IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 112, Number 488

Social Implications of Technology and Information Ethics

Workshop Date : 2013-03-14 - 2013-03-15 / Issue Date : 2013-03-07

[PREV] [NEXT]

[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2012-49
A Study of the Anomaly Detection Method Characteristics based on the Traffic Parameter Clustering
Kouhei Tatsumi, Toyokazu Akiyama (Kyoto Sangyo Univ.)
pp. 25 - 30

SITE2012-50
Design and implementation of mutual authentication based on PAKE in the Web SSO
Kouhei Sugiyama, Toyokazu Akiyama (Kyoto Sangyo Univ.)
pp. 31 - 36

SITE2012-51
Proposal of DDoS attack mitigation using two-step map table lookup on LISP
Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST)
pp. 37 - 42

SITE2012-52
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST)
pp. 43 - 48

SITE2012-53
An Efficient Policy Retrieval and Wi-Fi Control for ANDSF System
Dae Sun Kim, Yujin Noishiki, Yoshinori Kitatsuji, Hidetoshi Yokota (KDDI R&D Labs)
pp. 71 - 77

SITE2012-54
Channel switching-aware TCP for cognitive radio mobile ad hoc networks
Shun Koba, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie (Kyushu Inst. of Tech.)
pp. 79 - 84

SITE2012-55
Retransmission Control Scheme for Smart Meter Wireless Multi-hop Network
Makoto Ishizaki, Daiki Nobayashi, Takeshi Ikenaga (Kyushu Inst. of Tech.)
pp. 85 - 90

SITE2012-56
A ZigBee Device Plug-In Architecture for IEEE1888 Networks
Hideya Ochiai (Univ. of Tokyo/NICT), Yuuichi Teranishi (NICT/Osaka Univ.), Hiroshi Esaki (Univ. of Tokyo)
pp. 91 - 94

SITE2012-57
A Proposal of Information Centric Networking in New Generation Network Architecture ZNA
Takao Kondo, Heryanto, Kunitake Kaneko, Fumio Teraoka (Keio Univ.)
pp. 117 - 122

SITE2012-58
A Flood Hazard Model Based on Damage Situations
Kei Hiroi (Keio Univ.), Yuzo Taenaka (Univ. of Tokyo), Kanae Matsui (Keio Univ.), Hideya Ochiai (Univ. of Tokyo), Hitoshi Yokoyama (Tokanken), Hideki Sunahara (Keio Univ.)
pp. 123 - 126

SITE2012-59
Proposal and Evaluation of Priority Control Method on Per-Flow Basis Based on Bandwidth Utilization to Keep Response Time Within a Certain Threshold
Keiya Ishikawa, Yuzo Taenaka, Masaya Nakayama (Univ. of Tokyo)
pp. 127 - 132

SITE2012-60
A Server Configuration with Autonomous Session State Migration to Demand Fluctuation
Takeshi Usui, Masahiro Jibiki (NICT), Yusuke Sakumoto (Tokyo Metropolitan Univ.), Chisa Takano (Hiroshima City Univ.), Masaki Aida (Tokyo Metropolitan Univ.), Nozomu Nishinaga (NICT)
pp. 133 - 138

SITE2012-61
Identifying User Authentication Methods on SSH Sessions
Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.)
pp. 151 - 156

SITE2012-62
Secure Resrouce Provisioning Across Multiple Domains
Toru Mano, Kimihiro Mizutani, Osamu Akashi (NTT)
pp. 157 - 162

SITE2012-63
Study on Cocktail Party Effect Personal Authentication System by Recognizing the Differnce of Voices
Kosei Taketa, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 163 - 168

SITE2012-64
Proposal of Active IDS by Risk Level Probe
Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 169 - 174

SITE2012-65
About the International Symposium on Internet Ethics ISIE2012
Yoshinori Ezawa (Kansai Univ.)
pp. 197 - 200

SITE2012-66
Game theoretic analysis of the value exchange system
Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.)
pp. 201 - 206

SITE2012-67
Consideration about the use possibility to the intellectual property field of digital forensic.
Masahiro Sugawa (Niigata Univ.)
pp. 207 - 211

SITE2012-68
Notes on Low Distortion Embedding Method of Digital Camera Scannable Invisible Code
Masaharu Morita, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 231 - 236

SITE2012-69
Proposal on Multi-Bit Patchwork Watermarking for Color Video having Tolerance to Frame Order Manipulation
Takeshi Shinomiya, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 237 - 242

SITE2012-70
A watermarking method for the Bezier curve
Takafumi Kudo, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Faculty of Engineering, Toyo Networks and System Integration), Hirotsugu Kinoshita (Kanagawa Univ.)
pp. 243 - 248

SITE2012-71
A Fieldwork Study on Location Privacy Issues Caused by Wi-Fi/Bluetooth Communication
Shogo Orio, Hiroshi Ueda (Kyoto Univ.), Tetsutaro Uehara (RIIS), Yu Tsuda (Kyoto Univ.), Katsuyasu Yoshimura, Tomohide Yamamura, Ryouichi Nomura (FXSS)
pp. 249 - 254

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan