Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, ICM |
2024-01-26 11:25 |
Nagasaki |
Nagasaki Prefectural Art Museum (Primary: On-site, Secondary: Online) |
A VPN Method for Security Usage of Public Wireless LANs Hinata Tanoue, Akihiro Shimizu (Kochi Univ. of Tech.) ICM2023-37 LOIS2023-41 |
In public wireless LAN environments, ensuring security is an important issue. An effective method for secure communicati... [more] |
ICM2023-37 LOIS2023-41 pp.51-56 |
MBE, MICT, IEE-MBE [detail] |
2023-01-17 10:40 |
Saga |
|
Potential problems that will arise for hospital LANs Eisuke Hanada (Saga Univ.), Takato Kudou (Oita Univ.) MICT2022-46 MBE2022-46 |
Hospital Information Systems (HIS) have been introduced in almost all large hospitals. In addition to this, IP networks ... [more] |
MICT2022-46 MBE2022-46 pp.17-21 |
RCS, SR, SRW (Joint) |
2022-03-04 11:00 |
Online |
Online |
[Special Invited Talk]
Looking back the Research and Development of Wireless Ubiquitous Systems Shuji Kubota (SIT) RCS2021-286 SR2021-111 SRW2021-84 |
Since joining the research and development of wireless systems in 1980, the purpose has been become advanced from connec... [more] |
RCS2021-286 SR2021-111 SRW2021-84 p.170(RCS), p.117(SR), p.65(SRW) |
IA, ICSS |
2021-06-21 16:25 |
Online |
Online |
[Invited Talk]
An Authentication Scheme for WLAN Physical Layer Miyuki Hirose (KIT) IA2021-8 ICSS2021-8 |
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] |
IA2021-8 ICSS2021-8 p.43 |
SANE |
2021-05-13 13:40 |
Online |
Online |
A study on specific emitter identification method using modified Allan variance and correlation coefficients ZHU YAN, Sei Arima, Ryo Hirayama (Ritsumeikan), Masaaki Kobayashi (AOC), Takeshi Kumaki (Ritsumeikan) SANE2021-5 |
In recent years, with the development and spread of information technology, wireless communication has been applied in v... [more] |
SANE2021-5 pp.27-31 |
IA, IN (Joint) |
2017-12-15 10:00 |
Hiroshima |
Hiroshima City Univ. |
[Invited Talk]
World trends in the Next Generation Hotspot (NGH) and the development of eduroam-on-NGH system Hideaki Goto (Tohoku Univ.) IN2017-60 IA2017-61 |
Next Generation Hotspot (NGH), based on the specification known as Hotspot 2.0 and Passpoint, is being adopted for the p... [more] |
IN2017-60 IA2017-61 pp.85-90(IN), pp.49-54(IA) |
ICSS, IA |
2016-06-06 15:40 |
Saga |
Saga University |
Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4 |
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] |
IA2016-4 ICSS2016-4 pp.19-24 |
RCC, ITS, WBS |
2015-12-18 11:25 |
Okinawa |
Okinawa Industry Support Center |
A Secure and Fast Industrial WLAN System for Seamless Roaming Keishi Yamaguchi, Mitsuru Hamada, DucKhai Lam, Nico Surantha, Yuhei Nagao, Masayuki Kurosaki, Hiroshi Ochi (KIT) WBS2015-72 ITS2015-44 RCC2015-74 |
In this paper, an industrial Wireless Local Area Network (iWLAN) solution to control industrial robots (iRBs)
in large-... [more] |
WBS2015-72 ITS2015-44 RCC2015-74 pp.185-190 |
ICSS |
2015-11-26 15:25 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Study on Rogue Access Point detection method Takaaki Hoyo, Atsushi Kanai (Hosei Univ.) ICSS2015-39 |
Wireless LAN access points are installed everywhere, it has become possible to connect to the Internet. While such acces... [more] |
ICSS2015-39 pp.25-30 |
CPSY, IPSJ-ARC |
2015-10-08 10:00 |
Chiba |
Makuhari-messe |
A quick and secure method for connecting the wireless LAN by using a lazer pointing device Shuntaro Takahara (Tokyo Univ.), Fumihiko Takayama, Wataru Kitada, Hidenori Tsuji (IIT Inc.), Hidetsugu Irie, Shuichi Sakai (Tokyo Univ.) CPSY2015-56 |
Today, it is essential to connect to the Wireless LAN because portable terminals which can be connected to the networks ... [more] |
CPSY2015-56 pp.53-57 |
RCS, IN (Joint) |
2015-05-22 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Using Signal Strength to prevent sessinon hijacking in IEEE 802.11 Nariaki Tamaki, Takehiro Kawata (NTT) IN2015-12 |
We propose a method for detecting malicious frames used to disconnect legitimate sessions, and preventing session hijack... [more] |
IN2015-12 pp.55-60 |
NS, IN (Joint) |
2015-03-03 13:40 |
Okinawa |
Okinawa Convention Center |
Bring Your Own Personal Sessions over Public Wireless Systems
-- The Prototype of Wi-Fi Networks over Virtual Private Networks -- Toshikazu Nishimura (Ritsumeikan Univ.) IN2014-156 |
Although current information network systems including the internet access lines, such as wireless LANs or mobile networ... [more] |
IN2014-156 pp.209-213 |
IA, IN (Joint) |
2014-12-18 12:50 |
Hiroshima |
Hiroshima City University |
Detecting rogue access points by traffic analysis on both wireless and wired LAN Takehiro Kawata, Takeshi Yada (NTT) IN2014-91 |
We propose a novel method for detecting rogue access points(APs) of IEEE 802.11 wireless LAN connected to managed networ... [more] |
IN2014-91 pp.1-4 |
IN |
2014-04-18 13:25 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
A Secure Route Selection Method for Smart Meters Yuya Takii, Yuji Ikema, Osamu Mizuno (Kogakuin Univ) IN2014-5 |
Smart grid provide efficiency electricity usage situation balanced for supply and demands of electricity power and using... [more] |
IN2014-5 pp.55-60 |
NS, IN (Joint) |
2014-03-07 13:20 |
Miyazaki |
Miyazaki Seagia |
A NAV Period Control and CW Control of an Access Point for Keeping Transmission Opportunity and Achieving Fairness in Wireless LAN Ryunosuke Hayami, Satoshi Ohzahata, Toshihiko Kato (UEC) NS2013-273 |
In this paper, we propose a dynamic NAV control method to suppress excessive traffic of EDCA terminal that generates TCP... [more] |
NS2013-273 pp.561-566 |
IN, NWS (Joint) |
2014-01-24 14:30 |
Aichi |
Nagoya International Center |
A NAV Period Control for Keeping Transmission Opportunity and Achieving Fairness in Wireless LAN Ryunosuke Hayami, Satoshi Ohzahata, Toshihiko Kato (UEC) IN2013-137 |
In this paper, we propose a extended dynamic NAV control method to suppress excessive traffic of EDCA terminal with smal... [more] |
IN2013-137 pp.115-120 |
ASN, IPSJ-UBI |
2013-05-16 16:40 |
Kumamoto |
Kumamoto University |
[Poster Presentation]
A NAV Period Control for Suppressing Excessive Traffic from Terminals in Wireless LAN Ryunosuke Hayami, Satoshi Ohzahata, Toshihiko Kato (Univ. of Electro- Comm.) ASN2013-29 |
There is a problem that DCF terminal transmits low rate when EDCA terminals and DCF terminals coexists in the same AP be... [more] |
ASN2013-29 pp.149-150 |
ISEC, LOIS |
2011-11-15 09:00 |
Osaka |
Osaka Electro-Communication University |
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-48 LOIS2011-42 |
WEP is a security protocol in a wireless LAN network, and its vulnerability has been pointed out.Many key recovering att... [more] |
ISEC2011-48 LOIS2011-42 pp.93-100 |
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] |
2011-09-20 13:50 |
Ehime |
|
A Proposal of a WEP Operation Secure Against the Key-Recovery Attack Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) LOIS2011-17 IE2011-50 EMM2011-28 |
WEP is a security protocol in a wireless LAN network, and its ulnerability has been pointed out.Many key recovering atta... [more] |
LOIS2011-17 IE2011-50 EMM2011-28 pp.11-16 |
AP, SAT (Joint) |
2011-07-13 14:35 |
Nagano |
Fac. Eng., Shinshu Univ. |
A Compact Wearable Planar Inverted-F Antenna at ISM Band for On-Body Communications at 2.45 GHz Chia-Hsien Lin, Kazuyuki Saito, Masaharu Takahashi, Koichi Ito (Chiba Univ.) AP2011-27 |
Body-centric wireless communications (BCWC) became an active area of research due to widely applications such as E-Healt... [more] |
AP2011-27 pp.1-6 |