Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS |
2024-05-09 14:55 |
Mie |
Sinfonia Technology Hibiki Hall Ise (Primary: On-site, Secondary: Online) |
On Ordered Proof of Transit Based on eBPF for Service Function Chaining Takanori Hara (NAIST), Masahiro Sasabe (Kansai Univ.) |
(To be available after the conference date) [more] |
|
RCC, ISEC, IT, WBS |
2024-03-13 11:35 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
RCC, ISEC, IT, WBS |
2024-03-13 14:15 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-encryption based on LPN Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 |
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] |
IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70 pp.79-86 |
NS, IN (Joint) |
2024-02-29 09:20 |
Okinawa |
Okinawa Convention Center |
A Study on Dynamic TCP Proxy Mechanism Based on Measurement of Packet Loss Rate Atsuki Hata, Hiroyasu Obata, Chisa Takano (Hiroshima City Univ.) IN2023-77 |
Recently, various technologies have been considered to increase the speed of wireless communications.
On the other hand... [more] |
IN2023-77 pp.71-76 |
ET |
2023-05-13 13:35 |
Online |
Online |
Can Metaverse Create Effective and Effectual Education/Learning Environment? Toyohide Watanabe (NISRI) ET2023-2 |
The objective in Metaverse is to construct another activity space virtually, different from our real space, and also mak... [more] |
ET2023-2 pp.8-13 |
IA, ICSS |
2021-06-22 09:50 |
Online |
Online |
Etherpot: A honeypot for observing cyberattacks on Ethereum client Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11 |
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] |
IA2021-11 ICSS2021-11 pp.56-61 |
NS, NWS (Joint) |
2021-01-21 13:55 |
Online |
Online |
Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111 |
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] |
NS2020-111 pp.9-15 |
ICM |
2019-03-08 09:00 |
Okinawa |
|
Proposal of Distributed VDI System using VDI Proxy for Cloud Era Naoki Oguchi, Yosuke Takano (Fujitsu Lab), Shunji Abe (NII) ICM2018-56 |
Recently, information leak due to loosing PC and malwares, etc., is becoming a social problem. VDI system can be one of ... [more] |
ICM2018-56 pp.37-42 |
IA, IN (Joint) |
2018-12-14 11:35 |
Hiroshima |
Hiroshima Univ. |
A Study of the ICN Performance Enhancing Proxy for the Global Content Distribution Kazuaki Ueda, Atsushi Tagami (KDDI Research) IN2018-68 |
In this paper, we reveal the potential performance degradation in the global content distribution over Information–Centr... [more] |
IN2018-68 pp.55-60 |
ET |
2018-11-10 15:25 |
Tokyo |
Tokyo Polytechnic University |
Discussion of a facial authentication method using estimation of time series facial image in e-Testing Taisuke Kawamata, Takako Akakura (TUS) ET2018-62 |
One problem in e-testing is cheating easily by impersonation. In our previous work, a facial authentication was proposed... [more] |
ET2018-62 pp.47-50 |
ICM |
2018-03-09 14:30 |
Okinawa |
|
Proposal of latency improving method in VDI system using VDI Proxy Naoki Oguchi, Yosuke Takano (Fujitsu Lab), Shunji ABE (NII) ICM2017-77 |
Recently, information leak due to loosing PC is becoming a social problem. VDI system can be one of solutions, where use... [more] |
ICM2017-77 pp.127-132 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-05 14:30 |
Tochigi |
Kinugawa Onsen Hotel |
Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76 |
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] |
SITE2017-65 IA2017-76 pp.91-96 |
IA |
2017-11-10 11:55 |
Kumamoto |
Hotel Greenpia Minamiaso |
A Low-Interaction Honeypot Observing Potential Vulnerabilities against HTTP/2 Katsuki Koiwa, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2017-26 |
A honeypots are used as a mechanism to detect cyber attacks against unknown vulnerabilities. Honeypot is a decoy system... [more] |
IA2017-26 pp.19-23 |
ISEC |
2017-05-12 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1 |
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more] |
ISEC2017-1 pp.1-6 |
CNR |
2015-12-18 14:00 |
Kanagawa |
|
Development of a Proxy Server based on RSNP to Retrive Weather and Disarster Information from JMA Sho'ji Suzuki (FUN) CNR2015-28 |
We propose a framework for robots to subscribe weather and disaster information that is used to implement a network base... [more] |
CNR2015-28 pp.71-74 |
IN |
2015-10-16 13:05 |
Osaka |
Osaka University |
Improving Traffic Load Distribution for Tor Network Timothy Girry Kale, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato (UEC) IN2015-58 |
The Tor network has its user grown by thousands every year. The increasing number of users around the world makes Tor be... [more] |
IN2015-58 pp.29-34 |
ICSS |
2015-03-04 14:30 |
Okinawa |
Meio Univiersity |
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] |
ICSS2014-93 pp.181-186 |
NS, IN (Joint) |
2015-03-03 09:40 |
Okinawa |
Okinawa Convention Center |
Design and Implementation of Gateway Implementing Subflow Control Policies using Multipath TCP Proxy Yu Okada (Tokyo Tech), Masayoshi Shimamura (Network Application Engineering Labs), Katsuyoshi Iida (Tokyo Tech) NS2014-209 |
Multipath TCP (MPTCP) is a method to utilize multiple links to improve the communication quality of applications. Howeve... [more] |
NS2014-209 pp.185-190 |
ICM, CQ, NS, NV (Joint) |
2014-11-14 16:00 |
Kochi |
Kochi-City-Culture-Plaza CUL-PORT |
An introduction method of Multipath TCP to mobile core networks and its evaluations Yuji Kojima, Takeshi Kawasaki, Junichi Suga, Ryuichi Takechi (FUJITSU LAB.) NS2014-146 |
The number of mobile terminal that has both a cellular interface and a Wi-Fi interface has been growing in recent years.... [more] |
NS2014-146 pp.105-110 |
NS |
2014-10-16 16:40 |
Shimane |
Matsue Terrsa |
A Design of Circuit Switching Method for Reducing Congestion in the Tor Network Kale Timothy Girry, Satoshi Ohzahata, Celimuge Wu, Toshihiko Kato (Univ. of Electro-Comm.) NS2014-119 |
The Tor network is a distributed circuit-switching overlay network, and consists of voluntarily run onion routers around... [more] |
NS2014-119 pp.87-92 |