Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2023-03-15 10:55 |
Gunma |
Maebashi Institute of Technology (Primary: On-site, Secondary: Online) |
Basic Function/Performance Evaluation of B5G Mobile Environment at Osaka University Site of NICT's Integrated Testbed Kenji Ohira (Osaka Univ.) SITE2022-54 IA2022-77 |
Osaka University becomes a site of Beyond 5G Mobile Environment (a Mobile Application Demonstration Environment and a Mo... [more] |
SITE2022-54 IA2022-77 pp.1-6 |
IN, IA (Joint) |
2022-12-12 15:10 |
Hiroshima |
Higashi-Senda campus, Hiroshima Univ. (Primary: On-site, Secondary: Online) |
A Method to Facilitate Using Multipath Available by SRv6 Mamoru Yamazaki, Kenji Ohira (Osaka Univ.) IA2022-48 |
In today's networks, single path communication is as usual.
However, for transmitting large amounts of data, single pat... [more] |
IA2022-48 pp.17-22 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 13:55 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
An Examination about Management of IP Address Assignment with IPoE in a Campus Network Kenji Ohira (Osaka Univ.) SITE2021-58 IA2021-71 |
When an information security incident occurs, an investigation is started using the IP address as a starting point, but ... [more] |
SITE2021-58 IA2021-71 pp.75-78 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 14:55 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
An SRv6-Based System to Enable User Initiated Concurrent Multipath Usage Mamoru Yamazaki, Kenji Ohira (Osaka Univ.) SITE2021-61 IA2021-74 |
[more] |
SITE2021-61 IA2021-74 pp.89-93 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-03 15:40 |
Online |
Online |
A PKI Extension of OSPFv3 to Ensure Source of Prefixes Takahiro Oriishi, Kenji Matsuura (Tokushima Univ.), Kenji Ohira (Osaka Univ.) SITE2019-100 IA2019-78 |
In the investigation of incidents, investigators identify a source of IP packet to perform countermeasures.
Therefore, ... [more] |
SITE2019-100 IA2019-78 pp.175-180 |
IA, SITE, IPSJ-IOT [detail] |
2019-03-07 10:00 |
Tokushima |
Grand XIV Naruto |
Reduction of TLS Certificate Validation Cost on Network Administrators Kohki Mori, Takahiro Oriishi, Kenji Ohira (Tokushima Univ.) SITE2018-68 IA2018-60 |
(To be available after the conference date) [more] |
SITE2018-68 IA2018-60 pp.1-8 |
IA, SITE, IPSJ-IOT [detail] |
2019-03-07 13:00 |
Tokushima |
Grand XIV Naruto |
Tor64/Tor46: Tor as a Bridge between IPv4 and IPv6 Ryota Sato, Takahiro Oriishi, Kenji Ohira (Tokushima Univ.) SITE2018-70 IA2018-62 |
ISPs (Internet Service Providers) that provide both IPv4 and IPv6 addresses are increasing, but IPv6 is not yet provided... [more] |
SITE2018-70 IA2018-62 pp.53-57 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-05 11:20 |
Tochigi |
Kinugawa Onsen Hotel |
A Design and an Implementation about Password-Free Operation of Authenticator Registration in FIDO Takahiro Oriishi, Kenji Ohira, Michitomo Morii, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) SITE2017-63 IA2017-74 |
As a new authentication framework, FIDO (Fast IDentity Online) is proposed to supersede password-based authentication. I... [more] |
SITE2017-63 IA2017-74 pp.67-72 |
IA, IN (Joint) |
2014-12-19 11:05 |
Hiroshima |
Hiroshima City University |
A method of dynamic route selection for searching disaster victims with unmanned aerial vehicle Yoshihiro Ryugo, Kenji Ohira, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2014-76 |
In a disaster situation, it is difficult to investigate the damage situation from the ground due to the failure of infra... [more] |
IA2014-76 pp.43-48 |
IA, IPSJ-IOT, SITE [detail] |
2014-02-28 12:30 |
Ishikawa |
Hotel Rurikoh |
A Method of IPv6 Auto Address Assignment with OSPFv3 in a Multi-Link Site Kenji Ohira (NAIST) SITE2013-69 IA2013-94 |
In order to configure IPv6 address setting on nodes in a network of multiple links, we usually have to configure the set... [more] |
SITE2013-69 IA2013-94 pp.147-152 |
IA |
2014-01-31 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A study on IPv4 Sunset technique in campus network Daisuke Murata, Kenji Ohira, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) IA2013-75 |
In this paper, in order to achieve IPv4 Sunset in campus network, we firstly analyze IPv4 traffic pattern of current sta... [more] |
IA2013-75 pp.43-48 |
IA, ICSS |
2013-06-21 13:00 |
Niigata |
Ao-re Nagaoka |
Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet Soshi Hirono (Nagoya Univ.), Kenji Ohira (NAIST), Yukiko Yamaguchi (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.), Hiroki Takakura (Nagoya Univ.) IA2013-12 ICSS2013-12 |
In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. How... [more] |
IA2013-12 ICSS2013-12 pp.67-72 |
IA |
2011-10-21 14:00 |
Overseas |
Dalian University of Technology (Dalian, China) |
Current Status of Nagoya University Survivor Confirmation System and Lessons Learned from Great East Japan Earthquake Shoji Kajita, Yoshihiro Ohta, Kenji Ohira, Hisanori Tajima, Satoshi Ishiguro, Jun Tobita, Hiroki Takakura, Yoshito Itoh (Nagoya Univ.) IA2011-33 |
Nagoya University has been stepwisely developing a home-grown survivor confirmation system on top of Nagoya University P... [more] |
IA2011-33 pp.45-50 |
IA |
2009-10-31 11:15 |
Overseas |
Tsinghua University (Beijing) |
A Hierarchical Automatic Address Allocation Method Considering End-to-end Multihoming Kenji Fujikawa (NICT), Kenji Ohira (Kyoto Univ.), Masataka Ohta (NICT/Tokyo Inst. of Tech.) IA2009-56 |
In order to suppress the increase of the global routing table size,
throughout address hierarchicalization
and multiho... [more] |
IA2009-56 pp.57-60 |
IA, SITE |
2009-03-06 11:20 |
Kumamoto |
|
Information Ethics on Guidelines for the Course of Study and the cource materials Chiho Asai, Tetsutaro Uehara, Mikihiko Mori, Takaaki Tsuji, Kenji Ohira, Kokoro Ikeda, Hajime Kita (Kyoto Univer.) SITE2008-93 IA2008-116 |
It is recognized that the need for Information Ethics in elementary and secondary education. But it is tend to skills, a... [more] |
SITE2008-93 IA2008-116 pp.289-294 |
IA |
2008-07-09 11:40 |
Tokyo |
Shinagawa Inter-City (mornign), The Grand Hall (afternoon) |
Consideration of A Hierarchical QoS Routing Protocol Supporting Simultaneous Automatic Address Assignment Kenji Fujikawa (NICT), Kenji Ohira (Kyoto Univ.), Masataka Ohta (TIT) IA2008-20 |
This paper discusses methods of integrating hierarchical QoS routing
protocol HQLIP with automatic address allocation. ... [more] |
IA2008-20 pp.43-48 |
IA |
2006-05-24 10:50 |
Kyoto |
Campus Plaza Kyoto |
A Construction Method of a Honeypot System to Safely Collect Unknown Malicious Codes Kenji Ohira, JungSuk Song, Hiroki Takakura, Yasuo Okabe (Kyoto Univ.) IA2006-1 |
It is considered that an attacker tests his attacking codes by sending them to randomly selected nodes in the Internet.
... [more] |
IA2006-1 pp.1-6 |
IA |
2004-07-12 14:00 |
Tokyo |
The University of Tokyo (Hongo Campus) |
Hop-by-Hop Address Assignment and Source Address Based Routing for IPv6 End-to-End Multihoming Kenji Ohira, Youichi Koyama, Kenji Fujikawa, Yasuo Okabe (Kyoto Univ.) |
IPv6 site multihoming discussed at the Multi6 working group is one of the hottest topics among many IPv6 related issues ... [more] |
IA2004-11 pp.25-30 |