Thu, Jun 20 PM Opening and Welcome 13:00 - 13:05 |
(1) |
13:00-13:05 |
Opening Address |
Thu, Jun 20 PM Invited Talk 13:05 - 14:35 |
(2) |
13:05-13:45 |
[Invited Talk]
* |
Daiki Fukumori (NICT/CyberDefence) |
(3) |
13:45-14:25 |
[Invited Talk]
Threats posed by High-Perfomance Information Devices Designed for Home |
Hiroki Takakura (Nagoya Univ.) |
|
14:25-14:35 |
Break ( 10 min. ) |
Thu, Jun 20 PM ICSS - Security 14:35 - 15:25 |
(4) |
14:35-15:00 |
Three Party Secure Anonymous Authentication Scheme with Hard Learning Problems |
Kotaro Kishibe (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.) |
(5) |
15:00-15:25 |
Vulnerability of RC4 in SSL/TLS |
Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) |
|
15:25-15:35 |
Break ( 10 min. ) |
Thu, Jun 20 PM IA - Network Management 15:35 - 17:30 |
(6) |
15:35-16:00 |
Improvement of Communication Quality during Disasters by using OpenFlow
-- Proposal Method of Disaster ID based on Location Information -- |
Kohichi Ogawa (AIIT), Noriaki Yoshiura (Saitama Univ.) |
(7) |
16:00-16:25 |
PAT : Privacy aware transformation method and applications for location services |
Ikuo Nakagawa, Yoshifumi Hashimoto (Intec), Masahiro Hiji (tohoku-u), Hideaki Imaizumi (toyota-itc), Hiroshi Esaki (u-tokyo) |
(8) |
16:25-16:50 |
An experimental evaluation of long distance live migration using the wide-area distributed storage |
Yoshiaki Kitaguchi (Kanazawa Univ.), Tohru Kondo (Hiroshima Univ.), Hiroki Kashiwazaki (Osaka Univ.), Ikuo Nakagawa (Intec, Inc./Osaka Univ.), Shinji Shimojo (Osaka Univ.) |
(9) |
16:50-17:15 |
Operation and Issues of E-Mail System in Okayama University |
Nariyoshi Yamai, Kiyohiko Okayama, Takaoki Fujiwara, Yoshihiro Ohsumi (Okayama Univ.) |
(10) |
17:15-17:30 |
|
|
17:30-17:40 |
IA Research Award Ceremony ( 10 min. ) |
|
18:00-20:00 |
Reception ( 120 min. ) |
Fri, Jun 21 AM IA - Sensor Network 10:15 - 11:30 |
(11) |
10:15-10:40 |
Experiment of Sensor Network for Snowfall Observation in Nagaoka City |
Seiya Kobayashi, Hiroshi Yamamoto (NUT), Tatsuhito Hoshi (Kanai Doryokou), Yuichi Inagawa (NCT), Koichi Yoshitake (NAL), Katsuyuki Yamazaki (NUT) |
(12) |
10:40-11:05 |
Study on Snowblower Support Application utilizing Android Terminals |
Hiroshi Yamamoto, Yusuke Kubota, Satoru Nishimaki, Takeshi Kyuzo, Katsuyuki Yamazaki (NUT) |
(13) |
11:05-11:30 |
An Evaluation of Load Distribution Method on Multi-Source P2P Sensor Data Stream Delivery System |
Tomoya Kawakami (Kobe Univ.), Yoshimasa Ishi, Tomoki Yoshihisa (Osaka Univ.), Yuuichi Teranishi (NICT/Osaka Univ.) |
|
11:30-13:00 |
Break ( 90 min. ) |
Fri, Jun 21 PM ICSS - Network Observation 13:00 - 14:40 |
(14) |
13:00-13:25 |
Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet |
Soshi Hirono (Nagoya Univ.), Kenji Ohira (NAIST), Yukiko Yamaguchi (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.), Hiroki Takakura (Nagoya Univ.) |
(15) |
13:25-13:50 |
Generic Unpacking Method Using Data Execution Prevention |
Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) |
(16) |
13:50-14:15 |
Network Observation and Analysis Report on nicter
-- Close Encounters of Network Incident Sign -- |
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
(17) |
14:15-14:40 |
NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information |
Tatsuya Takehisa (NICT/Nissin), Daisuke Inoue, Masashi Eto (NICT), Katsunari Yoshioka (YNU), Takahiro Kasama, Junji Nakazato, Koji Nakao (NICT) |
Fri, Jun 21 PM Closing 14:40 - 14:55 |
(18) |
14:40-14:50 |
Student Award |
(19) |
14:50-14:55 |
Closing Address |