, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei
|
|
- あきお かつもと
- 5 years ago
- Views:
Transcription
1 , Evaluation of Certificate Verification Method in Mobile Environment Katuyuki UMEZAWA,, Mituhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigeichi HIRASAWA PKI PKI CRL OCSP CVS 3 3 CVS PKI CVS OCSP CRL 1. ID PKI Hitachi, Ltd., Sytem Development Laboratory, Hitachi Sytem Plaza Shinkawaaki, 890 Kahimada, Saiwai-ku, Kawaaki-hi, Japan Graduate School of Science & Engineering, Waeda Univerity, Okubo, Shinjuku-ku, Tokyo, Japan (GPKI) PKI 384 D Vol. J90 D No. 2 pp c 2007
2 CRL (Certificate Revocation Lit) OCSP (Online Certificate Statu Protocol) CVS (Certificate Validation Server) 1 2 [1] CRL OCSP CVS CRL OCSP CVS ITU-T X.509 (2000) [5] RFC3280 [6] 2. 1 CRL (Certificate Revocation Lit) [5], [6] OCSP (Online Certificate Statu Protocol) [7] CVS (Certificate Validation Server) [8], [9] CRL CRL CRL (Certification Authority CA) CRL CRL CRL CRL CRL CRL 1 SCVP [15] CVS [2] [4] 385
3 2007/2 Vol. J90 D No. 2 δ-crl 5 CRL CRL δ-crl bae-crl CRL CRL bae-crl δ-crl bae-crl CRL δ-crl bae-crl OCSP OCSP OCSP (Varidation Authority VA) (good) (revoked) (unknown) CVS CRL OCSP CVS CVS (GPKI) [8] [9] [14] (CA) (VA) CA VA CRL OCSP CVS CA VA [1] (δ-)crl 2 3 VA OCSP 2 VA VA CVS VA CA CRL 5 VA VA OCSP VA 6 1 Table 1 Claification of the certificate verification method. CRL OCSP CVS 1 (δ-)crl Fig. 1 (δ-)crl model. 5 CRL CRL CRL (CRT Certificate Revocation Tree) 6 VA
4 2 OCSP 1 Fig. 2 OCSP model 1. 3 OCSP 2 Fig. 3 OCSP model 2. 4 CVS 1 Fig. 4 CVS model 1. N k q r β α M 1 M 2 M 3 M 4 M 5 D n D ig D n D ig 5 CVS 2 Fig. 5 CVS model 2. 2 Table 2 Notation. [ ] VA [ ] CA [ ] 1 [ /day ] CA +1 [ ] VA [bit/] VA VA CA VA [] [] [] CRL [] [] OCSP [bit] OCSP [bit] CVS [bit] CVS [bit] 3. 2 CRL CRL CRL CRL CRL C x M x R x T x T x = C x + M x + R x (1) x C x M x R x C x 387
5 2007/2 Vol. J90 D No. 2 λ X P (X) =λ X e λ /X! [1] q [ /day ] CA k [ ] T [day] CA qt/k 1. A 1 2 CA λ = qt k 7 T T 1 p e X 1 p e T X 1 =1 e qt k (2) VA X X OCSP 1 N VA 1. A 2 2 OCSP 2 CVS 1 2 N/ VA 1. A 3 2 A 4 2 VA q = q N CVS 2 q 1 1. A 4 3 q Nv 1 VA 1. A 4 4 VA VA q = q N OCSP 1 CVS 2 k/ OCSP 2 CVS 1 k CA T VA CA qt/k N 1. A 2 3 A 4 5 N qt/k 1. A 3 3 VA T 1 OCSP 1 CVS 2 p T vx 1 OCSP 2 CVS 1 T p v X 1 p T vx 1 =1 qt e k N (3) p v T X 1 =1 e qt k NNv (4) 3. 4 CRL CRL δ-crl CA CRL CA VA CRL 8 CRL T C CRL CA 1 CRL 1 CRL C CRL (2) T = T C l CRL CA q C CRL = k pe T C X 1 lcrl T C q (5) l CRL CA 1 CRL 2. l CRL = N pl l n + l ig [bit] (6) k δ-crl bae-crl δ-crl C baecrl C delta C deltacrl = C baecrl + C delta (7) δ-crl bae-crl CRL CRL C baecrl (5) bae-crl T B C baecrl = k pe T B X 1 lcrl (8) T B q δ-crl C delta n δ-crl l delta (n) C delta = k pe T C X 1 TB TC 1 n=1 l delta (n) (9) T B q l delta (n) l delta (n)= N { ( ) pl n } 1 1 TC l n k L + l ig (10) 7 [1] 8 [1] CA CRL 388
6 3. CA VA CRL OCSP 1 CVS 2 k/ CA CRL OCSP 2 CVS 1 k CA CRL 1 CRL C x x (3) (4) T = T C l CRL CRL CA q β C OCSP1 = C CV S2 = k p T C vx 1 lcrl T C q β (11) C CV S1 = C OCSP2 = k pvt C X 1 l CRL (12) T C q β CRL r 1 CVS 1 CVS 2 VA 3 5 CRL δ-crl OCSP 1 r CRL δ-crl VA 1 5 M n (1 n 5) [] M 12 = M 1 + M 2 M 35 = M 3 + M 5 1 M x x 9 M CRL =(r 1)(M 12 + M 4) (13) M deltacrl = M CRL (14) M OCSP1 =(r 1)(M 12 + αm 4 + M 35) (15) M OCSP2 =(r 1)(M 12 + αm 4)+M 35 (16) M CV S1 =(r 1)α(M 12 + M 4)+M 35 (17) M CV S2 = M CV S1 (18) 3. 6 CRL δ-crl 0 10 CVS 1 2 r OCSP 1 2 CA r 1 OCSP 1 r 1 OCSP 2 CVS 1 2 OCSP 1 (r 1)(D n +D ig) OCSP 2 (r 1)D n + D ig CVS 1 2 rd n + D ig CVS 2 CA VA VA VA VA Nv 1 CVS 2 VA VA R CV S2 R CV S2 = Nv 1 (r 1) (Dn + Dig) β (19) VA VA VA OCSP 1 1 R x x 11 R CRL = R deltacrl = 0 (20) (r 1)(Dn + Dig) R OCSP1 = (21) (r 1)Dn + Dig R OCSP2 = (22) R CV S1 = rd n + D ig (23) { rd n + D ig R CV S2 = 9 r 1 CA 10 CRL
7 2007/2 Vol. J90 D No. 2 + Nv 1 } (r 1)(Dn + Dig) β (24) M 2 M VA (δ-)crl OCSP 1 2 CVS 1 12 (a) (1) T x x T x = C x + M x + R x (2) (23) 3 1 T x x T CRL = M (25) T deltacrl = M (26) T OCSP1 = β (0.712α+4)M (27) T OCSP2 = β (0.712α+3)M (28) T CV S1 = β (2.712α+1)M (29) k, 384k, 6 =28.8k [bit/] Fig. 6 The average of the verification time in the each ytem when the tranaction peed i =28.8k [bit/]. 7 = 384k [bit/] Fig. 7 The average of the verification time in the each ytem when the tranaction peed i = 384k [bit/]. 2.4M [bit/] α = β = 100 CA VA 100 (25) (29) Y CRL 12 CVS 2 390
8 3 Table 3 Parameter for evaluation. 1 2 N [ ] 77,229, ,000 N [ ] 633,000 77,229,000 q [ /day] p [ /day] 0.1/ /365 L [day] CRL δ-crl T C [day] 1 1 CRL l n,[bit] CRL l ig [bit] CA k [ ] VA [ ] OCSP D n [bit] OCSP D ig [bit] CVS D n [bit] 6,464 6,464 CVS D ig [bit] bae-crl T B [ ] M 1 [] 0 0 M 2 [] M M M 3 [] 0 0 CRL M 4 [] 0.356M 0.356M M 5 [] M M M Table4 ThevalueofM that i the interection in Fig. 6, 7 and k 384k 2.4M T CRL M = M = M = T deltacrl M = M = M = T OCSP 1 M = M = M = T OCSP 2 M = M = M = =2.4M [bit/] Fig. 8 The average of the verification time in the each ytem when the tranaction peed i =2.4M [bit/]. Y CVS CVS (α =1.0) (β =1.0) OCSP 2 CVS 1 (28) (29) M T CV S1 >T OCSP2 CVS CVS (b) CVS T CV S1 M 4 391
9 2007/2 Vol. J90 D No k [bit/] M = T CV S1 T OCSP2 26.2m [] CVS (c) CVS VA α α 0.5 = 384k [bit/] =2.4M [bit/] OCSP 1 OCSP 2 CVS 1 9 CVS 1 9 CVS 1 α CVS 1 9 CVS CVS (CRL) CRL CVS 2 13 VA VA CVS 1 CVS 1 CVS 2 VA VA CA α =0.5 VA β =1.0 CA VA VA = 100M [bit/] CVS OCSP 1 2 CVS Fig. 9 Area where average verification time of CVS method become mall more than OCSP method 1 and = 100M [bit/] Fig. 10 The average of the verification time in the each ytem when the tranaction peed i = 100M [bit/] CA CRL VA CA CRL OCSP VA CRL 392
10 14 10 CVS 1 CVS 2 (CRL) CVS CRL OCSP CVS 3. CRL OCSP [2] CVS 1 CDMA 1x WIN BREW CPU Intel r Pentium r GHz 2GByte OS Window r XP operating ytem 5 (M CV S1) (R CV S1) (T CV S1) CRL C CV S1 =0 M 35 =0 675 [Byte] 569 [Byte] 5[Byte] 1249 [Byte] rd n + D ig = 9992 [bit] α =0.16/ CRL 7 CRL 4. M (17) (28 [m]) 2 (r =2) (M 35 =0) (α =0.16/10.03) M 12+M 4 = 1755 [m] (13) (14) CRL M CRL = M deltacrl = 1755 [m] (15) (16) 7 CRL M 4 =0.356M 2 M 1 =0 M OCSP1 = M OCSP2 = 1302 [m] (23) (879 [m]) 9992 [bit] = [bit/] 1 OCSP 704 [bit] (21) (22) R OCSP1 = R OCSP2 =62[m] 8 γ n (n = 1, 2, 3) 1 1 CRL 6 Table 6 The meaurement value of ignature generation time. [m] CRL Table 7 The ratio between time of verifying ignature and earching CRL. (M 2 M 5) 1 CRL (M 4) Table 5 The meaurement value of certificate validation time. [m] (M CV S1) 28 (R CV S1) (879) (T CV S1) 907 * 8 Table 8 Certificate verification time of each method. [m] T CRL T deltacrl γ 1 T OCSP 1 T OCSP γ 2 T CV S γ 3 14 OCSP
11 2007/2 Vol. J90 D No. 2 (5) (11) (12) CRL CA k VA T C q q 1 T p C T ex 1 p C vx 1 p T C vx 1 1 γ n γ 1 = l CRL/ γ 2 = γ 3 = l CRL/(β ) VA VA CA β >1 γ 1 >γ 2 = γ 3 15 γ 8143 [Byte] CRL CRL 106 [m] (6) 3 CRL 1230 [Byte] 106 [m] γ CVS CRL CRL CRL λ =(q N/Nv)/( ) M/M/S [m] 15 T = R CRL δ-crl CRL CRL 1 δ-crl CRL γ 1 11 Fig. 11 The average repone time. 5. VA (NICT) Window Microoft Corporation Intel Pentium Intel Corporation BREW BREW Qualcomm [1] PKI vol.45, no.12, pp
12 2833, [2] IT , Sept [3] 2005 pp , Oct [4] 28 pp , Nov [5] ITU-T Recommendation X.509 (2000) ISO/IEC :2001: Information Technology Open Sytem Interconnection The Directory: Public-key and Attribute Certificate Framework. [6] R. Houley, T. Polk, W. Ford, and D. Solo, RFC Internet X.509 Public Key Infratructure Certificate and Certificate Revocation Lit (CRL) Profile, IETF, April [7] M. Myer, R. Ankney, A. Malpani, S. Galperin, and C. Adam, RFC X.509 Internet Public Key Infratructure Online Certificate Statu Protocol OCSP, IRTF, June [8] H15/12/17 [9] D-I vol.j87-d-i, no.8, pp , Aug [10] X.509 vol.2005, no.33, pp.55 60, [11] S. Hane, T. Fujihiro, Y. Hahimoto, T. Kaji, K. Kondo, and S. Tezuka, Speeding up X.509 certificate path validation, 4th International Workhop for Applied PKI, IWAP2005, [12] PKI 2002, pp , [13] (GPKI) OFS , [14] vol.2005, no.70, pp , [15] T. Freman, R. Houley, A. Malpani, D. Cooper, and T. Polk, Simple Certificate Validation Protocol (SCVP), IETF, July [16] CRL A 1 A 4 CRL OCSP 2 CVS 1 CRL 2. l CRL p 16 CRL A 1 (δ-)crl CRL Fig. A 1 Derive the average of the acquirement time of CRL for (δ-)crl model. A 2 OCSP 1 CRL Fig. A 2 Derive the average of the acquirement time of CRL for OCSP model [1] 395
13 2007/2 Vol. J90 D No. 2 l n l ig (6) 3. l delta(n) bae-crl n δ-crl P n CA T C N pt C/k [ ] P nt C/L [ ] A 3 CVS 1 OCSP 2 CRL Fig. A 3 Derive the average of the acquirement time of CRL for CVS model 1 and OCSP model 2. A 4 CVS 2 CRL Fig. A 4 Derive the average of the acquirement time of CRL for CVS model 2. N table (N,L,p,k) CA 1 N p/k [ ] N table (N,L,p,k)/L [ ] N table (N,L,p,k) N table (N,L,p,k)= N pl (A 1) k CRL l CRL P n+1 = P n + N pt C k PnTC L (A 2) P 0 =0 P n 1 n T B/T C 1 P n = N { ( ) pl n } TC 1 (A 3) k L n δ-crl l delta (n) l n l ig (10) N 2 N [16] ,126 IP 1 N 2 N [16] / 26.0% 20.3% 14.6% 3 1 q [16] [ / ] [ / ] 1 3[ /day]
14 2 q ,229,000 3[ ] 633,000 [ ] 77,229,000 3/633,000 p L T C l n l ig [1] [1] N N [1] 1 2 N N CA k 2 CA 1 VA 19 (B) (C) A: 1/7 B: 1/18 C: 1/ CRL 1:0.356 CRL l CRL (6) 3 l CRL = 9843 [bit] CRL 5. CRL (5) (7) (11) (12) 1 CRL C CRL = [m] (A 4) C deltacrl = [m] (A 5) C OCSP1 = [m] (A 6) C OCSP2 = [m] (A 7) C CV S1 = [m] (A 8) D n D ig [7] D n D ig [3] T B [1] M 1 M 1 0 M 3 0 M 2 M 5 M M 4 CRL M 6 CRL 3 1 (A) 19 (MVNO)
15 2007/2 Vol. J90 D No LAN UCLA IEEE Fellow 2001 ACM 398
untitled
better RFID 1 /?? PKI PKI ) (GPKI) GtoB GPKI 3300- LGPKI GtoC -> Identrus B2B GPKI Identrus PKI 2 Internet-VPN PKI? HTTPS ( ) HTTPS 3 PKI??????? PDA/ /? RFIDPKI?? 4 Challenge
More informationはじめに
19 1.1 19 1.2 21 1.3 22 1.3.1 DES 24 1.4 25 1.4.1 DH 26 1.4.2 RSA 26 1.4.3 ElGamal 27 1.4.4 DSA 27 1.5 27 1.6 28 1.6.1 SHA-1 28 1.6.2 MD5 Message Digest 5 28 1.7 29 1.7.1 MIC 29 1.7.2 HMAC 29 1.7.3 30
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More information第3 章 電子認証技術に関する国際動向
3 IETF PKI TAM Trust Anchor Management 3. IETF Internet Engineering Task Force PKIX WG 3.1. IETF PKIX WG 1 2006 PKI Public-Key Infrastructure IETF PKIX WG 2007 69 IETF 70 IETF WG PKIX WG 2006 3 2 3.2.
More information/07/ /10/12 I
Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...
More informationVol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A
Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,
More information/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR
for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web
More information証明書検証サーバ
(Certificate Validation Server) 2007/11/1 Version 1.09 (Certificate Validation Server) 1 2006/4/27 0.930 2 2007/5/8 0.940 / 3 2007/5/15 0.950 Solaris TOE Linux TOE ST 4 2007/5/23 0.960 ASE ( : ASE001-01)
More informationuntitled
PKI 1 / SSL/TLS PKI 28 Oct 2005 PKI /JNSA PKI Day 3 PKI? 2 RFC 2459/RFC 3280/RFC 3280bis CRL(RFC 2459/RFC 3280/RFC 3280bis) OCSP(RFC 2560/Light-weight OCSP) SCVP(SCVP) CMP(RFC 2510/RFC 4210) CRMF(RFC 2511/RFC
More informationInput image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L
1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More information5b_08.dvi
, Circularly Polarized Patch Antennas Combining Different Shaped Linealy Polarized Elements Takanori NORO,, Yasuhiro KAZAMA, Masaharu TAKAHASHI, and Koichi ITO 1. GPS LAN 10% [1] Graduate School of Science
More informationYMS-VPN1_User_Manual
YAMAHA VPN YMS-VPN1 2007 12 YAMAHA VPN YMS-VPN1 YMS-VPN1 RT Windows PC IPsec VPN 2000-2002 SSH Communications Security Corp 2004-2007 SafeNet Inc. 2004-2007 dit Co., Ltd. 2006-2007 YAMAHA CORPORATION MicrosoftWindows
More information第62巻 第1号 平成24年4月/石こうを用いた木材ペレット
Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting
More informationShonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral
MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**
More informationProposal of Driving Torque Control Method for Electric Vehicle with In-Wheel Motors Masataka Yoshimura (Yokohama National University) Hiroshi Fujimoto
Propoal of Control Method for Electric ehicle with In-Wheel Motor Maataka Yohimura (Yokohama National Univerity) Hirohi Fujimoto (The Univerity of Tokyo) Abtract The anti-lip control or the lip ratio control
More information1_26.dvi
C3PV 1,a) 2,b) 2,c) 3,d) 1,e) 2012 4 20, 2012 10 10 C3PV C3PV C3PV 1 Java C3PV 45 38 84% Programming Process Visualization for Supporting Students in Programming Exercise Hiroshi Igaki 1,a) Shun Saito
More informationIPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-
1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,
More informationCisco® ASA シリーズルーター向けDigiCert® 統合ガイド
Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,
More information1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush
PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: alex@ee.tokushima-u.ac.jp Id: itrc20th-20061005.tex,v
More informationVol.8 No (July 2015) 2/ [3] stratification / *1 2 J-REIT *2 *1 *2 J-REIT % J-REIT J-REIT 6 J-REIT J-REIT 10 J-REIT *3 J-
Vol.8 No.2 1 9 (July 2015) 1,a) 2 3 2012 1 5 2012 3 24, 2013 12 12 2 1 2 A Factor Model for Measuring Market Risk in Real Estate Investment Hiroshi Ishijima 1,a) Akira Maeda 2 Tomohiko Taniyama 3 Received:
More informationIPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [
1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)
More information2. CABAC CABAC CABAC 1 1 CABAC Figure 1 Overview of CABAC 2 DCT 2 0/ /1 CABAC [3] 3. 2 値化部 コンテキスト計算部 2 値算術符号化部 CABAC CABAC
H.264 CABAC 1 1 1 1 1 2, CABAC(Context-based Adaptive Binary Arithmetic Coding) H.264, CABAC, A Parallelization Technology of H.264 CABAC For Real Time Encoder of Moving Picture YUSUKE YATABE 1 HIRONORI
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More informationzsj2017 (Toyama) program.pdf
88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88
More information88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88
More information_170825_<52D5><7269><5B66><4F1A>_<6821><4E86><5F8C><4FEE><6B63>_<518A><5B50><4F53><FF08><5168><9801><FF09>.pdf
88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88
More information3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre
3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationIPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc
iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto
More informationJFE.dvi
,, Department of Civil Engineering, Chuo University Kasuga 1-13-27, Bunkyo-ku, Tokyo 112 8551, JAPAN E-mail : atsu1005@kc.chuo-u.ac.jp E-mail : kawa@civil.chuo-u.ac.jp SATO KOGYO CO., LTD. 12-20, Nihonbashi-Honcho
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More informationuntitled
PKI UTF8String Part4: IETF MicrosoftMSWindowsWindows 2000Windows NTWindows XPWindows Internet ExplorerOutlookOutlook Express Microsoft Corporation Sun MicrosystemsSun Java Solaris JavaJDK Sun Microsystems
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More informationIEEE e
2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More information携帯グループ(完成版)2007
The present condition and the next development of mobile phone industry The present condition and the next development of mobile phone industry WiMAX 90 1 16.5 5 5 13 13 5 5 5 1 NEC 1 2007 07 11 2 2G GSM
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More informationO1-1 O1-2 O1-3 O1-4 O1-5 O1-6
O1-1 O1-2 O1-3 O1-4 O1-5 O1-6 O1-7 O1-8 O1-9 O1-10 O1-11 O1-12 O1-13 O1-14 O1-15 O1-16 O1-17 O1-18 O1-19 O1-20 O1-21 O1-22 O1-23 O1-24 O1-25 O1-26 O1-27 O1-28 O1-29 O1-30 O1-31 O1-32 O1-33 O1-34 O1-35
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More information1: A/B/C/D Fig. 1 Modeling Based on Difference in Agitation Method artisoc[7] A D 2017 Information Processing
1,a) 2,b) 3 Modeling of Agitation Method in Automatic Mahjong Table using Multi-Agent Simulation Hiroyasu Ide 1,a) Takashi Okuda 2,b) Abstract: Automatic mahjong table refers to mahjong table which automatically
More information(2) LAN PDA (3) 14 13 14
3.4.5 (1) RF-ID (2) LAN PDA (3) 14 13 14 a b (4) 14 (5) 14 (6) 14 14 a ID 03c312508144a000 ID 0385b1508144a001 2 b CSV ID:056571508144a002 (7) 14 a 15 b ID ID ID 15 (8) 14, 1 FIT2002 Vol.4, M-80, pp.193-194,
More informationLinux Activities for Promoting Desktop Linux Utilization Jun Iio Research Center for Information Technology, Mitsubish
Linux Activities for Promoting Desktop Linux Utilization Jun Iio iiojun@mri.co.jp 100-8141 2-3-6 Research Center for Information Technology, Mitsubishi Research Institute, Inc. 2-3-6 Otemachi, Chiyoda-ku,
More informationuntitled
1 2 1 3 IR... 4 2 5 1990 Surety 1990 2000 IETFISO/IEC 6 3 7 ISO/IEC 18014 IETF RFC 3161 Time-stamp Protocol ETSI TS 102 023RFC 3628) ETSI TS 101 861 8 4 (TSA, Time Stamping Authority) 1ab5c98f... 1ab5c98f...
More informationxx/xx Vol. Jxx A No. xx 1 Fig. 1 PAL(Panoramic Annular Lens) PAL(Panoramic Annular Lens) PAL (2) PAL PAL 2 PAL 3 2 PAL 1 PAL 3 PAL PAL 2. 1 PAL
PAL On the Precision of 3D Measurement by Stereo PAL Images Hiroyuki HASE,HirofumiKAWAI,FrankEKPAR, Masaaki YONEDA,andJien KATO PAL 3 PAL Panoramic Annular Lens 1985 Greguss PAL 1 PAL PAL 2 3 2 PAL DP
More information1.indd
14 15 6 april 6 16 17 18 april 18 april 18 19 28 april 20 21 28 april 22 23 21 may 24 25 10 june 21 may 26 27 10 june 28 29 12 june 30 31 12 25 june 32 33 25 34 35 4 july 37 36 38 39 25 july 25 july 40
More informationimai@eng.kagawa-u.ac.jp No1 No2 OS Wintel Intel x86 CPU No3 No4 8bit=2 8 =256(Byte) 16bit=2 16 =65,536(Byte)=64KB= 6 5 32bit=2 32 =4,294,967,296(Byte)=4GB= 43 64bit=2 64 =18,446,744,073,709,551,615(Byte)=16EB
More information1 911 9001030 9:00 A B C D E F G H I J K L M 1A0900 1B0900 1C0900 1D0900 1E0900 1F0900 1G0900 1H0900 1I0900 1J0900 1K0900 1L0900 1M0900 9:15 1A0915 1B0915 1C0915 1D0915 1E0915 1F0915 1G0915 1H0915 1I0915
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation
More informationDual Stack Virtual Network Dual Stack Network RS DC Real Network 一般端末 GN NTM 端末 C NTM 端末 B IPv4 Private Network IPv4 Global Network NTM 端末 A NTM 端末 B
root Android IPv4/ 1 1 2 1 NAT Network Address Translation IPv4 NTMobile Network Traversal with Mobility NTMobile Android 4.0 VPN API VpnService root VpnService IPv4 IPv4 VpnService NTMobile root IPv4/
More informationSmartLMSユーザーズガイド<講師編>
SmartLearning Management System SmartLMS (1) (2) (3) (4) (3) (5) Microsoft MS PowerPoint DirectX Windows Windows NT Windows Media Microsoft Corporation Intel Pentium Intel Corporation NEC 2003-2004 NEC
More information2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii
2011 4 2006/6/16 2006/9/1 2007/11/9 () 2011/4/21 2005 2006 3 (2005 12 ())2005 12 13 2011 4 21 2011 4 ii 1 2 A 3 B C IT NISD-K304-101 NISD-K305-101 iii ST ST DM6-08-101 2011 4 ST ST NISD-K304-101 NISD-K305-101
More informationIPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1
1, 2 1 1 1 Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1 Nobutaka ONO 1 and Shigeki SAGAYAMA 1 This paper deals with instrument separation
More informationVisual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science,
Visual Evaluation of Polka-dot Patterns Yoojin LEE and Nobuko NARUSE * Granduate School of Bunka Women's University, and * Faculty of Fashion Science, Bunka Women's University, Shibuya-ku, Tokyo 151-8523
More informationfl™‹ä1.eps
Information Science Japan Advanced Institute of Science and Technology, Announcement of Researchers School of Information Science Shirai Laboratory Research Interests Associate Professor Kiyoaki Shirai
More informationVol. 23 No. 4 Oct. 2006 37 2 Kitchen of the Future 1 Kitchen of the Future 1 1 Kitchen of the Future LCD [7], [8] (Kitchen of the Future ) WWW [7], [3
36 Kitchen of the Future: Kitchen of the Future Kitchen of the Future A kitchen is a place of food production, education, and communication. As it is more active place than other parts of a house, there
More information...i A
...i A 1....2 1.1...2 1.2...2 1.3...2 2....3 2.1...4 2.1.1...4 2.1.2...4 2.1.3...6 2.1.4...7 2.1.5...7 2.1.6...8 2.2...8 2.2.1...8 2.2.2...9 2.3...10 3.... 11 3.1...12 3.2...12 3.2.1...13 3.2.2...18 3.2.3...20
More informationEpson Print Admin
Epson Print Admin NPD5368-02 JA Epson Print Admin Epson Print Admin Epson Print Admin Epson Print Admin Epson Open Platform Epson Open Platform Epson Print Admin Epson Print Admin Epson Print Admin Epson
More information& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us
1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.23 Vol.2009-GN-73 No.23 Vol.2009-EIP-46 No /11/27 t-room t-room 2 Development of
t-room 1 2 2 2 2 1 1 2 t-room 2 Development of Assistant System for Ensemble in t-room Yosuke Irie, 1 Shigemi Aoyagi, 2 Toshihiro Takada, 2 Keiji Hirata, 2 Katsuhiko Kaji, 2 Shigeru Katagiri 1 and Miho
More informationIPSJ SIG Technical Report Vol.2014-ARC-213 No.24 Vol.2014-HPC-147 No /12/10 GPU 1,a) 1,b) 1,c) 1,d) GPU GPU Structure Of Array Array Of
GPU 1,a) 1,b) 1,c) 1,d) GPU 1 GPU Structure Of Array Array Of Structure 1. MPS(Moving Particle Semi-Implicit) [1] SPH(Smoothed Particle Hydrodynamics) [] DEM(Distinct Element Method)[] [] 1 Tokyo Institute
More informationID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR
Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append
More information22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Gener
22 (266) / Web PF-Web Web Web Web / Web Web PF-Web Web Web Web CGI Web Web 1 Web PF-Web Web Perl C CGI A Pipe/Filter Architecture Based Software Generator PF-Web for Constructing Web Applications. Tomohiro
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More information,,.,,., II,,,.,,.,.,,,.,,,.,, II i
12 Load Dispersion Methods in Thin Client Systems 1010405 2001 2 5 ,,.,,., II,,,.,,.,.,,,.,,,.,, II i Abstract Load Dispersion Methods in Thin Client Systems Noritaka TAKEUCHI Server Based Computing by
More informationQ [4] 2. [3] [5] ϵ- Q Q CO CO [4] Q Q [1] i = X ln n i + C (1) n i i n n i i i n i = n X i i C exploration exploitation [4] Q Q Q ϵ 1 ϵ 3. [3] [5] [4]
1,a) 2,3,b) Q ϵ- 3 4 Q greedy 3 ϵ- 4 ϵ- Comparation of Methods for Choosing Actions in Werewolf Game Agents Tianhe Wang 1,a) Tomoyuki Kaneko 2,3,b) Abstract: Werewolf, also known as Mafia, is a kind of
More informationF = 0 F α, β F = t 2 + at + b (t α)(t β) = t 2 (α + β)t + αβ G : α + β = a, αβ = b F = 0 F (t) = 0 t α, β G t F = 0 α, β G. α β a b α β α β a b (α β)
19 7 12 1 t F := t 2 + at + b D := a 2 4b F = 0 a, b 1.1 F = 0 α, β α β a, b /stlasadisc.tex, cusp.tex, toileta.eps, toiletb.eps, fromatob.tex 1 F = 0 F α, β F = t 2 + at + b (t α)(t β) = t 2 (α + β)t
More informationIT 1. IT 2. 2.1. IT 2.2. SKYSEA Client View Government License Light Edition Sky 1500 28 2 15 12 3. 4. 28 3 25 1 5. 5.1. (1) 28 4 1 (2) (3) (4) ISO27001 P (5) ISO/IEC20000 (6) USB 1 (7) OS (8) 1 CPU 4
More informationIPSJ SIG Technical Report Vol.2012-HCI-149 No /7/20 1 1,2 1 (HMD: Head Mounted Display) HMD HMD,,,, An Information Presentation Method for Weara
1 1,2 1 (: Head Mounted Display),,,, An Information Presentation Method for Wearable Displays Considering Surrounding Conditions in Wearable Computing Environments Masayuki Nakao 1 Tsutomu Terada 1,2 Masahiko
More information2016 10 31 1. 1.1 20 1 1993 20 2 2 1 industrial society 2 2 169 2014 3 1.2 4 5 6 3 1.3 4 5 1973 6 170 7 8 9 7 ISO/IEC 9126 11 8 1 9 ABS ABS ABS ABS 171 2. 2.1 1960 10 11 12 13 10 1964 IBM S/360 11 16 FORTRAN
More information2013 M
2013 M0110453 2013 : M0110453 20 1 1 1.1............................ 1 1.2.............................. 4 2 5 2.1................................. 6 2.2................................. 8 2.3.................................
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More information1 y(t)m b k u(t) ẋ = [ 0 1 k m b m x + [ 0 1 m u, x = [ ẏ y (1) y b k m u
( ) LPV( ) 1 y(t)m b k u(t) ẋ = [ 0 1 k m b m x + [ 0 1 m u, x = [ ẏ y (1) y b k m u m 1 m m 2, b 1 b b 2, k 1 k k 2 (2) [m b k ( ) k 0 b m ( ) 2 ẋ = Ax, x(0) 0 (3) (x(t) 0) ( ) V (x) V (x) = x T P x >
More informationWindows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.
Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise
More informationEmacs ML let start ::= exp (1) exp ::= (2) fn id exp (3) ::= (4) (5) ::= id (6) const (7) (exp) (8) let val id = exp in
Emacs, {l06050,sasano}@sic.shibaura-it.ac.jp Eclipse Visual Studio Standard ML Haskell Emacs 1 Eclipse Visual Studio variable not found LR(1) let Emacs Emacs Emacs Java Emacs JDEE [3] JDEE Emacs Java 2
More information27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U
YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube
More informationVol. 44 No. 12 Dec , 3 4 Development and Evaluation of Information Provision System for In-Vehicle Terminal Based on Agent Framework Masa
Vol. 44 No. 12 Dec. 2003 1 1 1 2, 3 4 Development and Evaluation of Information Provision System for In-Vehicle Terminal Based on Agent Framework Masanori Hattori, 1 Kenta Cho, 1 Akihiko Ohsuga, 1 Shinichi
More information21 VoIP An encrypted VoIP communication system for mobile telephones
21 VoIP An encrypted VoIP communication system for mobile telephones 1095702 2010 3 4 VoIP, IP., IP, VoIP(Voice over Internet Protocol)., VoIP,., VoIP over SSL(VoIPs), VoIPs.,,.,, VoIP., LAN VoIP. LAN
More information1 Vol Vol JULY 6 JUNE
01 02 03 04 05 07 08 09 10 11 12 14 15 16 17 18 19 21 22 23 25 26 29 OPEN CAMPUS 1 Vol.201 2 Vol.201 7 JULY 6 JUNE 3 Vol.201 4 Vol.201 5 Vol.201 Vol.201 6 8/3 MON 7 Vol.201 Vol.201 8 Columbia University
More information