IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, IA
(Joint)
2021-12-17
17:40
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
[Short Paper] On the Impact of Communication Link Heterogeneity on Content Delivery Delay in Information-Centric Delay/Disruption-Tolerant Networking
Sagayama Hisashi, Ohnishi Michika, Matsuo Ryotaro, Ohsaki Hiroyuki (Kwansei Gakuin Univ.) IA2021-49
In recent years, it is expected that ICDTN (Information-Centric Delay/Disruption-Tolerant Networking) incorpo-
rating t... [more]
IA2021-49
pp.93-96
MIKA
(2nd)
2019-10-04
10:15
Hokkaido Hokkaido Univ. [Poster Presentation] A Study on the Average Content Delivery Delay in Information-Centric Delay-Tolerant Networking
Chuta Minamiguchi, Ryo Nakamura, Hiroyuki Ohsaki (Kwansei Gakuin univ.)
In recent years, the realization of an information-centric network
(ICN) in environments where communication links betw... [more]

ISEC 2014-12-19
14:50
Tokyo Kikai-Shinko-Kaikan Bldg. Space-Time Encoding Schemes with No False Positives
Ryosuke Shiraishi, Takashi Satoh, Masaki Shimoizumi (Univ. Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-71
IP traceback is a technique to detect attackers in denial of service (DoS) and distributed DoS (DDoS) attacks. We consid... [more] ISEC2014-71
pp.11-15
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:15
Hokkaido San-Refure Hakodate DDoS Attack Path Reconstruction in Space-Time Encoding Schemes
Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45
pp.315-319
ICSS 2012-03-16
13:20
Tokyo Kikai-Shinko-Kaikan Bldg. Device for Transparent Probabilistic Packet Marking
Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (Univ. of Tsukuba/JPNIC), Eiji Okamoto (Univ. of Tsukuba) ICSS2011-43
Probabilistic Packet Marking (PPM) is known as better defence solution for Denial of Service (DoS) attack. However, most... [more] ICSS2011-43
pp.25-30
ISEC, IT, WBS 2011-03-04
13:50
Osaka Osaka University Oblivious Symmetric Key Encryption and Its Application to IP-Traceback
Ryo Nojima (NICT), Youki Kadobayashi (NAIST) IT2010-99 ISEC2010-103 WBS2010-78
In this paper, we consider the oblivious symmetric key encryption protocol
and its application to the {\em privacy-pres... [more]
IT2010-99 ISEC2010-103 WBS2010-78
pp.199-203
IA 2008-09-26
10:55
Tokyo Kikai-Shinko-Kaikan Bldg. A Consideration for Effectiveness of Traceback Messages Forwarding in Mesh of Trees Topology
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2008-32
In this paper, we explain the effectiveness of traceback messages forwarding in mesh of trees network topology. Within o... [more] IA2008-32
pp.19-24
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Variable Probabilistic Packet Mareking with TTL for IP Traceback
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more]
ISEC2008-31 SITE2008-25
pp.109-114
RCS 2008-06-27
09:25
Mie Mie University HOTSPOT-BASED TRACEBACK SCHEME USING OVERHEARING IN MOBILE AD HOC NETWORK
Naofumi Sugaya, Takeshi Yatagai, Iwao Sasase (Keio Univ.) RCS2008-17
In Mobile Ad Hoc Network, Hotspot-Based Traceback Scheme is effective for tracebacking to the attacking node. However, t... [more] RCS2008-17
pp.7-12
NS, IN
(Joint)
2008-03-07
13:10
Okinawa Bankoku Shinryokan Effect of Spoofed iTrace Packets and Its Countermeasure
Tomonori Takada, Masaya Nakayama (The Univ. of Tokyo) NS2007-193
ICMP Traceback with Periodical Transmission (iTrace-PT) is an effective method to specify attackers of low rate DoS atta... [more] NS2007-193
pp.341-346
IA 2007-10-25
16:45
Fukuoka Fukuoka SRP Center Building Application of the iTrace-PT Method to Reflector based DDoS Attack and Its Effect
Tomonori Takada, Masaya Nakayama (Univ. of Tokyo) IA2007-35
Recently, reflector-based DDoS (DRDoS) attack has become a new threat.
It uses DNS, Web, and other servers as reflector... [more]
IA2007-35
pp.27-31
CQ, LOIS, IE, IEE-CMN, ITE-ME 2007-09-27
14:40
Tokushima The university of Tokushima Analysis of Secure Mutual Authentication Methods against the Stolen-Verfier Attack
Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) CQ2007-47 OIS2007-37 IE2007-44
In 2006, Tsuji et al. proposed a password authentication method called the SAS-X(2), which is secure against the stolen-... [more] CQ2007-47 OIS2007-37 IE2007-44
pp.61-64
CQ, NS, ICM
(Joint)
2006-11-16
14:10
Tottori Tottori Univ. of Environmental Studies The proposal of Hybrid IP traceback system against DDoS attack
Hironori Yanai, Hidenori Nakazato, Hideyoshi Tominaga (Waseda Univ) NS2006-126 CQ2006-67 TM2006-40
IP Traceback technique is an important countermeasure for DDoS attack. Many IP traceback techniques
have been proposed.... [more]
NS2006-126 CQ2006-67 TM2006-40
pp.19-24(NS), pp.49-54(CQ), pp.19-24(TM)
IN, NS, CS
(Joint)
2006-09-14
13:30
Miyagi   [Invited Talk] On Tracing and Mitigating Distributed Denial of Service Attacks
Nirwan Ansari (New Jersey Inst. of Tech.) NS2006-76 IN2006-56 CS2006-22
The CSI/FBI surveys have been revealing that the (distributed) denial of service ((D)DoS) attacks are still a major conc... [more] NS2006-76 IN2006-56 CS2006-22
pp.33-43(NS), pp.43-53(IN), pp.1-11(CS)
IN, NS, CS
(Joint)
2006-09-15
16:00
Miyagi   Increasing Efficiency of DoS-Attack Traceback over Mobile Networks
Taishi Tochiori, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.) CS2006-35
Denial of Service(DoS) attacks pose a serious threat to the Internet. Mobile networks, which are expected to develop rap... [more] CS2006-35
pp.79-84
ISEC, SITE, IPSJ-CSEC 2006-07-20
13:00
Okayama Okayama Univ. A Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems
Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
The interconnected IP traceback is a method for identifying theoriginator of an IP packet. A traceback server sends quer... [more] ISEC2006-31 SITE2006-28
pp.161-165
IN 2006-02-17
09:30
Kochi Kochi Univ. of Technology Methods for Improving Performance on Packet Marking by Reducing Marking Duplicates
Hiroomi Isozaki, Shingo Ata, Ikuo Oka (Osaka City Univ)
Probabilistic Packet Marking (PPM) is one of the methods on IP traceback. In this method, intermediate router embeds (i.... [more] IN2005-151
pp.49-54
ICM, NS, CQ
(Joint)
2005-11-17
14:00
Shimane Kunibiki-messe (Matsue city) Traffic Pattern Filtering Based on Lower Bounds of Traffic Volume for Improving DDoS Traceback Accuracy
Hironori Utsumi, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto (Tohoku Univ.)
For Traffic pattern based traceback techniques, non-DoS traffic included in DoS traffic becomes a source of noise which ... [more] NS2005-110
pp.1-4
PN, IN
(Joint)
2005-10-14
17:00
Kanagawa Keio Univ. (Yagami) Comparison of the Efficiency of IP Traceback Schemes Based on Probabilistic Packet Marking
Keisei Oh, Shigeo Shioda (Chiba Univ.)
Probabilistic packet marking (PPM) is an IP traceback technique that lets routers probabilistically mark packets with pa... [more] IN2005-99
pp.67-72
CS, IN, NS
(Joint)
2005-09-15
09:25
Miyagi Tohoku Univ. A Mathematical Framework for Evaluating the Efficiency of IP Traceback Schemes Using Packet Marking
Keisei Oh, Shigeo Shioda (Chiba Univ.)
Probabilistic packet marking (PPM) is an IP traceback technique that identifies network paths back to denial of service ... [more] IN2005-66
pp.31-36
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan