|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2014-09-12 10:00 |
Tokyo |
Tokyo Tech Front |
A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-14 |
An architecture of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets... [more] |
IA2014-14 pp.1-6 |
IA |
2013-02-14 16:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Development of User-based Network Access Control System for Multiple Devices Chihiro Furukawa, Yuko Kamiya, Toshihiko Shimokawa (Kyushu Sangyo Univ.) IA2012-77 |
User based access control is important for network access control. In recent years, one user uses multiple devices to us... [more] |
IA2012-77 pp.37-42 |
LOIS |
2009-03-05 13:00 |
Okinawa |
Okinawa-seinen-kaikan |
Efficiency of Authentication Network Construction on Organization LAN Takeshi Miyake (Nagoya Inst. of Tech.), Shunyo Suzuki, Shinji Murase (Chuden CTI), Kimitake Wakayama (Nagoya University of Foreign Studies), Yoshiaki Shiraishi, Akira Iwata (Nagoya Inst. of Tech.) OIS2008-78 |
IEEE802.1X port base authentication is eective to an illegal connected prevention on the LAN, How-ever, when the system... [more] |
OIS2008-78 pp.19-24 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:15 |
Hokkaido |
Future University-Hakodate |
A method of excluding disapproval connection on authentication network Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT) |
IEEE802.1X is a technology to construct the network authentication system on LAN. The IEEE802.1X authentication system w... [more] |
ISEC2007-32 SITE2007-26 pp.113-118 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
An authentication network system using virtual authenticatior module Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT) |
The IEEE802.1X authentication network system is effective to an illegal, connected prevention to the LAN . However, the ... [more] |
ISEC2007-33 SITE2007-27 pp.119-124 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:45 |
Hokkaido |
Future University-Hakodate |
A composition method of network-independent dynamic authentication VLAN Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT) |
Virtual Private Network (VPN) is a technology that constructs a private network between bases geographically away. OpenV... [more] |
ISEC2007-40 SITE2007-34 pp.171-176 |
ISEC, LOIS |
2004-11-09 14:55 |
Osaka |
Osaka Univ. |
A Software Vulnerability Management System for Server Farm by Using Digital Certificates Motomu Nishikawa, Takeshi Okuda, Suguru Yamaguchi (NAIST) |
In a server farm, application servers are connected to the LAN through
switches. In this case, if one server has a vul... [more] |
ISEC2004-95 OIS2004-62 pp.69-76 |
ICM |
2004-10-01 11:20 |
Gifu |
Hida District Local Industry Promotion Center |
Secure Remote Access System based on Dynamic Secure Terminal Setting Hiroyuki Taniguchi, Izuru Sato (Fujitsu Lab.), Takeshi Ohnishi (FNT), Markus Schneider (FhG-SIT) |
We propose “DSTS: Dynamic Secure Terminal Setting”, which is secure and dynamic terminal information setting technology ... [more] |
TM2004-47 pp.31-36 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|