|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-15 10:55 |
Online |
Online |
Mutualized oblivious DNS (μODNS): Hiding a tree in the wild forest Jun Kurihara (Univ. Hyogo), Takeshi Kubo (Zettant) NS2021-44 |
[more] |
NS2021-44 pp.63-68 |
IN, NS (Joint) |
2021-03-04 11:20 |
Online |
Online |
Resource Authorization Patterns on Edge Computing Ryu Watanabe, Ayumu Kubota (KDDIR), Jun Kurihara (UOH) IN2020-68 |
In order to realize a distribution of processing load and a prompt response, the concept of edge computing is drawing an... [more] |
IN2020-68 pp.85-90 |
NS, IN (Joint) |
2015-03-03 09:00 |
Okinawa |
Okinawa Convention Center |
A Study of TCP-like Congestion Control using Interest Aggregation in Content-Centric Networking Kenji Yokota, Jun Kurihara, Atsushi Tagami (KDDI R&D Labs.) NS2014-207 |
(To be available after the conference date) [more] |
NS2014-207 pp.173-178 |
NS, IN (Joint) |
2015-03-03 16:20 |
Okinawa |
Okinawa Convention Center |
Optimization of ICN Potential Based Routing for Disasters Takaaki Sunaga, Tohru Asami, Yoshihiro Kawahara (UT), Kohei Sugiyama, Jun Kurihara, Atsushi Tagami (KDDI), Tomohiko Yagyu (NEC), Toru Hasegawa (OU) IN2014-174 |
In the current Internet, many applications are based on DNS, the centralized name resolution system, assuming hosts are ... [more] |
IN2014-174 pp.313-318 |
NS, IN (Joint) |
2015-03-03 16:40 |
Okinawa |
Okinawa Convention Center |
Identity-Based Aggregate Signatures Applied to NDN for Short Message Transfers Byambajav Namsraijav, Tohru Asami, Yoshihiro Kawahara (UTokyo), Jun Kurihara, Kohei Sugiyama, Atsushi Tagami (KDDI R&D Labs.), Tomohiko Yagyu (NEC), Toru Hasegawa (Osaka Univ.) IN2014-175 |
In Named Data Networking (NDN), security is imposed on contents instead of end-to-end connections; therefore, every cont... [more] |
IN2014-175 pp.319-324 |
ISEC, IT, WBS |
2015-03-03 14:10 |
Fukuoka |
The University of Kitakyushu |
[Invited Talk]
Security of secret sharing schemes expressed in terms of the relative parameters of linear codes Jun Kurihara (KDDI R&D Labs), Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2014-100 ISEC2014-113 WBS2014-92 |
[more] |
IT2014-100 ISEC2014-113 WBS2014-92 pp.239-246 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|