Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-10 12:10 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Zero-Knowledge Proofs for ownership of Deep Neural Network Shungo Sato, Hidema Tanaka (NDA) ISEC2023-67 SITE2023-61 LOIS2023-25 |
Because AI technologies have rapidly spread and developed in our society, Neural Networks, which are one of Machine Lear... [more] |
ISEC2023-67 SITE2023-61 LOIS2023-25 pp.86-92 |
HWS, ICD |
2022-10-25 16:15 |
Shiga |
(Primary: On-site, Secondary: Online) |
Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON Tomoya Tsuboi, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ) HWS2022-41 ICD2022-33 |
CAN, which is widely used for in-vehicle networks, is a low-cost and efficient connection between electronic control uni... [more] |
HWS2022-41 ICD2022-33 pp.64-69 |
BioX, ITE-ME, ITE-IST [detail] |
2016-06-21 10:00 |
Ishikawa |
Ishikawa-Shiko-Kinen-Bunka-Koryukan |
Performance Improvement in Person Verification Using Intra-Body Propagation Signals
-- Effect of Changing Input Signal and Propagated Path -- Ryutarou Nishi, Itaru Ogushi, Takahiro Murakami, Isao Nakanishi (Tottori Univ.) BioX2016-6 |
In recent years, it has increased the opportunity to use the biometric authentication. However, it is vulnerable to spoo... [more] |
BioX2016-6 pp.41-44 |
NS, IN (Joint) |
2014-03-07 13:40 |
Miyazaki |
Miyazaki Seagia |
A study on ID Spoofing solution of IETF STIR appliying to IMS Shunsuke Kanegae, Kenjiro Arai, Satoru Furukawa (NTT) NS2013-254 |
The trouble caused by caller ID spoofing (impersonate or obscure calling party number) are increasing in USA VoIP networ... [more] |
NS2013-254 pp.451-455 |
NS, IN (Joint) |
2013-03-08 15:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Prototype implementation and evaluation of DHCP enhancement method to prevent IP address spoofing attacks using released address Masao Oishi, Takuya Omizo, Katsuyoshi Iida (Tokyo Inst. of Tech.) NS2012-289 |
Currently, many researchers are focussing to eliminate the 3--way~handshake protocol to improve the TCP performance.
A ... [more] |
NS2012-289 pp.723-728 |
IN, NS (Joint) |
2011-03-04 09:10 |
Okinawa |
Okinawa Convention Center |
An Adaptive Defense Against Large DDoS Attack Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI Labs.) IN2010-195 |
Distributed Denial-of-Service attack is one of the serious problem on network security. The attack exhausts not only com... [more] |
IN2010-195 pp.307-312 |
NS, IN (Joint) |
2010-03-05 09:30 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Communication Control System Using ARP Spoofing for Management of Networks Including Productive Equipments Masaya Nagahari, Masaaki Niimura, Hisayoshi Kunimune, Yasushi Fuwa (Shinshu Univ.) NS2009-227 |
The use of the network in the company expands, and the problem of security has increased, too. However, it is difficult ... [more] |
NS2009-227 pp.363-368 |
IA, ICSS |
2009-06-19 10:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Validation of packet origin using public route information Meidai Saito (National Police Academy), Keisuke Ishibashi (NTT Corp.) IA2009-14 ICSS2009-22 |
uRPF is widely used technology to filter source IP spoofed packets, using route information. With uRPF filtering, a rout... [more] |
IA2009-14 ICSS2009-22 pp.73-78 |
ICM |
2007-03-16 11:45 |
Okinawa |
Miyakojima Marine Terminal |
Proposal on IP spoofing prevention method using authentication Takao Ogura (Fujitsu Lab.), Takeshi Ohnishi (Fujitsu Kyusyu Network Technologies Limited), Kenichi Fukuda (Fujitsu Lab.) TM2006-71 |
The shift to a next-generation network (NGN) that offers various services by integration of a telephone network and a da... [more] |
TM2006-71 pp.59-64 |
NS, IN (Joint) |
2007-03-09 13:30 |
Okinawa |
Okinawa Convention Center |
Realization of FSN method for detecting IP spoofed packets Toshinori Ohtsuka, Fumitaka Nakamura, Yuji Sekiya, Yasushi Wakahara (Tokyo Univ.) NS2006-236 |
In the Internet there are a lot of security problem such as Distributed Denial of Service (DDoS)attacks, virus, worms an... [more] |
NS2006-236 pp.409-414 |
CS |
2007-01-12 10:40 |
Okinawa |
Yonaguni (Okinawa) |
Implementation of FSN method which is detecting function of IP spoofed packets in each ISP's network Toshinori Otsuka, Fumitaka Nakamura, Yuji Sekiya, Yasushi Wakahara (Tokyo Univ.) CS2006-90 |
In the Internet there are a lot of Distributed Denial of Service(DDoS) attacks.
A lot of attacks aim to cause damage t... [more] |
CS2006-90 pp.115-120 |
IN, NS, CS (Joint) |
2006-09-14 11:40 |
Miyagi |
|
Efficient implementation of filtering function for IP spoofing Toshinori Ohtsuka, Fumitaka Nakamura, Yuji Sekiya, Yasushi Wakahara (Tokyo Univ.) NS2006-75 |
In our recent network society, there have been many security problems. The attackers often spoof
their addresses becaus... [more] |
NS2006-75 pp.27-32 |
IN |
2006-06-23 13:50 |
Hokkaido |
|
Efficient detection of IP spoofed packets by making use of network topology information Toshinori Otsuka, Fumitaka Nakamura, Yuji Sekiya, Yasushi Wakahara (Tokyo Univ.) IN2006-30 |
In the recent network society, there have been many security
problems.
The attackers often spoof their addresses bec... [more] |
IN2006-30 pp.79-84 |