IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 74  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS 2024-05-09
14:55
Mie Sinfonia Technology Hibiki Hall Ise
(Primary: On-site, Secondary: Online)
On Ordered Proof of Transit Based on eBPF for Service Function Chaining
Takanori Hara (NAIST), Masahiro Sasabe (Kansai Univ.)
(To be available after the conference date) [more]
RCC, ISEC, IT, WBS 2024-03-13
11:35
Osaka Osaka Univ. (Suita Campus) Proxy Re-Authentication Capable of Key and Data Compression
Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65
pp.52-59
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
NS, IN
(Joint)
2024-02-29
09:20
Okinawa Okinawa Convention Center A Study on Dynamic TCP Proxy Mechanism Based on Measurement of Packet Loss Rate
Atsuki Hata, Hiroyasu Obata, Chisa Takano (Hiroshima City Univ.) IN2023-77
Recently, various technologies have been considered to increase the speed of wireless communications.
On the other hand... [more]
IN2023-77
pp.71-76
ET 2023-05-13
13:35
Online Online Can Metaverse Create Effective and Effectual Education/Learning Environment?
Toyohide Watanabe (NISRI) ET2023-2
The objective in Metaverse is to construct another activity space virtually, different from our real space, and also mak... [more] ET2023-2
pp.8-13
IA, ICSS 2021-06-22
09:50
Online Online Etherpot: A honeypot for observing cyberattacks on Ethereum client
Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] IA2021-11 ICSS2021-11
pp.56-61
NS, NWS
(Joint)
2021-01-21
13:55
Online Online Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy
Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] NS2020-111
pp.9-15
ICM 2019-03-08
09:00
Okinawa   Proposal of Distributed VDI System using VDI Proxy for Cloud Era
Naoki Oguchi, Yosuke Takano (Fujitsu Lab), Shunji Abe (NII) ICM2018-56
Recently, information leak due to loosing PC and malwares, etc., is becoming a social problem. VDI system can be one of ... [more] ICM2018-56
pp.37-42
IA, IN
(Joint)
2018-12-14
11:35
Hiroshima Hiroshima Univ. A Study of the ICN Performance Enhancing Proxy for the Global Content Distribution
Kazuaki Ueda, Atsushi Tagami (KDDI Research) IN2018-68
In this paper, we reveal the potential performance degradation in the global content distribution over Information–Centr... [more] IN2018-68
pp.55-60
ET 2018-11-10
15:25
Tokyo Tokyo Polytechnic University Discussion of a facial authentication method using estimation of time series facial image in e-Testing
Taisuke Kawamata, Takako Akakura (TUS) ET2018-62
One problem in e-testing is cheating easily by impersonation. In our previous work, a facial authentication was proposed... [more] ET2018-62
pp.47-50
ICM 2018-03-09
14:30
Okinawa   Proposal of latency improving method in VDI system using VDI Proxy
Naoki Oguchi, Yosuke Takano (Fujitsu Lab), Shunji ABE (NII) ICM2017-77
Recently, information leak due to loosing PC is becoming a social problem. VDI system can be one of solutions, where use... [more] ICM2017-77
pp.127-132
IA, SITE, IPSJ-IOT [detail] 2018-03-05
14:30
Tochigi Kinugawa Onsen Hotel Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture
Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] SITE2017-65 IA2017-76
pp.91-96
IA 2017-11-10
11:55
Kumamoto Hotel Greenpia Minamiaso A Low-Interaction Honeypot Observing Potential Vulnerabilities against HTTP/2
Katsuki Koiwa, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-26
A honeypots are used as a mechanism to detect cyber attacks against unknown vulnerabilities. Honeypot is a decoy system... [more] IA2017-26
pp.19-23
ISEC 2017-05-12
10:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Key-Updatable Searchable Encryption -- Applying Proxy Re-Encryption with Keyword Search --
Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more]
ISEC2017-1
pp.1-6
CNR 2015-12-18
14:00
Kanagawa   Development of a Proxy Server based on RSNP to Retrive Weather and Disarster Information from JMA
Sho'ji Suzuki (FUN) CNR2015-28
We propose a framework for robots to subscribe weather and disaster information that is used to implement a network base... [more] CNR2015-28
pp.71-74
IN 2015-10-16
13:05
Osaka Osaka University Improving Traffic Load Distribution for Tor Network
Timothy Girry Kale, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato (UEC) IN2015-58
The Tor network has its user grown by thousands every year. The increasing number of users around the world makes Tor be... [more] IN2015-58
pp.29-34
ICSS 2015-03-04
14:30
Okinawa Meio Univiersity Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] ICSS2014-93
pp.181-186
NS, IN
(Joint)
2015-03-03
09:40
Okinawa Okinawa Convention Center Design and Implementation of Gateway Implementing Subflow Control Policies using Multipath TCP Proxy
Yu Okada (Tokyo Tech), Masayoshi Shimamura (Network Application Engineering Labs), Katsuyoshi Iida (Tokyo Tech) NS2014-209
Multipath TCP (MPTCP) is a method to utilize multiple links to improve the communication quality of applications. Howeve... [more] NS2014-209
pp.185-190
ICM, CQ, NS, NV
(Joint)
2014-11-14
16:00
Kochi Kochi-City-Culture-Plaza CUL-PORT An introduction method of Multipath TCP to mobile core networks and its evaluations
Yuji Kojima, Takeshi Kawasaki, Junichi Suga, Ryuichi Takechi (FUJITSU LAB.) NS2014-146
The number of mobile terminal that has both a cellular interface and a Wi-Fi interface has been growing in recent years.... [more] NS2014-146
pp.105-110
NS 2014-10-16
16:40
Shimane Matsue Terrsa A Design of Circuit Switching Method for Reducing Congestion in the Tor Network
Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato (Univ. of Electro-Comm.) NS2014-119
The Tor network is a distributed circuit-switching overlay network, and consists of voluntarily run onion routers around... [more] NS2014-119
pp.87-92
 Results 1 - 20 of 74  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan