Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2018/03/05)

DataTrust: A Data-Centric Any-to-Any Authentication Scheme

Ruidong Li(NICT),  Hitoshi Asaeda(NICT),  

[Paper #]SITE2017-66,IA2017-77
Evaluations of The Structure of ID/locator Resolution System for Inter Mesh Networks

Masaaki Ohnishi(Tokyo Inst. of Tech.),  Yasunori Owada(NICT),  Kazuyuki Shudo(Tokyo Inst. of Tech.),  

[Paper #]SITE2017-67,IA2017-78
Evaluation and Application of Packet Loss Detection Mechanism for Content-Centric Networking

Ryo Nakamura(Kwansei Gakuin Univ.),  Hiroyuki Ohsaki(Kwansei Gakuin Univ.),  

[Paper #]SITE2017-68,IA2017-79
Automatic Construction Mechanism for Experimental Virtual Network Considering Network Topology

Kazuki Hayashi(Keio Univ.),  Hiroki Watanabe(Keio Univ.),  Takao Kondo(Keio Univ.),  Fumio Teraoka(Keio Univ.),  

[Paper #]SITE2017-62,IA2017-73
Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture

Hiroyuki Yanagi(Tokai Univ.),  Hayato Kimura(Tokai Univ.),  Tohru Kondo(Hiroshima Univ.),  Hidenobu Watanabe(Hiroshima Univ.),  Toshihiro Ohigashi(Tokai Univ.),  

[Paper #]SITE2017-65,IA2017-76
A Design and an Implementation about Password-Free Operation of Authenticator Registration in FIDO

Takahiro Oriishi(Tokushima Univ.),  Kenji Ohira(Tokushima Univ.),  Michitomo Morii(Tokushima Univ.),  Hiroki Tanioka(Tokushima Univ.),  Masahiko Sano(Tokushima Univ.),  Kenji Matsuura(Tokushima Univ.),  Tetsushi Ueta(Tokushima Univ.),  

[Paper #]SITE2017-63,IA2017-74
Proposal of Risk Inspection Tool of Third Party Application for Smart Devices

Takuma Horiuchi(Tokushima Univ.),  Ohira Kenji(Tokushima Univ.),  Hiroki Tanioka(Tokushima Univ.),  Masahiko Sano(Tokushima Univ.),  Kenji Matsuura(Tokushima Univ.),  Tetsushi Ueta(Tokushima Univ.),  

[Paper #]SITE2017-64,IA2017-75
Proposal of Restrained Epidemic Routing on DTN

Yuma Sato(KGKwansei Gakuin Univ),  Natsuko Kawabata(Kwansei Gakuin Univ),  Yasuhiro Yamasaki(Kwansei Gakuin Univ),  Hiroyuki Ohsaki(Kwansei Gakuin Univ),  

[Paper #]SITE2017-69,IA2017-80
Evaluation for application of white list based network switches to hospital network systems

Osamu Takaki(Gunma Univ.),  Keigo Uchizumi(ALAXALA Networks Corp.),  Ichiroh Suzuta(ALAXALA Networks Corp.),  Kota Torikai(Gunma Univ.),  Yuichiro Saito(Gunma Univ.),  Tetsuya Sato(Carecom Corp.),  Hiroki Endo(Carecom Corp.),  Yoshifumi Atarashi(ALAXALA Networks Corp.),  

[Paper #]SITE2017-73,IA2017-84
Improper usage of ciphers on the wiretapping device defined by amendment wiretapping law and proposal of the improved device

Satoshi Kosakatani(Ritsumeikan U.),  Tetsutaro Uehara(Ritsumeikan U.),  

[Paper #]SITE2017-70,IA2017-81
Implementation and Evaluation of Car-Sharing System Using Smart-Contract on Blockchain

Tomoya Ogami(KIT),  Inaba Hiroyuki(KIT),  

[Paper #]SITE2017-80,IA2017-91
Study on Effect Testing of Persuasive Message Stimulating Computer Virus Measures based on Collective Protection Motivation Theory

Kana Shimbo(Nihon Univ.),  Komagome Tasuku(Nihon Univ.),  Takahashi Momomi(Nihon Univ.),  Harada Akane(Nihon Univ.),  Shun-ichi Kurino(Nihon Univ.),  Noriaki Yoshikai(Nihon Univ.),  

[Paper #]SITE2017-74,IA2017-85
An Experiment on Estimation of Block Propagation latency on the Bitcoin Network

Reiki Kanda(Tokyo Tech),  Masaaki Ohnishi(Tokyo Tech),  Kazuyuki Shudo(Tokyo Tech),  

[Paper #]SITE2017-79,IA2017-90
Study on ICT system for supporting Agriculture Volunteer Activity after Kumamoto Earthquake

Ikumi Muto(Nihon Univ.),  Kouta Fujisaki(Nihon Univ.),  Ryuya Morita(Nihon Univ.),  Yuusuke Kanehira(Nihon Univ.),  Misa Tanaka(Nihon Univ.),  Noriaki Yoshikai(Nihon Univ.),  Masataka Kawai(NVFS),  

[Paper #]SITE2017-82,IA2017-93
What is the Ethics of Probabilistic Existence seen from a Logical One

Tetsuya Morizumi(Kanagawa Univ.),  

[Paper #]SITE2017-76,IA2017-87
Spectrum Auction Framework to Facilitate the Entry of New Operators into the Mobile Market

Tomoko Yamajo(KDDI Research),  

[Paper #]SITE2017-71,IA2017-82
Development of Small Mobile System to Support Communication Services for Cell Phones in Disaster Situation

Takuro Sakai(KDDI Reserach),  Yoshinori Kitatsuji(KDDI Reserach),  Katsuyuki Yamazaki(Nagaoka University of Technology),  

[Paper #]SITE2017-81,IA2017-92
Accuracy of Clock Synchronization in IEEE1588 where Boundary Clock and Synchronous Ethernet are Combined

Koki Horita(Keio Univ.),  Shota Shiobara(Softbank),  Takao Okamawari(Softbank),  Yoichi Goto(Softbank),  Fumio Teraoka(Keio Univ.),  Kunitake Kaneko(Keio Univ.),  

[Paper #]SITE2017-78,IA2017-89
A Study for Machine Learning on the Limitation on Copyright of Article 47-7 in Copyright Law based on the EU copyright reform

Naonori Kato(KDDI Research),  Masatomo Suzuki(Niigata Univ./RIKEN),  Yosuke Murakami(KDDI Research),  

[Paper #]SITE2017-72,IA2017-83
MPTCP Packet Scheduling for Improving Quality of Streaming Video in Lossy Network

Ryota Matsufuji(KIT),  Dirceu Cavendish(KIT),  Daiki Nobayashi(KIT),  Takeshi Ikenaga(KIT),  

[Paper #]SITE2017-77,IA2017-88
12>> 1-20hit(21hit)