number | title/author |
---|---|
C1-1 | A new study on cascading failures in power networks Kei Shimizu, Masahiro Hayashi , |
C1-2 | Simulation evaluation of RPKI deployment based on cost-benefit analysis Tatsuya Oryu, Keisuke Ishibashi , |
C1-3 | A Study on Privacy Protection in ICN Networks using Multiple Encryption Keys Toru Hasegawa, Shota Yamada, Yuki Koizumi , |
C1-4 | Privacy-Protective Distributed Machine Learning Using Rich Clients Saki Takano, Akihiro Nakao, Saneyasu Yamaguchi, Masato Oguchi , |
C1-5 | Advanced Zero Trust Architecture for automating fine-grained access control with generalized attribute relation extraction Nakul Ghate, Shohei Mitani, Taniya Singh, Hirofumi Ueda , |