IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 6 of 6  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2013-03-08
14:30
Okinawa Okinawa Zanpamisaki Royal Hotel Design, Implementation and Performance Evaluation of In-Network Ad-Targeting Enabled by WiFi Access Point Virtualization
Yuji Nishida, Akihiro Nakao (Univ. of Tokyo) NS2012-237
 [more] NS2012-237
pp.421-426
NS, IN
(Joint)
2012-03-08
11:00
Miyazaki Miyazaki Seagia In-Network Ad-Targeting Through WiFi AP Virtualization
Yuji Nishida, Akihiro Nakao (Tokyo Univ.) NS2011-191
Traditionally, Ad-Targeting on the Internet is limited to data-mining (1) for only web content, (2) for specific search ... [more] NS2011-191
pp.69-74
LOIS, ICM
(Joint)
2010-01-21
17:35
Fukuoka Fukuoka Institute of Technology Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks
Hirokazu Nogura (Kochi Univ. of Tech.), Yuji Nishida (Internet Initiative Japan Inc.), Takasuke Tsuji (Trinity Security Systems, Inc.), Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2009-70
 [more] LOIS2009-70
pp.53-56
CQ, LOIS, IE, IEE-CMN, ITE-ME 2007-09-27
15:15
Tokushima The university of Tokushima Authentication Data Distribution Protocol for Wireless Mesh Network
Yuji Nishida (KUT), Takasuke Tsuji (Trinity Security Systems), Akihiro Shimizu (KUT) CQ2007-48 OIS2007-38 IE2007-45
In recent years, wireless mesh network is studied as a method for providing wireless LAN service widely. Wireless mesh n... [more] CQ2007-48 OIS2007-38 IE2007-45
pp.65-70
LOIS 2007-03-09
15:15
Tokyo Kikai-Shinko-Kaikan Bldg Resolving PKI Certificate Chain Finding Problem for Ad Hoc Network using Bloom Filter
Yuji Nishida, Akihiro Shimizu (KUT)
In ad hoc network, we cannot use a trusted Certification Authority and a repository. Hence web-of-trust PKI systems in w... [more] OIS2006-72
pp.19-22
CQ, IE, LOIS, IEE-CMN, ITE-ME 2005-09-15
10:50
Kochi Kochi Univ. of Technoloty Application of One-Time Password Authentication Protocol to Peer-to-Peer Network
Yuji Nishida, Takasuke Tsuji, Akihiro Shimizu (KUT)
In recent years, the spread of the application using the P2P(Peer-to-Peer) network is remarkable, and various services c... [more] CQ2005-38 OIS2005-23 IE2005-31
pp.23-27
 Results 1 - 6 of 6  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan