Kanai (Hosei University) LOIS2010-22 IE2010-64 |
Today's ICT environments have rapidly developed by ubiquitization and cloud computing, and have gained maximum functiona... [more] |
LOIS2010-22 IE2010-64 pp.25-30 |
ISEC, LOIS |
2008-11-14 11:45 |
Aichi |
Nagoya Noh Theater |
Overseas Trends on and a Consideration about Privacy Protection and Utilization Technologies Takashi Hatashima, Shigeaki Tanimoto, Katsumi Takahashi (Nippon Telegraph and Telephone Corporation) ISEC2008-87 OIS2008-63 |
For realizing a secure IT society under the ubiquitous environments, it is important that implementing security counterm... [more] |
ISEC2008-87 OIS2008-63 pp.89-96 |
LOIS, IPSJ-DC |
2007-07-27 14:30 |
Hokkaido |
Future University-Hakodate |
A Proposal of server type Multi-homing VPN service architecture Shigeaki Tanimoto (NTT) OIS2007-24 |
Recently, Intranet environment of the enterprise is becoming more convenient by development of NW security technology an... [more] |
OIS2007-24 pp.59-64 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow. Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT) ISEC2007-28 SITE2007-22 |
An identity escrow scheme called Decentralized Identity Escrow (DECIDE) has three identity tiers,’identity’ (=’real iden... [more] |
ISEC2007-28 SITE2007-22 pp.87-94 |
ISEC, LOIS |
2006-11-16 13:25 |
Chiba |
Univ. of Tokyo(Kashiwa Campus) |
A study of Multi-Homing Group service Architecture
-- A Consideration of inter-group collision control method -- Shigeaki Tanimoto, Yoshiaki Seki, Osamu Shionoiri, Atsushi Kanai (NTT) |
[more] |
ISEC2006-89 OIS2006-47 pp.7-12 |
IA |
2006-05-24 11:40 |
Kyoto |
Campus Plaza Kyoto |
Designing federation architecture of the UPKI interuniversity authentication and authorization platform Masaki Shimaoka, Shigeaki Tanimoto, Toshiyuki Kataoka, Shinichi Mineo, Noboru Sonehara (NII), Yuuichi Teranishi (Osaka Univ.), Katsuyoshi Iida (Titech), Yasuo Okabe (Kyoto Univ.) IA2006-3 |
(Advance abstract in Japanese is available) [more] |
IA2006-3 pp.13-18 |
LOIS |
2006-05-19 15:15 |
Tokyo |
NTT Musashino R&D Center |
A concept proposal of Multi-Homing Group service
-- A Personal Oriented Group service -- Shigeaki Tanimoto (NTT) |
With rapid progress of the Internet, diversification of service of wide area Ethernet, wireless LAN service, etc. is pro... [more] |
OIS2006-6 pp.31-36 |