Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-02-29 11:35 |
Okinawa |
Okinawa Convention Center |
Real-time Application Identification Scheme and Evaluation Method Using Machine Learning Tatsuhiro Ou, Kenji Kanai, Akihiro Nakao (Tokyo Univ.) NS2023-189 |
With the diversification of mobile applications, the implementation of priority control that meets the communication req... [more] |
NS2023-189 pp.103-108 |
RISING (3rd) |
2023-10-31 10:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Real-time Application Identification Scheme and Evaluation Method Using Machine Learning Tatsuhiro Ou, Kenji Kanai, Akihiro Nakao (Tokyo Univ.) |
With the diversification of mobile applications, the implementation of priority control that meets the communication requ... [more] |
|
IN, NS (Joint) |
2023-03-03 11:40 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Real-time application identification method for mobile networks using machine learning Tatsuhiro Ou, Akihiro Nakao (Tokyo Univ.) NS2022-232 |
With the diversification of mobile applications, the implementation of priority control that meets the communication requ... [more] |
NS2022-232 pp.372-377 |
RISING (3rd) |
2022-10-31 14:00 |
Kyoto |
Kyoto Terrsa (Day 1), and Online (Day 2, 3) |
[Poster Presentation]
Proposal of Traffic Collection and System Operation Schemes for Real-time Application Identification Tatsuhiro Ou, Norihiro Fukumoto, Akihiro Nakao (Tokyo Univ.) |
With the diversification of mobile applications, the need to identify the application names of traffic is increasing for ... [more] |
|
NS |
2020-05-14 - 2020-05-15 |
Online |
Online |
A Service Identification Based on Frequencies of SNIs Yuto Soma, Akihiro Yamauchi (Kogakuin Univ.), Akihiro Nakao (UTokyo), Masato Oguchi (Ochanomizu Univ.), Shu Yamamoto (UTokyo), Saneyasu Yamaguchi, Aki Kobayashi (Kogakuin Univ.) NS2020-16 |
In the internet, a variety of services, such as video sharing and web search, are provided. Service identification from ... [more] |
NS2020-16 pp.51-56 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Local survey on transitioning of TLS version and EV Certificates Usage (FY2019 4Q) Yuji Suga (IIJ) ICSS2019-86 |
(To be available after the conference date) [more] |
ICSS2019-86 pp.109-111 |
ICTSSL |
2019-05-30 16:15 |
Hokkaido |
HOKKAIDO CHUSYO KIGYO KAIKAN |
[Memorial Lecture]
Secure Communication Technology for Wide Area and Multiple Control of Drone Operation
-- Award Lecture -- Toshiyuki Ito (Wasada University), Kazuo Ichihara (Prodrone), Hiroyuki Tanaka, Katsunori Kogata, Masakatsu Matsuo (Panasonic), Ryoji Nishizawa, Mikio Fujiwara, Masahide Sasaki (NICT) ICTSSL2019-4 |
In recent years, the development of the drone technology is progressing significantly, and its practical applications
f... [more] |
ICTSSL2019-4 pp.17-20 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 09:40 |
Ishikawa |
|
A Study on Clustering Capability of Each Field of Handshake in TLS for Session Clustering Hiroaki Yamauchi, Ryo Matsuzaki (Kogakuin Univ.), Akihiro Nakao (Univ. of Tokyo), Masato Oguchi (Ochanomizu Univ.), Shu Yamamoto (Univ. of Tokyo), Saneyasu Yamaguchi (Kogakuin Univ.) NS2018-141 |
Service identification is important to giving priority in a network element to packets of important services. In an exis... [more] |
NS2018-141 pp.63-68 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 10:05 |
Ishikawa |
|
Identification of Service of Communication with TLS based on SNI Analyses Ryo Matsuzaki, Hiroaki Yamauchi (Kogakuin Univ.), Akihiro Nakao (Univ. of Tokyo), Masato Oguchi (Ochanomizu Univ.), Shu Yamamoto (Univ. of Tokyo), Saneyasu Yamaguchi (Kogakuin Univ.) NS2018-142 |
In a case of a severe disaster, significant congestion occurs and rescuing using network cannot be performed easily. In ... [more] |
NS2018-142 pp.69-74 |
NS |
2018-01-18 14:30 |
Okinawa |
Ishigakishi-Shoko-Kaikan |
Evaluation of Service Identification Based on Multiple TLS Sessions Clustering Masaki Hara, Shinnosuke Nirasawa (Kogakuin Univ.), Akihiro Nakao (UTokyo), Masato Oguchi (Ochanomizu Univ.), Shu Yamamoto (UTokyo), Saneyasu Yamaguchi (Kogakuin Univ.) NS2017-147 |
Identifying services of the traffic by given IP network flow is essential for various purposes, such as management of Qo... [more] |
NS2017-147 pp.17-22 |
MoNA, IN (Joint) |
2015-11-18 13:30 |
Kumamoto |
Kumamoto University |
Missions of Information-Centric Networking Tohru Asami, Masaru Takagi, Yoshihiro Kawahara (TODAI), Atsushi Tagami (KDDIR&D Labs.), Kenichi Nakamura (Panasonic), Tomohiko Yagyu (NEC), Hidenori Nakazato (Waseda) IN2015-67 |
From the point of views of communication secrecy, traffic engineering and information leakage prevention, this paper rev... [more] |
IN2015-67 pp.35-40 |
ICSS |
2015-03-04 10:25 |
Okinawa |
Meio Univiersity |
Improving certificate validation function in SSL/TLS implementations of web browser Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST) ICSS2014-84 |
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] |
ICSS2014-84 pp.127-132 |
ISEC, LOIS, SITE |
2014-11-22 13:20 |
Hyogo |
|
Improving certificate validation in SSL/TLS implementations Satoshi Kamekawa, Atsuko Miyaji, Yuichi Futa (JAIST) ISEC2014-67 SITE2014-58 LOIS2014-37 |
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] |
ISEC2014-67 SITE2014-58 LOIS2014-37 pp.65-70 |
IA, ICSS |
2013-06-20 15:00 |
Niigata |
Ao-re Nagaoka |
Vulnerability of RC4 in SSL/TLS Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4 |
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] |
IA2013-4 ICSS2013-4 pp.19-24 |
ICSS |
2012-11-22 16:50 |
Hiroshima |
Miyajima Mori-no-Yado |
Are measures against SSL/TLS sites dependent on the category which that site belongs?
-- obtained by crawling of renegotiation functions and RSA key lengths -- Yuji Suga (IIJ) ICSS2012-56 |
Are measures against SSL/TLS sites dependent on the category which that site belongs?
It has been recognized man-in-t... [more] |
ICSS2012-56 p.67 |
IN |
2008-01-18 11:50 |
Aichi |
Nagoya Institute of Technology |
Wireless Network Authentication uses OpenVPN
-- Wireless Network Authentication of SSL-VPN -- Shincho Ban, Yoshiyori Urano (Waseda Univ) IN2007-133 |
This paper proposes to achieve the user authentication and the terminal management by using the characteristic of OpenVP... [more] |
IN2007-133 pp.83-86 |
ISEC |
2007-12-19 15:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of a Privacy Enhancing SSL/TLS Protocol Based on Group Signatures Hiroki Obayashi, Toru Nakanishi, Jun Kawashima, Nobuo Funabiki (Okayama Univ.) ISEC2007-123 |
While various Web services have spread, a lot of private information leaks have been often caused by the service vendors... [more] |
ISEC2007-123 pp.79-84 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:25 |
Okayama |
Okayama Univ. |
IDS for SSL Enncrypted Web Traffic Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.) |
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] |
ISEC2006-32 SITE2006-29 pp.167-173 |