Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS |
2024-04-26 13:25 |
Hiroshima |
(Primary: On-site, Secondary: Online) |
Performance Evaluation of Inter-Terminal Access Control Method in Millimeter Wave Terminal Cooperative Wireless Communication Systems Yiche Li, Hiraku Okada, Chedlia Ben Naila, Masaaki Katayama (Nagiya Univ.) RCS2024-12 |
(To be available after the conference date) [more] |
RCS2024-12 pp.54-59 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 15:30 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Access control through topic analysis considering with intents Yuta Kariya, Tetsuya Morizumi, Kaito Hosono, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2023-107 IA2023-113 |
(To be available after the conference date) [more] |
SITE2023-107 IA2023-113 pp.247-254 |
NS, IN (Joint) |
2024-02-29 09:45 |
Okinawa |
Okinawa Convention Center |
Performance Evaluation of Wireless Media Access Control V-SP-MAC Considering Mobility of Terminals Akito Muramoto, Hiroyasu Obata, Chisa Takano (Hiroshima City Univ.) IN2023-78 |
In the multihop communication which has been considered as a method of information collection during disasters, the thro... [more] |
IN2023-78 pp.77-82 |
NS, NWS (Joint) |
2024-01-25 14:15 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Access Control Method to Prevent Session Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-162 |
In recent years, the adoption of Single Sign-On (SSO) has been increasing in web services to reduce the burden of user a... [more] |
NS2023-162 pp.19-24 |
IN |
2024-01-18 14:25 |
Aichi |
|
Load Balancing Effect of Access Control Method in NDN Using Relay Nodes Naoto Ohata, Masaya Nakayama (Tokyo Univ.) IN2023-52 |
In recent years, Information-Centric Networking (ICN), which has features such as in-network caching and routing by cont... [more] |
IN2023-52 pp.18-23 |
ICM, NS, CQ, NV (Joint) |
2023-11-22 09:50 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
A survey on suitable hook points for outbound packet monitoring using eBPF Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27 |
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] |
ICM2023-27 pp.26-31 |
LOIS, SITE, ISEC |
2023-11-10 10:20 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Transaction Access Control Using ERC7303 and Its Applications Ko Fujimura (Otsuma Women's Univ.) ISEC2023-63 SITE2023-57 LOIS2023-21 |
On the blockchain, applications such as cryptocurrencies, NFTs, and DeFi have become prevalent, and from around 2022, th... [more] |
ISEC2023-63 SITE2023-57 LOIS2023-21 pp.60-65 |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
NS |
2023-10-04 17:55 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Access Control Method to Prevent ID Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-81 |
In recent years, there has been a rapid increase in web services that require authentication, leading to the widespread ... [more] |
NS2023-81 pp.53-58 |
IA |
2023-09-21 16:30 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Performance Evaluation of Access Control Functions in IoT-ZTN System Gateway Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IA2023-17 |
With the increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks ... [more] |
IA2023-17 pp.38-42 |
SIP |
2023-08-07 12:50 |
Osaka |
Osaka Univ. (Suita) Convention Center (Primary: On-site, Secondary: Online) |
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46 |
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more] |
SIP2023-46 pp.1-6 |
IA, ICSS |
2023-06-21 09:55 |
Saga |
Saga Univ. (Primary: On-site, Secondary: Online) |
A Proposal for Access Control Method based on File Relation Inference from Users Behavior Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) IA2023-8 ICSS2023-8 |
File access control is an effective method for protecting information from unauthorized access both within and outside a... [more] |
IA2023-8 ICSS2023-8 pp.40-47 |
IN, NS (Joint) |
2023-03-03 10:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Access Control Method with Privacy Preservation in NDN Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221 |
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] |
NS2022-221 pp.310-315 |
IN, NS (Joint) |
2023-03-03 12:00 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Proposal of Applying Blockchain Technology to IoT Data Distribution Method Hayato Kumazaki, Takafumi Taya, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ.) IN2022-110 |
We have proposed Ticket-based Access Control, an access control system with a token called a ticket and Tag ID, which is... [more] |
IN2022-110 pp.265-270 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
SeMI, SeMI (Joint) |
2023-01-20 10:30 |
Tokushima |
Naruto grand hotel (Primary: On-site, Secondary: Online) |
Design of the basic architecture of a quasi-narrow band wireless communication system, DR-IoT Susumu Ishihara, Shinka Asano, Ryosuke Umemoto (Shizuoka Univ.), Arata Kato, Shugo Kajita (スペースタイムエンジニアリング), Hiroshi Yamamoto (Ritsumeikan Univ.), Tetsushi Ikegami (Meiji Univ.), Mineo Takai (Osaka Univ.) SeMI2022-97 |
We have proposed DR-IoT (Diversified-Range/Disaster-Response IoT), a VHF-band wireless communication system using small ... [more] |
SeMI2022-97 pp.119-124 |
IN, IA (Joint) |
2022-12-13 15:50 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66 |
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] |
IA2022-66 pp.91-98 |
ISEC, SITE, LOIS |
2022-11-18 15:55 |
Online |
Online |
Token-Controlled Token Circulation Ko Fujimura (Otsuma Univ.) ISEC2022-42 SITE2022-46 LOIS2022-26 |
This paper presents a general-purpose token circulating system for circulating various types of rights such as tickets, ... [more] |
ISEC2022-42 SITE2022-46 LOIS2022-26 pp.73-78 |
RCS |
2022-10-28 15:30 |
Ehime |
Ehime University, and online (Primary: On-site, Secondary: Online) |
[Invited Lecture]
A Study on WLAN Media Access Control Based on the Model of Synchronization Phenomena of Coupled Oscillators Hiroyasu Obata, Chisa Takano, Kenji Ishida (Hiroshima City Univ.) RCS2022-154 |
The wireless LAN (WLAN) has become one of major access networks for connecting the Internet.
However, the problem of th... [more] |
RCS2022-154 pp.116-117 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 11:10 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Construction of IoT System Based on Zero Trust Networks Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41 |
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] |
NS2022-41 pp.71-76 |