Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-02-29 11:35 |
Okinawa |
Okinawa Convention Center |
High-speed Anonymous Communication on Programmable Switches Defeating Active De-anonymization Attacks Yutaro Yoshinaka, Mio Kochiyama, Yuki Koizumi, Junji Takemasa, Toru Hasegawa (Osaka Univ.) NS2023-183 |
Lightweight anonymity protocol is a class of infrastructure-based anonymous communication providing the finest performan... [more] |
NS2023-183 pp.68-73 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 10:45 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design of Network-layer Anonymity Protocols using a Programmable Switch Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2022-102 |
In this paper, we present the design of an anonymity router that forwards both anonymous packets and IP packets at terab... [more] |
NS2022-102 pp.13-18 |
QIT (2nd) |
2020-12-10 17:30 |
Online |
Online |
Quantum anonymous senser which hides positions of magnetic fields Hiroto Kasai (Univ of Tsukuba/AIST), Yuki Takeuchi (NTT), Hideaki Hakoshima, Yuichiro Matsuzaki (AIST), Yasuhiro Tokura (Univ of Tsukuba) |
A lot of attention has been paid to a quantum sensing network for detecting magnetic fields in different positions.
Her... [more] |
|
RCS, NS (Joint) |
2018-12-21 15:10 |
Hiroshima |
Onomichi City Hall |
A Suit of Anonymous Communication Protocols in Delay Tolerant Networks Kazuya Sakai (TMU) NS2018-177 |
In this paper, we provide the overview of a suit of anonymous communication protocols for delay tolerant networks (DTNs)... [more] |
NS2018-177 pp.107-111 |
ISEC |
2015-05-15 14:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Path analysis method of anonymous communication system Tor Yukihiro Shibahara, Naoshi Sato (IISEC) ISEC2015-3 |
Anonymous communication system looks effective for the privacy protection because it could assure anonymity of path from... [more] |
ISEC2015-3 pp.15-22 |
ISEC, IT, WBS |
2015-03-02 15:10 |
Fukuoka |
The University of Kitakyushu |
Method of selecting anonymous communication circuit using a dynamic trust graph Yuma Shinohara, Naoshi Kaneko, Tomohiko Saito, Kazuhiko Sumi (Aoyama Gakuin Univ.) IT2014-75 ISEC2014-88 WBS2014-67 |
Tor has become popular as a software that enables anonymous communication. Tor is a software that implements the "The se... [more] |
IT2014-75 ISEC2014-88 WBS2014-67 pp.81-88 |
HCGSYMPO (2nd) |
2014-12-17 - 2014-12-19 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
A Study on Anonymous Sign Language Video Generation Considering Readability Michihiro Matsuoka, Daisuke Wakatsuki, Sumihiro Kawano (NTUT) |
To achieve an anonymous communication by sign language, we have studied an anonymous sign language video generation by a... [more] |
|
IA, ICSS |
2010-06-17 14:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Anonymous Communication Protocol for Encouraging to Report Problems in Social Groups and Its Evaluation using Game Theory Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2010-5 ICSS2010-5 |
In this paper, we propose an anonymous communication protocol for encouraging to report problems in social groups. The p... [more] |
IA2010-5 ICSS2010-5 pp.25-30 |
ISEC |
2009-09-25 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of Anonymous Authentication System Using Proxies and Its Application to an Anonymous Bulletin Board Masaya Yano, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2009-46 |
Our research group has implemented the anonymous authentication system based on a group signature scheme for Web service... [more] |
ISEC2009-46 pp.45-50 |
IN, NS (Joint) |
2009-03-03 10:50 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Anonymous Communication Mechanism Based on Mobile IPv6 between Mobile Node and Content Distribution Server Toshiyuki Fujisawa (NHK), Masaki Inamura, Toshiaki Tanaka (KDDI R&D LABS) NS2008-150 |
The opportunities that One Seg of the digital broadcasting is watched with a mobile node is increasing. One Seg is one w... [more] |
NS2008-150 pp.39-44 |
IA |
2008-11-05 15:00 |
Toyama |
Tateyama Kokusai Hotel |
Anonymous Mobile Communication with Location Privacy using Host Identity Protocol Keiji Maekawa, Yasuo Okabe (Kyoto Univ.) IA2008-43 |
Mobility protocols make it possible to keep a communication independent of migration to another network. However, there ... [more] |
IA2008-43 pp.13-17 |
IN |
2007-12-13 14:45 |
Hiroshima |
Hiroshima City University |
A Two-way Anonymous Communication Method without Routing Information Kosuke Matsubara, Masaaki Niimura, Yasushi Fuwa (Shinshu Univ.) IN2007-102 |
In Web communication, encrypted communication technology such as SSL has used to provide protection of privacy. But, in ... [more] |
IN2007-102 pp.19-23 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 17:00 |
Okayama |
Okayama Univ. |
3MN: An Anonymous Communication System Based on Multiple Encryption and Probabilistic Selections of Actions Naoki Miyake, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.) |
This paper proposes a new anonymous communication system called 3MN (3-Mode Net). The system can be regarded as an exten... [more] |
ISEC2006-61 pp.159-164 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 15:45 |
Iwate |
Iwate Prefectural University |
How to send a return receipt on anonymous channel ? Shinji Yamanaka (TOSHIBA) |
Proof of delivery (or return receipt) is a certificate of reception on network transaction from message sender to messag... [more] |
ISEC2005-60 pp.123-128 |