Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 10:40 |
Nara |
Todaiji Total Cultural Center |
A Study of the Anomaly Detection Method Characteristics based on the Traffic Parameter Clustering Kouhei Tatsumi, Toyokazu Akiyama (Kyoto Sangyo Univ.) SITE2012-49 IA2012-87 |
The ”targeted attacks” especially to the government and the companies increase in recent years. Such unknown
attacks ar... [more] |
SITE2012-49 IA2012-87 pp.25-30 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:05 |
Nara |
Todaiji Total Cultural Center |
Design and implementation of mutual authentication based on PAKE in the Web SSO Kouhei Sugiyama, Toyokazu Akiyama (Kyoto Sangyo Univ.) SITE2012-50 IA2012-88 |
Recently, large amount of Web services exist, such as file sharing, Web mail and so on. When we use Web services, usuall... [more] |
SITE2012-50 IA2012-88 pp.31-36 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:30 |
Nara |
Todaiji Total Cultural Center |
Proposal of DDoS attack mitigation using two-step map table lookup on LISP Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] |
SITE2012-51 IA2012-89 pp.37-42 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:55 |
Nara |
Todaiji Total Cultural Center |
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
SITE2012-52 IA2012-90 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 14:00 |
Nara |
Todaiji Total Cultural Center |
An Efficient Policy Retrieval and Wi-Fi Control for ANDSF System Dae Sun Kim, Yujin Noishiki, Yoshinori Kitatsuji, Hidetoshi Yokota (KDDI R&D Labs) SITE2012-53 IA2012-91 |
This paper presents a strategic solution to mobile data offloading between 3GPP and non-3GPP access networks. As mobile ... [more] |
SITE2012-53 IA2012-91 pp.71-77 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 14:25 |
Nara |
Todaiji Total Cultural Center |
Channel switching-aware TCP for cognitive radio mobile ad hoc networks Shun Koba, Kazuya Tsukamoto, Masato Tsuru, Yuji Oie (Kyushu Inst. of Tech.) SITE2012-54 IA2012-92 |
With the proliferation of new wireless service, a scarcity of wireless resources will arise and become a critical issue.... [more] |
SITE2012-54 IA2012-92 pp.79-84 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 14:50 |
Nara |
Todaiji Total Cultural Center |
Retransmission Control Scheme for Smart Meter Wireless Multi-hop Network Makoto Ishizaki, Daiki Nobayashi, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-55 IA2012-93 |
To achieve a smart grid, supply and demand situation of electrical power in each consumer should be
transferred to a pr... [more] |
SITE2012-55 IA2012-93 pp.85-90 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 15:15 |
Nara |
Todaiji Total Cultural Center |
A ZigBee Device Plug-In Architecture for IEEE1888 Networks Hideya Ochiai (Univ. of Tokyo/NICT), Yuuichi Teranishi (NICT/Osaka Univ.), Hiroshi Esaki (Univ. of Tokyo) SITE2012-56 IA2012-94 |
This paper proposes an architecture of ZigBee device plug-in for IEEE1888 networks. This architecture allows to add new ... [more] |
SITE2012-56 IA2012-94 pp.91-94 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 16:00 |
Nara |
Todaiji Total Cultural Center |
A Proposal of Information Centric Networking in New Generation Network Architecture ZNA Takao Kondo, Heryanto, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) SITE2012-57 IA2012-95 |
Today's Internet is made up based on the early day's host-centric design. Unfortunately, this does not suit today's Inte... [more] |
SITE2012-57 IA2012-95 pp.117-122 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 16:25 |
Nara |
Todaiji Total Cultural Center |
A Flood Hazard Model Based on Damage Situations Kei Hiroi (Keio Univ.), Yuzo Taenaka (Univ. of Tokyo), Kanae Matsui (Keio Univ.), Hideya Ochiai (Univ. of Tokyo), Hitoshi Yokoyama (Tokanken), Hideki Sunahara (Keio Univ.) SITE2012-58 IA2012-96 |
People in the disaster risk area needs disaster information such as river levels for reduction of disaster damages. Howe... [more] |
SITE2012-58 IA2012-96 pp.123-126 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 16:50 |
Nara |
Todaiji Total Cultural Center |
Proposal and Evaluation of Priority Control Method on Per-Flow Basis Based on Bandwidth Utilization to Keep Response Time Within a Certain Threshold Keiya Ishikawa, Yuzo Taenaka, Masaya Nakayama (Univ. of Tokyo) SITE2012-59 IA2012-97 |
Multiple data flows sharing limited bandwidth cause communication delay in communication networks. In particular it is i... [more] |
SITE2012-59 IA2012-97 pp.127-132 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 17:15 |
Nara |
Todaiji Total Cultural Center |
A Server Configuration with Autonomous Session State Migration to Demand Fluctuation Takeshi Usui, Masahiro Jibiki (NICT), Yusuke Sakumoto (Tokyo Metropolitan Univ.), Chisa Takano (Hiroshima City Univ.), Masaki Aida (Tokyo Metropolitan Univ.), Nozomu Nishinaga (NICT) SITE2012-60 IA2012-98 |
Optimal server consolidation is attracting attention for energy saving. The service access increases or decreases in num... [more] |
SITE2012-60 IA2012-98 pp.133-138 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:00 |
Nara |
Todaiji Total Cultural Center |
Identifying User Authentication Methods on SSH Sessions Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99 |
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] |
SITE2012-61 IA2012-99 pp.151-156 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:25 |
Nara |
Todaiji Total Cultural Center |
Secure Resrouce Provisioning Across Multiple Domains Toru Mano, Kimihiro Mizutani, Osamu Akashi (NTT) SITE2012-62 IA2012-100 |
Network resource provisioning is an important technique for infrastructure providers (infra-providers).
However, to ful... [more] |
SITE2012-62 IA2012-100 pp.157-162 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:50 |
Nara |
Todaiji Total Cultural Center |
Study on Cocktail Party Effect Personal Authentication System by Recognizing the Differnce of Voices Kosei Taketa, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-63 IA2012-101 |
Recently, personal authentications have been important because of the popularization of personal portable devices or ICc... [more] |
SITE2012-63 IA2012-101 pp.163-168 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 11:15 |
Nara |
Todaiji Total Cultural Center |
Proposal of Active IDS by Risk Level Probe Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102 |
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] |
SITE2012-64 IA2012-102 pp.169-174 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 13:00 |
Nara |
Todaiji Total Cultural Center |
About the International Symposium on Internet Ethics ISIE2012 Yoshinori Ezawa (Kansai Univ.) SITE2012-65 IA2012-103 |
The International Symposium on Internet Ethics 2012 was planned and organized by the Korea Internet and Security Agency ... [more] |
SITE2012-65 IA2012-103 pp.197-200 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 13:25 |
Nara |
Todaiji Total Cultural Center |
Game theoretic analysis of the value exchange system Yoshiaki Tajima, Sumiko Miyata (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-66 IA2012-104 |
Recently, a local currency has been attracting attention for the purpose of circulating a thing and service in local com... [more] |
SITE2012-66 IA2012-104 pp.201-206 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 13:50 |
Nara |
Todaiji Total Cultural Center |
Consideration about the use possibility to the intellectual property field of digital forensic. Masahiro Sugawa (Niigata Univ.) SITE2012-67 IA2012-105 |
Digital forensic is being used widely from a criminal case to civil case. On this paper, it is considered whether digita... [more] |
SITE2012-67 IA2012-105 pp.207-211 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 14:50 |
Nara |
Todaiji Total Cultural Center |
Notes on Low Distortion Embedding Method of Digital Camera Scannable Invisible Code Masaharu Morita, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-68 IA2012-106 |
Recently, various utilizations of digital-camera have been spreading with popularization of cell-phones and smart-phones... [more] |
SITE2012-68 IA2012-106 pp.231-236 |