IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 19 of 19  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, NS
(Joint)
2021-03-04
11:20
Online Online Resource Authorization Patterns on Edge Computing
Ryu Watanabe, Ayumu Kubota (KDDIR), Jun Kurihara (UOH) IN2020-68
In order to realize a distribution of processing load and a prompt response, the concept of edge computing is drawing an... [more] IN2020-68
pp.85-90
ICSS, IPSJ-SPT 2021-03-01
10:25
Online Online Construction of Vulnerability Evaluation System with Machine Learning Methods
Ryu Watanabe, Takashi Matsunaka, Ayumu Kubota (KDDIR), Junpei Urakawa (KDS/KDDIR) ICSS2020-29
Recently, the cyberattacks aimed at software vulnerabilities are more popular and powerful. Therefore, various incidents... [more] ICSS2020-29
pp.19-24
IA 2021-01-29
14:00
Online Online High-performance Network Sharing and Isolation on Edge Computing
Kazuya Okada, Ryu Watanabe, Takashi Matsunaka (KDDI Research), Ayumu Kubota (KDDI Research/KDDI) IA2020-32
Edge Computing provide low-latency and high-bandwidth services on edge of networks such as base stations or local data c... [more] IA2020-32
pp.9-14
ICSS, IPSJ-SPT 2019-03-07
15:25
Okinawa NICT Okinawa Electromagnetic Technology Center A User Participation Type Web Security Platform and Its Real World Evaluation
Akira Yamada, Yukiko Sawaya, Takashi Matsunaka, Shoma Tanaka, Ayumu Kubota (KDDI Research) ICSS2018-74
A User Participation Type Web Security Platform and Its Real World [more] ICSS2018-74
pp.35-40
ICSS 2018-11-21
13:25
Kagoshima   Investigation of Security-Related Factors of Satisfactions in Internet Services
Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2018-54
The number of services on the Internet and devices connected to the Internet has been increased. Under such circumstance... [more] ICSS2018-54
pp.7-12
ICSS, IPSJ-SPT 2018-03-08
09:20
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Estimate of Malicious Web Sites Based on Users' Web Access Behavior and Destination AS Numbers
Kosuke Murakami, Jumpei Urakawa, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-65
 [more] ICSS2017-65
pp.85-90
ICSS, IPSJ-SPT 2018-03-08
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Empirical Analysis of Reflectors in DRDoS attacks based on Large-Scale Network Data
Jumpei Urakawa, Kosuke Murakami, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2017-82
DRDoS (Distributed Reflective Denial of Service) attack, which abuses publicly accessible servers called as a reflector,... [more] ICSS2017-82
pp.199-204
ITS, IEE-ITS 2017-03-07
16:15
Kyoto Kyoto Univ. Server-based Secure Diagnostic and Reprogramming System
Keisuke Takemori, Seiichiro Mizoguchi, Ayumu Kubota (KDDI Research) ITS2016-91
A electronic control units (ECU) is diagnosed and reprogramed by a maintenance staff who connects a diagnostic tool to a... [more] ITS2016-91
pp.87-92
RCC, ITS, WBS 2015-12-18
14:50
Okinawa Okinawa Industry Support Center Secure Personal Attribute Message Authentication for Pedestrian-Friendly Intelligent Transport Systems
Seiichiro Mizoguchi (KDDI R&D LABS), Daisuke Oshida, Hisataka Takagi (Renesas Electronics), Hideaki Kawabata, Keisuke Takemori, Ayumu Kubota (KDDI R&D LABS) WBS2015-78 ITS2015-50 RCC2015-80
In the case of providing safety services to pedestrians in the intelligent transport system (ITS), considering pedestria... [more] WBS2015-78 ITS2015-50 RCC2015-80
pp.221-226
RCC, ITS, WBS 2015-12-18
15:15
Okinawa Okinawa Industry Support Center Key Managements for ECU and Code Authentications Using Tamper-resistant Secure Element
Keisuke Takemori, Hideaki Kawabata, Seiichiro Mizoguchi, Ayumu Kubota (KDDI Labs) WBS2015-79 ITS2015-51 RCC2015-81
 [more] WBS2015-79 ITS2015-51 RCC2015-81
pp.227-232
NS, RCS
(Joint)
2011-12-16
11:25
Yamaguchi Yamaguchi University A study of damage estimation of DoS attack by network topology analysis
Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Labs.) NS2011-141
 [more] NS2011-141
pp.133-136
IN, NS
(Joint)
2011-03-04
09:10
Okinawa Okinawa Convention Center An Adaptive Defense Against Large DDoS Attack
Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI Labs.) IN2010-195
Distributed Denial-of-Service attack is one of the serious problem on network security. The attack exhausts not only com... [more] IN2010-195
pp.307-312
ICSS 2010-03-26
13:30
Fukuoka The University of Kitakyushu Name Resolution Mechanism for Secure Overlay Networking
Ayumu Kubota, Yutaka Miyake (KDDI Labs.) ICSS2009-62
Recent development of P2P and overlay networking technologies make it fairly easy to establish end-to-end communication ... [more] ICSS2009-62
pp.1-6
ICSS 2010-03-26
14:45
Fukuoka The University of Kitakyushu DDoS Protection Using Autonomous Distributed Firewall System
Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI R&D Labs.) ICSS2009-65
(To be available after the conference date) [more] ICSS2009-65
pp.19-24
IN, NS
(Joint)
2009-03-03
10:00
Okinawa Okinawa-Zanpamisaki Royal Hotel Securing Communication between Personal Networking Devices using Auto-generated DNSSEC Zones
Ayumu Kubota, Yutaka Miyake (KDDI Labs.) NS2008-170
 [more] NS2008-170
pp.153-158
ISEC, SITE, IPSJ-CSEC 2006-07-20
13:50
Okayama Okayama Univ. DHT-based Dynamic VPN Instantiation Mechanism for Secure Home Network Access
Ayumu Kubota, Akira Yamada, Yutaka Miyake (KDDI R&D Labs.)
 [more] ISEC2006-33 SITE2006-30
pp.175-182
NS 2006-05-18
14:20
Kyoto Kyoto University Clock Tower Centenial Hall A Proposal and Implementation of Secure ID management Scheme on Multi Domain Environment
Ryu Watanabe, Ayumu Kubota, Toshiaki Tanaka (KDDI Labs.) NS2006-23
The expansion of the Internet gives variety to user activity and makes the services convenient. But the number of the pr... [more] NS2006-23
pp.9-12
NS 2005-05-26
15:55
Nara NARA INSTITUTE of SCIENCE and TECHNOLOGY An Implementation of ID Management Mechanism with Privacy Protection for Secure Service Platform
Ryu Watanabe, Ayumu Kubota, Toshiaki Tanaka (KDDI Labs)
Recently, the number of the problems, such as the cheat action on net auction or the leakage of personal information fro... [more] NS2005-28
pp.17-20
IA 2004-07-12
11:00
Tokyo The University of Tokyo (Hongo Campus) The Overlay Network Utilization Technology Using Proxy
Ayumu Kubota, Yutaka Miyake, Toshiaki Tanaka (KDDI Labs.)
In order to add new network functions to the Internet, it is getting a common approach to implement them using overlay n... [more] IA2004-8
pp.7-12
 Results 1 - 19 of 19  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan