|
|
Technical Committee on Internet Architecture (IA) (Searched in: 2014)
|
|
Search Results: Keywords 'from:2014-09-12 to:2014-09-12'
|
[Go to Official IA Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2014-09-12 10:00 |
Tokyo |
Tokyo Tech Front |
A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-14 |
An architecture of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets... [more] |
IA2014-14 pp.1-6 |
IA |
2014-09-12 10:30 |
Tokyo |
Tokyo Tech Front |
An Implementation and Evaluation of Multi-Layer-Binding Router using OpenFlow Hiroshi Kobayashi, Hirofumi Yamaki, Yuuki Suehiro, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (Tokyo Denki Univ.) IA2014-15 |
A prototype of a multi-layer-binding (MLB) router that aims at preventing outflow and inflow of cyber-attack packets to ... [more] |
IA2014-15 pp.7-12 |
IA |
2014-09-12 11:00 |
Tokyo |
Tokyo Tech Front |
Use case analysis of TXT records in DNS Hikaru Ichise, Jin Yong, Katsuyoshi Iida (Tokyo Inst. of Tech.) IA2014-16 |
Recent reports indicated that the DNS TXT record based bot communications can be used in the botnet attacks. Thus, it is... [more] |
IA2014-16 pp.13-18 |
IA |
2014-09-12 11:30 |
Tokyo |
Tokyo Tech Front |
An authentication and authorization model with both personal attributes and set attributes Takeshi Nishimura, Eisaku Sakane, Kento Aida, Kazutsuna Yamaji, Motonori Nakamura (NII) IA2014-17 |
In order to separate authentication and authorization, identity federation is rapidly spreading, especially in the acade... [more] |
IA2014-17 pp.19-24 |
IA |
2014-09-12 13:00 |
Tokyo |
Tokyo Tech Front |
Development and Operation of Internet Measurement System Motoyuki Ohki, Satoshi Kamei (NTT Com.) IA2014-18 |
[more] |
IA2014-18 pp.25-30 |
IA |
2014-09-12 13:30 |
Tokyo |
Tokyo Tech Front |
Current Status of gTLDs and Name Collision Issues Yuji Koyama (JPNIC) IA2014-19 |
[more] |
IA2014-19 pp.31-33 |
IA |
2014-09-12 14:15 |
Tokyo |
Tokyo Tech Front |
[Invited Talk]
Large Scale Video Distirbution at niconico Kenichi Miyazaki (Dwango) IA2014-22 |
[more] |
IA2014-22 p.47 |
IA |
2014-09-12 15:00 |
Tokyo |
Tokyo Tech Front |
[Invited Talk]
Contents Distribution Control and Network Design Yoshinobu Matsuzaki (IIJ) IA2014-23 |
[more] |
IA2014-23 p.49 |
IA |
2014-09-12 16:15 |
Tokyo |
Tokyo Tech Front |
[Invited Talk]
DNS cache poisoning and its countermeasures Kazunori Fujiwara, Yasuhiro Orange Morishita (JPRS) IA2014-20 |
Recently, DNS cache poisoning attack is being focused again.
Though it is derived from the basic structure of DNS,
it ... [more] |
IA2014-20 pp.35-40 |
IA |
2014-09-12 17:15 |
Tokyo |
Tokyo Tech Front |
[Invited Talk]
Issues and perspectives on RPKI and BGPSEC Taiji Kimura (JPNIC) IA2014-21 |
– Resource Public-Key Infrastructure, is a mechanism to issue digital certificates that certify allocation/assignm... [more] |
IA2014-21 pp.41-45 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|