Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
NS |
2020-04-16 16:40 |
Online |
Online |
[Invited Talk]
Data Life-Cycle Protection for Ubiquitous Data Sharing Ruidong Li (NICT) NS2020-4 |
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] |
NS2020-4 pp.19-41 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 13:45 |
Ishikawa |
|
[Encouragement Talk]
Unit-separete Network Access Control based on Hierarchical Network Architecture Yu Tamura (UEC), Takashi Naito (NII), Nattapong Kitsuwan (UEC) NS2018-148 |
This paper proposes a Hierarchical Role-based Network Access Control (HRNAC) approach to set the flexible rule for each ... [more] |
NS2018-148 pp.105-110 |
IA |
2018-10-12 17:05 |
Tokyo |
Takeda Hall, Tokyo Univ. (No. 88) |
On an Experiment of a Shared Wide Area Access Network Infrastructure for Japanese Universities regarding Work Style Reforms Motoyuki Ohmori (Tottori Univ.), Koji Okamura (Kyushu Univ.) IA2018-35 |
Japanese government has been trying to reform work style in Japan. One of work style reforms is flexible work style like... [more] |
IA2018-35 pp.17-19 |
NS |
2018-05-17 10:00 |
Kanagawa |
Yokohama City Education Center |
Hierarchical Role-based Network Access Control using Software-Defined Networking Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15 |
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] |
NS2018-15 pp.1-6 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-05 14:05 |
Tochigi |
Kinugawa Onsen Hotel |
DataTrust: A Data-Centric Any-to-Any Authentication Scheme Ruidong Li, Hitoshi Asaeda (NICT) SITE2017-66 IA2017-77 |
In information-centric networking (ICN), users retrieve the published data from unpredictable data sources and any inter... [more] |
SITE2017-66 IA2017-77 pp.109-114 |
NS, CQ, ICM, NV (Joint) |
2016-11-24 15:25 |
Yamaguchi |
Shimonoseki Chember of Commerce and Industry |
[Invited Talk]
Network Services Based on Enterprise Value Coordination Toshihiro Nishizono (Nihon Univ.) NS2016-108 CQ2016-80 ICM2016-26 |
The speaker proposes configuration of a platform for implementing new network services based on coordination of enterpri... [more] |
NS2016-108 CQ2016-80 ICM2016-26 pp.39-42(NS), pp.37-40(CQ), pp.9-12(ICM) |
SAT, RCS (Joint) |
2016-08-19 09:00 |
Miyagi |
Tohoku Gakuin University |
[Special Talk]
Toward Disaster Resilient Communications Networks Fumiyuki Adachi (Tohoku Univ.) SAT2016-46 RCS2016-139 |
Available radio spectrum and energy are limited for mobile communications and therefore, they must be utilized as much e... [more] |
SAT2016-46 RCS2016-139 p.75(SAT), p.57(RCS) |
RCS, RCC, ASN, NS, SR (Joint) |
2016-07-21 14:10 |
Aichi |
|
Field evaluation of network access authentication time over wireless multihop networks Kota Tsuchie, Taketsugu Yao (OKI), Yuuichi Teranishi, Kiyohide Nakauchi (NICT) NS2016-65 |
We evaluated two network access authentication methods over wireless multihop sensor networks on an actual field. One me... [more] |
NS2016-65 pp.81-86 |
LOIS |
2015-03-06 11:10 |
Okinawa |
|
A study on the possibility of utilizing the Public Certification Service for Individuals in the field of finance or credit settlement. Kazushige Fujita, Takashi Obi, Masuyoshi Yachida, Joong Sun Lee, Naoko Taira, Makoto Oku, Eikazu Niwano, Satoshi Noritake, Kenichi Fukuda, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Tech) LOIS2014-84 |
With the introduction of the Social Security and Tax Number System, electronic authentication function, which is require... [more] |
LOIS2014-84 pp.135-140 |
IN, NV (Joint) |
2014-07-18 09:45 |
Hokkaido |
Hokkaido Univ. |
Proposal on office network setting method using SDN and authentication infrastructure Yoshinao Kikuchi, Yuji Agawa (NTT) IN2014-40 |
This paper proposes an office network setting method which based on SDN (Software Defined Network) and authentication in... [more] |
IN2014-40 pp.61-66 |
LOIS, ICM |
2014-01-16 15:40 |
Nagasaki |
Nagasaki Museum of History and Culture |
A study on cooperation between the public sector and the private sector by utilizing the Public Certification Service for Individuals. Kazushige Fujita, Takashi Obi, Chikahiro Miyokawa, Masuyoshi Yachida, Joong Sun Lee, Tetsuya Natsume, Naoko Taira, Eikazu Niwano, Makoto Kumakura, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Inst. of Tech.) ICM2013-40 LOIS2013-44 |
With the introduction of the Social Security and Tax Number System, electronic authentication function, which is require... [more] |
ICM2013-40 LOIS2013-44 pp.29-34 |
ASN, IPSJ-UBI |
2013-05-17 09:50 |
Kumamoto |
Kumamoto University |
Implementation and Evaluation of Network Access Authentication considering multi-domain environment in Wireless Sensor Networks Takahisa Sekiguchi, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) ASN2013-38 |
In a wireless sensor network, sensor nodes are scattered widely and form a network automatically.
Authentication of sen... [more] |
ASN2013-38 pp.253-258 |
IN |
2013-04-19 10:25 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Implementation and Experiments of Proactive Distributed Authentication Framework over Regional Network Ruidong Li, Kazuyuki Morioka, Yasunori Owada, Masaaki Ohnishi, Hiroaki Harai (NICT) IN2013-7 |
We are designing authentication framework for a regional network with concerns on robustness under disaster. To achieve ... [more] |
IN2013-7 pp.37-42 |
ISEC |
2012-12-12 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission Masato Hata, Masato Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2012-74 |
There is a strong demand on enhancing the security of Controller Area Network (CAN) known as a major in-vehicle network.... [more] |
ISEC2012-74 pp.15-22 |
IN |
2012-01-26 14:30 |
Hokkaido |
Asahikawa-Terminal-Hotel |
Study of distributed autonomous authentication technology for disaster-affected access networks Masahiko Mizutani, Kei Kusunoki, Yoshihiro Kawahara, Tohru Asami (Univ of Tokyo) IN2011-123 |
The Great East Japan Earthquake and the successive tsunami on 11 March 2011 caused an unforgettable historical tragedy t... [more] |
IN2011-123 pp.17-22 |
MoNA, IN (Joint) |
2011-11-18 12:00 |
Fukuoka |
|
Proactive Distributed Authentication Framework (PDAF) for Regional Network Ruidong Li, Masaaki Ohnishi, Yasunori Owada, Hiroaki Harai (NICT) IN2011-100 |
We are designing the regional network for New Generation Network (NWGN), which is the future Internet vision in Japan. R... [more] |
IN2011-100 pp.43-48 |
IN, MoNA (Joint) |
2010-11-18 10:20 |
Fukuoka |
Fukuoka Institute of Technology |
A Study of Address Management Method for Sensor Networks Yoshikazu Nakamura, Hiroshi Shibata, Koki Mitani, Takeshi Ogawa, Satoshi Kotabe, Yuichi Shimamura, Eiichi Oka (NTT) IN2010-81 |
To construct a sensor Network which is consist of numerous sensors, the authors have studied the address management meth... [more] |
IN2010-81 pp.1-6 |
ITE-BCT, ITE-CE, MoNA, CQ [detail] |
2010-09-10 13:50 |
Fukuoka |
NHK Fukuoka Station |
Secure Sensor Sharing Framework for Allowing Unbundled Sensor Owners and Service Providers Ruidong Li, Masugi Inoue (NICT) MoMuC2010-36 |
NerveNet is a prospective future platform to provide services to local residents, where managed mesh network provides fu... [more] |
MoMuC2010-36 pp.77-82 |