Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
An ID-Based 2-Functional Proxy Cryptosystem Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143 |
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] |
IT2008-130 ISEC2008-188 WBS2008-143 pp.563-568 |
IA, SITE |
2009-03-05 13:40 |
Kumamoto |
|
Implementation and Evaluation of PMIPv6 on Linux Environnement Mathieu Poulain (Telecom Br/Keio Univ), Fumio Teraoka (Keio Univ.) SITE2008-46 IA2008-69 |
The mobility has been an active topic of research recently. In this context, the protocol Proxy Mobile IPv6 has been sta... [more] |
SITE2008-46 IA2008-69 pp.13-18 |
IN, NS (Joint) |
2009-03-04 10:10 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Studies on location privacy in mobile communications using proxy
-- Analysis of attack methods and proposal of defense methods satisfying allowable delay -- Kotaro Miyake, Kenji Masui, Katsuyoshi Iida (Tokyo Inst. of Tech.) NS2008-229 |
With the advancement of information and communication technologies, the importance of user privacy is significantly incr... [more] |
NS2008-229 pp.483-488 |
IN |
2008-12-12 09:50 |
Hiroshima |
Hiroshima City University |
Implementation and Performance Study of Proxy Mobile IPv6 Ved P. Kafle, Masugi Inoue (NICT) IN2008-97 |
Proxy Mobile IPv6 protocol has recently been finalized in the Internet Engineering Task Force (IETF) as a network-based ... [more] |
IN2008-97 pp.67-72 |
SP, NLC |
2008-12-10 13:40 |
Tokyo |
Waseda Univ. |
[Invited Talk]
A New Paradigm for Speech Application System Development Tetsunori Kobayashi (Waseda Univ.) NLC2008-42 SP2008-97 |
Speech recognition application systems have been developed along so alled one-directional development paradigm: the engi... [more] |
NLC2008-42 SP2008-97 pp.109-114 |
IA |
2008-11-05 14:00 |
Toyama |
Tateyama Kokusai Hotel |
WWW Cache Replacement Policy Based on the Passive Measurement of Server Load Kazuhiro Shido, Satoru Ohta (Toyama Prefectural Univ.) IA2008-41 |
The World Wide Web (WWW) is an important service provided by the Internet. A problem of the WWW service is the response ... [more] |
IA2008-41 pp.1-6 |
CS, IN, NS (Joint) |
2008-09-11 13:40 |
Miyagi |
Tohoku University |
Performance improvement of Proxy-based TCP in Ad Hoc Networks Yuta Yamamoto (Kansai Univ.), Nobuhiko Itoh (NEC), Miki Yamamoto (Kansai Univ.) NS2008-49 |
In ad-hoc networks, a TCP session can obtain very low throughput with increase of the number of hops.One promising way t... [more] |
NS2008-49 pp.39-44 |
CS, IN, NS (Joint) |
2008-09-12 11:20 |
Miyagi |
Tohoku University |
Relay method for VPN connection with a proxy-box intervening between terminal device and VPN gateway Jun-ya Kato, Hiroyuki Kurita (NTT) IN2008-58 |
We have proposed the SIP dial-up method controlling IKE/IPsec connection with SIP signaling for establishing remote acce... [more] |
IN2008-58 pp.87-92 |
NS |
2008-06-20 10:50 |
Niigata |
Nagaoka University of Technology |
Implementation of a Proxy to use Electronic Whiteboard on VMware Player Yoshimi Sunano, Nobuaki Kato, Takuya Koumoto (Okayama Univ.) NS2008-25 |
To support of education, an electronic whiteboard of JSDT is used on department of communication network engineering of ... [more] |
NS2008-25 pp.47-52 |
IN, RCS (Joint) |
2008-05-29 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Trend of IP Mobility Technology for Next Generation Mobile Network Yasuhiro Mizukoshi (NEC) IN2008-1 RCS2008-4 |
Since IETF standardized Mobile IPv4 as IP mobility technology of the Internet in 1996, Mobile IP has evolved as the main... [more] |
IN2008-1 RCS2008-4 pp.1-6(IN), pp.19-24(RCS) |
MoNA, IPSJ-MBL |
2008-05-22 10:25 |
Okinawa |
Okinawa-seinen-kaikan |
A Study for Wireless LAN Device Power-saving by UPnP/DLNA Packet Filtering Methods Motoharu Miyake, Atsushi Takeshita (NTT DoCoMo) |
Although increasing the number of devices in a home network enables various services, the devices generate a lot of mult... [more] |
MoMuC2008-5 pp.27-32 |
MoNA, IPSJ-MBL |
2008-05-23 11:05 |
Okinawa |
Okinawa-seinen-kaikan |
Performance Evaluation of Window Size in Proxy-based TCP for Multi-hop Wireless Networks Yuta Yamamoto, Nobuhiko Itoh, Miki Yamamoto (Kansai Univ.) |
In multihop wireless networks, a TCP session can obtain very low throughput with increase of the number of hops. One pro... [more] |
MoMuC2008-19 pp.109-114 |
NS, IN (Joint) |
2008-03-06 10:10 |
Okinawa |
Bankoku Shinryokan |
A lightweight signaling protocol with SIP proxy agent Tsutomu Kitamura, Takayuki Shizuno, Toshiya Okabe, Hideaki Tani (NEC) NS2007-155 |
The session Initiation Protocol (SIP) is a widely accepted application-layer control protocol. It needs much network ban... [more] |
NS2007-155 pp.141-144 |
NS, IN (Joint) |
2008-03-07 09:15 |
Okinawa |
Bankoku Shinryokan |
Encrypted mail sharing using Proxy Re-encryption Shusuke Suziki, Taiichi Saito (Tokyo Denki Univ) IN2007-234 |
In this papar, we propose encrypted mail sharing using Proxy Re-encryption.
Proxy Re-encryption scheme allows a proxy t... [more] |
IN2007-234 pp.449-453 |
ISEC |
2007-12-19 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of IBE to PKE Proxy Re-Encryption Takeo Mizuno, Hiroshi Doi (IISEC) ISEC2007-124 |
A proxy re-encryption scheme allows the proxy to transform ciphertexts encrypted under Alice’s public key into the diffe... [more] |
ISEC2007-124 pp.85-92 |
NS, ICM, CQ (Joint) |
2007-11-16 13:50 |
Fukuoka |
Institute of System LSI Design Industry, Fukuoka |
Performance Evaluation of TCP Proxy in Ad Hoc Networks Nobuhiko Itoh, Yuki Imanishi, Miki Yamamoto (Kansai Univ) NS2007-103 |
In ad-hoc networks, a TCP session can obtain very low throughput with increase of the number of hops. One promising way ... [more] |
NS2007-103 pp.53-57 |
NS, IN (Joint) |
2007-03-09 09:00 |
Okinawa |
Okinawa Convention Center |
Implementation of Session-based QoS Control Architecture by Using SIP Proxy and its Evaluation Gang Qin, Shingo Ata, Ikuo Oka (Osaka City Univ.), Chikato Fujiwara (Osaka Seikei Univ.) IN2006-228 |
With the rapid growth of broadband subscribers and data transmissions, it is predicted the congestion in the access netw... [more] |
IN2006-228 pp.285-290 |
NS, IN (Joint) |
2007-03-09 15:40 |
Okinawa |
Okinawa Convention Center |
Shepherd: A User-led Virtual Private Subnetwork Construction Architecture Sadanori Aoyagi, Hitomi Takahashi, Masato Saito, Hiroto Aida, Hideyuki Tokuda (Keio Univ.) NS2006-202 |
We propose a user-led Virtual Private SubNetworks (VPSN) construction architecture called Shepherd in this thesis. Users... [more] |
NS2006-202 pp.227-232 |
ICM, IN, LOIS (Joint) |
2007-01-18 11:50 |
Oita |
Beppu Convention Center(B-Con Plaza) |
Parallel Downloading Using Variable Length Blocks for Proxy Servers Atsushi Kawano, Junichi Funasaka, Kenji Ishida (HCU) IN2006-139 |
The parallel downloading is one of the technologies which fetch a file at high speed.This technology retrieves each divi... [more] |
IN2006-139 pp.7-12 |
IA |
2006-10-23 11:25 |
Tokyo |
Tokyo Institute of Technology (Ookayama Campus) |
A Security Model in Grid Computing
-- An Implemenation in the NAREGI Project -- Shinichi Mineo (Riken), Tadayasu Yotsu (NEC), Kazushige Saga, Yuji Saeki (NII), Yoshio Tanaka (AIST) IA2006-21 |
X.509 user credentials and proxy certificates are used in Grid Security Infrastructure (GSI). And end-to-end security sy... [more] |
IA2006-21 pp.7-12 |