Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2022-04-15 13:25 |
Tokyo |
kikai shinkou kaikan + online (Primary: On-site, Secondary: Online) |
Study of Multi-access VPN Systems with Hardware Accelerators Katsuma Miyamoto, Hiroki Kano, Koji Sugisono, Shinya Kawano (NTT) NS2022-5 |
In recent years, the use of VPN services has increased rapidly due to the spread of telework, and the use of VPN service... [more] |
NS2022-5 pp.25-30 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:10 |
Kochi |
Kochi University of Technology |
Anonymous Public-Key Certificates based on Elliptic Curve Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 |
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] |
ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 pp.347-352 |
NS |
2012-05-17 15:25 |
Tokyo |
National Institute of Informatics |
Hybrid IP-VPN Architecture of Mixed Star and Mesh Topology Takafumi Oya, Yasuhiro Kitamikado, Satoshi Kubota, Hirofumi Utsumi (NTT West) NS2012-20 |
In this paper, we propose Hybrid IP-VPN architecture of mixed star and mesh topology. With this architecture, traffic be... [more] |
NS2012-20 pp.23-26 |
IN |
2010-02-04 15:45 |
Okinawa |
|
Evaluation of the Route Optimization Architecture for MOBIKE-based Mobile Communication Systems Takafumi Oya, Yasuhiro Kitamikado, Yasuyuki Ichikawa, Jun Miyoshi (NTT West) IN2009-132 |
MOBIKE is one of the mobile communication technologies which is an enhancement of IKEv2 protocol. Although MOBIKE has an... [more] |
IN2009-132 pp.33-38 |
IN, NS (Joint) |
2009-03-03 10:50 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Anonymous Communication Mechanism Based on Mobile IPv6 between Mobile Node and Content Distribution Server Toshiyuki Fujisawa (NHK), Masaki Inamura, Toshiaki Tanaka (KDDI R&D LABS) NS2008-150 |
The opportunities that One Seg of the digital broadcasting is watched with a mobile node is increasing. One Seg is one w... [more] |
NS2008-150 pp.39-44 |
CAS, CS, SIP |
2009-03-03 13:10 |
Gifu |
Nagaragawa Convention Center |
[Poster Presentation]
Routing and IPsec Accelerator for a Broadband Router Kazuya Asano, Tomokazu Aoki, Teruhiko Nagatomo, Taku Sugawara, Junichi Hashida, Norio Abe, Satoru Okamoto, Yuya Ueno, Masatoshi Tanabata (FLSFujitsu LSI Solution Limited), Yoshiyuki Okubo (Fujitsu Limited) CAS2008-126 SIP2008-189 CS2008-100 |
We have reported an architecture of a 1Gbps IPsec accelerator previously. In this report, we show that the same LSI can ... [more] |
CAS2008-126 SIP2008-189 CS2008-100 pp.145-146 |
CS, IN, NS (Joint) |
2008-09-12 11:20 |
Miyagi |
Tohoku University |
Relay method for VPN connection with a proxy-box intervening between terminal device and VPN gateway Jun-ya Kato, Hiroyuki Kurita (NTT) IN2008-58 |
We have proposed the SIP dial-up method controlling IKE/IPsec connection with SIP signaling for establishing remote acce... [more] |
IN2008-58 pp.87-92 |
CS, SIP, CAS |
2008-03-07 13:00 |
Yamaguchi |
Yamaguchi University |
[Poster Presentation]
Architecture of 1Gbps IPsec Accelerator Kazuya Asano, Tomokazu Aoki, Teruhiko Nagatomo, Taku Sugawara, Taul Katayama, Junichi Hashida, Norio Abe, Satoru Okamoto (FLS), Yukinori Abe (Fujitsu) CAS2007-137 SIP2007-212 CS2007-102 |
We have developed a 1Gbps IPsec accelerator and show its architecture in this paper. The IPsec accelerator can process I... [more] |
CAS2007-137 SIP2007-212 CS2007-102 pp.67-68 |
IN |
2007-12-14 12:40 |
Hiroshima |
Hiroshima City University |
Evaluation of hardware-based IPsec processing method for embedded devices Yasuhiro Fukuju, Keisuke Mera, Takeshi Ishihara (Toshiba Corp.) IN2007-112 |
Cryptographic offload engine is a solution to reduce the CPU load and improve the throughput of IPsec. However, since us... [more] |
IN2007-112 pp.79-84 |
NS, CS, IN (Joint) |
2007-09-21 16:20 |
Miyagi |
Tohoku University |
Development of a security module with a BITW "Bump In The Wire" type implemented IPSEC Taku Sugawara, Tomokazu Aoki, Teruhiko Nagatomo, Kazuya Asano, Taul Katayama, Junichi Hashida, Norio Abe, Satoru Okamoto (FLS), Yukinori Abe (FUJITSU) NS2007-76 |
While the necessity of network security increases, applications may be degraded since the load of IPsec packet processin... [more] |
NS2007-76 pp.119-124 |
NS |
2007-05-17 17:20 |
Osaka |
Osaka Univ. |
[Invited Talk]
The IPv6 Technology Development and the Deployment of the Next Generation Network George Kimura (NTT West) NS2007-23 |
In recent years Broadband Services focusing on the FTTH have been expanding rapidly. To keep up with these developments ... [more] |
NS2007-23 pp.47-50 |
IN, NS, CS (Joint) |
2006-09-15 10:30 |
Miyagi |
|
Development of 1Gbps Fullwire Security Accelerator Kazuya Asano, Tomokazu Aoki, Teruhiko Nagatomo, Taku Sugawara, Taul Katayama, Junichi Hashida, Norio Abe, Hiroaki Takagi (FLS), Hiromitsu Horie (Fujitsu) IN2006-65 |
We developed a security accelerator LSI which can process IPSEC providing wire-rate full-duplex 1Gbps throughput across ... [more] |
IN2006-65 pp.93-95 |
IN, NS, CS (Joint) |
2006-09-15 11:10 |
Miyagi |
|
Asynchronous IPsec stack for Linux 2.6 kernel: implementation and performance evaluation Keisuke Mera, Takeshi Ishihara, Shigeo Matsuzawa (Toshiba) IN2006-67 |
Hardware cipher processing of IPsec protocol have been used for reducing the load of IPsec packet processing.
Such a me... [more] |
IN2006-67 pp.103-108 |
ISEC |
2005-09-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
IP Security Policy and Authentication Information Distribution Mechanism using Smart Card Manabu Hirano (Toyota National College of Technology), Suguru Yamaguchi (Nara Institute of Science and Technology) |
(To be available after the conference date) [more] |
ISEC2005-80 pp.31-36 |
RCS, IN (Joint) |
2005-05-27 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Ring-Based P2P-VPN for Realizing Cybersociety Koutaro Yagi, Osamu Honda, Hiroyuki Ohsaki (Osaka Univ), Kazuhiro Matsuda (NTT), Makoto Imase (Osaka Univ) |
In this paper, we propose a ring-based P2P-VPN (Peer-to-Peer Virtual
Private Network) that provides a secure and reliab... [more] |
IN2005-12 pp.61-66 |
NS, IN |
2005-03-04 10:50 |
Okinawa |
Okinawa Zanpa-misaki Royal |
Centralized Ethernet VPN Service Architecture Mariko Yamada, Masashi Yano (Hitachi, Ltd.) |
Ethernet VPN provides the connectivity equivalent to wide-area ethernet by using Internet and ether frame capsulation by... [more] |
NS2004-271 IN2004-271 pp.141-144 |
IA, MoNA |
2005-01-19 09:55 |
Osaka |
Osaka University Nakanoshima Center |
A Proposal of Configuring IPv6 End-to-End Secure Channels for Closed Members Yuichiro Hei, Satoshi Katsuno, Shigehiro Ano, Katsuyuki Yamazaki (KDDI Lab.) |
The deployment of IPv6 as the next generation Internet protocol has been proceeding. As one of the features of IPv6, the... [more] |
MoMuC2004-90 IA2004-21 pp.15-20 |
ICM |
2004-10-01 11:20 |
Gifu |
Hida District Local Industry Promotion Center |
Secure Remote Access System based on Dynamic Secure Terminal Setting Hiroyuki Taniguchi, Izuru Sato (Fujitsu Lab.), Takeshi Ohnishi (FNT), Markus Schneider (FhG-SIT) |
We propose “DSTS: Dynamic Secure Terminal Setting”, which is secure and dynamic terminal information setting technology ... [more] |
TM2004-47 pp.31-36 |
NS, CS, IN |
2004-09-02 13:50 |
Miyagi |
Tohoku University |
- Norihito Fujita, Yuichi Ishikawa, Toshio Koide, Akira Tsukamoto (NEC) |
Scalable deployment and management of overlay networks for collaborative
groups with dynamic membership are discussed. ... [more] |
NS2004-95 IN2004-54 CS2004-50 pp.55-58 |