Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, NWS (Joint) |
2024-01-25 14:15 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Access Control Method to Prevent Session Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-162 |
In recent years, the adoption of Single Sign-On (SSO) has been increasing in web services to reduce the burden of user a... [more] |
NS2023-162 pp.19-24 |
ICSS |
2023-11-17 15:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Proposal of secure session management system using FIDO Hikaru Ishida, Takashi Imaizumi (Chiba Univ.) ICSS2023-67 |
Many web applications utilize session management to identify clients using session IDs. In this session management, a th... [more] |
ICSS2023-67 pp.114-119 |
NS |
2023-10-05 10:35 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A Design of stateless 5G core network with procedural processing Hiroki Watanabe, Atsuki Takata, Keiichi Shima (Softbank), Kunio Akashi, Yuji Sekiya (Univ. of Tokyo), Katsuhiro Horiba (Softbank) NS2023-87 |
In a standard 5G core network (CN; 5GC), a large number of User Equipments (UEs) are accommodated by a single Network Fu... [more] |
NS2023-87 pp.89-94 |
CQ |
2023-07-12 12:45 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Ultra-low latency video-split display processing technology that realizes remote communication with a sense of unity and its demonstrations Toshihito Fujiwara, Tatsuya Fukui, Satoshi Narikawa (NTT) CQ2023-8 |
In recent years, various activities in society have become remote, and there is a growing need for remote communication ... [more] |
CQ2023-8 pp.1-6 |
ET, IPSJ-CLE |
2023-06-17 15:00 |
Tokyo |
Tokyo Metropolitan University (Primary: On-site, Secondary: Online) |
Implementation and Evaluation on Learning Support System for On-Demand Classes Yasumasa Hirota, Yasuo Ebara (Osaka Electro-Communication Univ) ET2023-5 |
On-demand classes have the advantage that students can watch the class videos repeatedly to solve problems they do not u... [more] |
ET2023-5 pp.5-10 |
ICSS |
2021-11-29 15:00 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
Design and Implementation of a Session Types-based Secure Communication Protocol for Processes Xiaolong, Yuuki Takano, Atsuko Miyaji (OU) ICSS2021-50 |
For inter-process communication, the type and order of data to be passed must be specified in advance from the viewpoint... [more] |
ICSS2021-50 pp.25-30 |
PN |
2021-08-30 10:35 |
Online |
Online |
On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography Takehisa Iwakoshi (Mie Univ.) PN2021-12 |
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] |
PN2021-12 pp.1-6 |
ICSS, IPSJ-SPT |
2020-03-03 11:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Performance Evaluation of an Access Control Mechanism with Session Types Tomoya Nishiguchi, Yuuki Takano, Atsuko Miyaji (Osaka Univ.) ICSS2019-102 |
Access control system is easy to happen to bug, because implementing an access control mechanism in business logic compl... [more] |
ICSS2019-102 pp.295-300 |
PN |
2019-08-27 13:50 |
Hokkaido |
Kanpo-No-Yado Otaru |
Autonomous Driving Vehicle Control using Session Handover Goki Yamamoto, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-21 |
In a stand-alone autonomous driving vehicle, the vehicle travels by sensing its surroundings only with its own sensor. F... [more] |
PN2019-21 pp.73-79 |
SWIM, KBSE |
2019-05-25 09:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Novel Testing Approach Based on Exploratory Testing and Operation Recording Hiroyuki Kirinuki, Toshiyuki Kurabayashi, Haruto Tanno (NTT), Ippei Kumagawa, Keigo Nagata (NTT DATA) KBSE2019-7 SWIM2019-7 |
It is known that exploratory testing can detect bugs efficiently than scripted testing and is a popular activity in soft... [more] |
KBSE2019-7 SWIM2019-7 pp.43-48 |
IN, NS (Joint) |
2019-03-04 10:30 |
Okinawa |
Okinawa Convention Center |
Load Balancing using Virtual Nodes Moving in Access Atempes Adaiotive for High Availabilty Distributed Clusters Takeshi Komatsu, Kiyoshi Ueda (Nihon Univ) NS2018-218 |
The session control server applied to the carrier's network should be highly available, highly reliable, have fault tole... [more] |
NS2018-218 pp.147-151 |
IN, NS (Joint) |
2019-03-05 10:30 |
Okinawa |
Okinawa Convention Center |
ES3M: Enhanced System for Secure Session Management Naoto Watanabe, Takashi Imaizumi (Chiba Univ.) IN2018-125 |
HTTP is a stateless protocol, therefore a server can't identify a client.
The server manages a session using cookies ... [more] |
IN2018-125 pp.247-252 |
HCGSYMPO (2nd) |
|
Mie |
Sinfonia Technology Hibiki Hall Ise |
|
A poster session requires advanced communication skills of a presentator and audience. The most important skill for comm... [more] |
|
HCGSYMPO (2nd) |
|
Mie |
Sinfonia Technology Hibiki Hall Ise |
Estimation of Degree of Presentator’s Tension in Poster Session Yusuke Fukushi, Motoki Sakai (Tokyo Denki Univ) |
To increase a performance of poster presentation, a presentator should know his/her mental conditions such as tension or... [more] |
|
IN, NS, CS, NV (Joint) |
2018-09-07 09:20 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Consideration of Evaluation Dataset for Malware Detection System Hisashi Takahara (UNP) IN2018-33 |
Today, while internet cyber-attacks are increasing, protection against the cyber-attacks have become indispensable. Amon... [more] |
IN2018-33 pp.65-69 |
HCS |
2018-08-26 13:00 |
Osaka |
|
Preliminary Design of Internal and Acting Models of Agent's Ownership Desire Kaede Ueno, Naoto Yoshida, Tomoko yonezawa (Kansai Univ.) HCS2018-32 |
In this research, we aim to draw human's empathetic shared awareness to real-world objects with an artificial and anthro... [more] |
HCS2018-32 pp.1-6 |
HCGSYMPO (2nd) |
2017-12-13 - 2017-12-15 |
Ishikawa |
THE KANAZAWA THEATRE |
Behavior analysis of conversational field supporters in poster session Kosuke Morita, Toshihiko Isaka, Hiroko Tokunaga, Naoki Mukawa (Tokyo Denki Univ.) |
People feel difficulty to join conversation groups that have already been built. In this research we study poster sessio... [more] |
|
SWIM |
2017-05-19 17:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Development of Questionnaire Application Assuming Use in PC Classroom
-- Efforts for Improving Communication in Classroom -- Yoshihisa Udagawa, Yusuke Doi, Yukihiro Saito (Tokyo Polytechnic Univ.) SWIM2017-7 |
In recent years, end-of-session questionnaires using ICT are gaining momentum to facilitate communication with students.... [more] |
SWIM2017-7 pp.35-40 |
IN, ICTSSL, NWS (Joint) |
2016-10-21 09:55 |
Osaka |
Osaka Uinv. |
Suggestion and construction of the defense system for Slow HTTP DoS attack based on the session monitoring Kazuki Ikeda, Yutaka Kawahashi (Wakayama Univ.) IN2016-57 |
In recent years, with the wide spread of the Internet, many companies and organizations are providing services using the... [more] |
IN2016-57 pp.49-54 |
NS, CS, IN, NV (Joint) |
2016-09-30 13:55 |
Miyagi |
Tohoku Univ. |
Identification Method of Communication between Components of Application system based on Connection Structure of Port Number for Anomaly Detection in Cloud Computing Takaya Ide, Hitoshi Yabusaki, Kyosuke Hashimoto, Junji Kinoshita (Hitachi) NS2016-87 |
Silent failure is a problem to maintain reliability for application systems. To detect silent failures, it is effective ... [more] |
NS2016-87 pp.73-78 |