P2P Multiple Secret Sharing P2P IP ISP Named Data Networking(NDN) NDN P2P Multiple Secret Sharing i
|
|
- かずき みつだ
- 7 years ago
- Views:
Transcription
1
2 P2P Multiple Secret Sharing P2P IP ISP Named Data Networking(NDN) NDN P2P Multiple Secret Sharing i
3 P2P Digital Right Management(DRM) DRM DRM P2P P2P Distributed Hash Table(DHT) P2P CGM :(k, n) :Multiple Secret Sharing Multiple Secret Sharing ii
4 3 NDN Named Data Networking NDN NDN Content Firewall D cmd iii
5 % % % Interest packet Data packet NDN router iv
6 v
7 1
8 P2P P2P ISP ASP P2P Content Delivery Network(CDN) CDN CDN CDN Google Google Youtube Google ISP ASP 1.2 ASP
9 1 3 P2P P2P IP Multiple Secret Sharing P2P ISP Named Data Networking(NDN) NDN P2P Content Firewall P2P Multiple Secret Sharing P2P 3 NDN 2 Secret Sharing Multiple Secret Sharing 3 NDN NDN Content Firewall P2P P2P Multiple Secret Sharing
10 2 P2P
11 2 P2P %P2P [1] [2] Youtube [3] [4] CGM(Consumer Generated Media) ISP 4 1 [5] CGM iphone 3.9G LTE P2P P2P [6] Sharecast [7] UG Live [8] P2P P2P CGM P2P Contents Delivery Network(CDN) [9] P2P P2P P2P CGM CGM P2P Einy OnDemand Skeedcast Windows Media Digital Rights Management(WMDRM) [10] CGM DRM CGM
12 2 P2P 6 Veoh P2P CGM P2P PPLive DRM [11] [12] P2P DRM CGM [13, 14] P2P CGM Multiple Secret Sharing 2.2 DRM 2.3 P2P 2.4 P2P Digital Right Management(DRM) DRM DRM DRM DRM WMDRM Fairplay DRM DRM
13 2 P2P 7 (3) DTCP DRM DRM DRM CGM DRM DRM CGM 2.3 P2P P2P P2P ( ) Hybrid P2P Super node P2P Pure P2P 3 Hybrid P2P Super node P2P Node Node Super node CGM Super node Pure P2P Pure P2P
14 2 P2P Distributed Hash Table(DHT) Pure P2P Distributed Hash Table(DHT) DHT Pastry [15] Chord [16] Kademlia [17] Pastry 10 P2P 4 DHT DHT ( ) DHT 2.4 P2P CGM P2P CGM 2.3 P2P CGM CGM 1 ID 2 3 ID DHT P2P (ID) ID IP DHT Pure P2P ID P2P ID
15 2 P2P 9 ID ID DHT ID ID (DRM) CGM (CGM ) CGM P2P CGM P2P CGM P2P 3. CGM P2P P2P P2P P2P CGM P2P (PKI)
16 2 P2P 10 CGM 2.5 :(k, n) 2.4 Shamir [18] Blakley [19] (k, n) (Secret Sharing Scheme) [13, 14] (k, n) n k : 1. P2P P2P DHT
17 2 P2P (k, n) n P2P 3. ID P2P ID DHT 5. P2P k P2P P2P k 1 P2P DHT 2.5.2
18 2 P2P : 2.1: % 10% - 60% (10% ) n 100 DHT 60 Pastry() ( 2.1) Overlay Weaver [20] P2P 10% P2P M/M/S(0) [21] PPLive [22] 21 ( 2.2) k 22
19 2 P2P 13 n k P2P n k k n P2P n P2P 2.6 :Multiple Secret Sharing 2.5 P2P n P2P Multiple Secret Sharing 1 P2P DHT ID P2P Multiple Secret Sharing Multiple Secret Sharing Multiple Secret Sharing Multiple Secret Sharing Scheme He Dawson [23] (k, n) Multiple Secret Sharing 1 Multiple Secret Sharing Duo Liu Multiple Secret Sharing [24] (k, n) Duo Liu Multiple Secret Sharing Duo Liu Bilinear self-pairing
20 2 P2P 14 q GF (q) E : y 2 = x 3 + ax + b ( a, b GF (q), 4a b 2 0 ) [24] P = (x 1, y 1 ) E P = (x 1, y 1 ) E Q = (x 2, y 2 ) E Q P P + Q = (x 3, y 3 ) x 3 = λ 2 x 1 x 2 y 3 = λ(x 1 x 3 ) y 1 (y 2 y 1 ) (x λ = 2 x 1 ), P Q; (3x 2 1 +a) (2y 1 ), P = Q. Bilinear self-pairing Lee Bilinear self-pairing [25] K 0 p E = E(K) K K K P E lp = 0 l E P l- lp = 0 P E(K) E(K)[l] E(K) l- (l 0) E(K)[l] E[l] l K char(k) 0 p (p l ) E[l] E[l] = Z l Z l G H E[l] E[l] G H E[l] P = a 1 G+b 1 H Q = a 2 G+b 2 H a 1, a 2, b 1, b 2 [0, l 1] α, β [0, l 1] E[l] E[l] E[l] L α,β (P, Q) = (a 1 b 2 a 2 b 1 )(αg + βh) α, β = D n {U 1, U 2,..., U n }
21 2 P2P : 1. D GF (q) E(GF (q)) q = p r p GF (q) E(GF (q)) 2. D l l t E[l] E(GF (q t )) 3. D {G, H} E[l] L α,β α, β [1, l 1] 4. D {E, q, l, t, αg + βh} P2P 5. D A : k 1 A = k (n 1) (n 1) 2 (n 1) k 1 n k 6. D 2k {ã j, b j } 1 j k ã j, b j [0, l 1] (1 j k)
22 2 P2P D (a 1, a 2,, a n ) T = A (ã 1, ã 2,, ã k ) T (b 1, b 2,, b n ) T = A ( b 1, b 2,, b k ) T 8. D 1 j n U j {a j, b j } : m {M 1, M 2,, M m } {M 1, M 2,, M m } i 1 i m
23 2 P2P D P k = ã k G + b k H 2. D c i, d i [0, l 1] Q i = c i G + d i H 3. D R i = L α,β (Q i, P k )+M i {c i, d i, R i } P2P {U u1, U u2,, U uk } i 1 i m j 1 j k 1. U uj D {a j, b j } 2. U uj D {E, q, l, t, αg + βh} M i {c i, d i, R i } 3. U uj Q i,j = L α,β (Q i, P uj ) P uj Q i P uj = a uj G + b uj H Q i = c i G + d i H 4. U uj Q i,j {M i } 1 i m i 1 i m j 1 i k 1. U uj Q i,j 2. k T i = y j Q i,j j=1 y j = k (u j u J ) J=1,J j 1 3. D {c i, d i, R i } M i = R i T i
24 2 P2P : 1. P2P 2. P2P ( 2.5) 3. k 1 P2P k 1 k 1
25 2 P2P (2.6.2 ) O(1) (2.6.3) 4 1 O(1) 6 1 O(1) 1 k 2 k O(k 2 ) Windows media DRM(WMDRM) ID 2KB [10] P2P 2.5 n P2P n DHT DHT 1 n DHT 1 DHT
26 2 P2P m O(mn) P2P n () P2P 1 DHT 1 m O((n+1)+m) = O(n+m) m CGM m DHT Kademlia Python2.5.2 M/M/S(0) [21] 20% 80% Kademlia key value Kademlia Network 2.2
27 2 P2P : Parameter k-bucket size 20 α 3 republish interval 60 min. expire interval 120 min. Number of nodes 1000 Number of malicious nodes 100 Number of contents 10 Number of shadows per content 100 Average online rate 20% 40% 60% Percentage of heavy users 20% Percentage of popular contents 20% Average online period 60 min. Usage period of each accessed content 10 min. Timeout of relaying delete requests 30 min. Number of contents chached on a node 4
28 2 P2P 22 k-bucket 10 Kademlia Network 2.2 Kademlia Network k-bucket Kademlia Network α Kademlia Petar [17] key-value expire expire ( ) 20% % republish () expire expire
29 2 P2P 23 Kademlia Publish lookup k-bucket expire P2P (30 ) republish 60 republish expire republish expire 3 lookup expire expire republish 90 expire expire : 20% 20% 40% 60%P2P
30 2 P2P : 40% 2.8: 60%
31 2 P2P lookup k-bucket %- 20% republish % republish Kademlia republish k % 20% republish k 40 40% republish 9 20% k 65 60% republish
32 2 P2P 26 k k-bucket lookup 2.9 DRM P2P CGM P2P (k, n) P2P (k, n) Multiple Secret Sharing (k, n) 2 P2P
33 3 NDN
34 3 NDN Named Data Networking(NDN) NDN P2P TCP/IP P2P CDN Content Pollution DDoS Location independent NDN Supervisor Application NDN 3.2 Named Data Networking NDN NDN NDN router Interest packet Data packet( 3.1 [26]) Packet NDN router LAN 3G/4G (face) ( 3.2)NDN Jacobson [26,27] NDN NDN router 3.3 User Application Interest packet NDN router Interest packet URL /u-tokyo.ac.jp/videos/hoge.mp4 Data packet VoIP
35 3 NDN : Interest packet Data packet Figure 1: Packets In the NDN Architecture. Interest packet /u-tokyo.ac.jp/voip/alice to bob/ v / s2 URL NDN achieved by conventions agreed between data producers and NDN router Interest packet versioning and segmentation. Name conventions are specific NDN router Interest packet Pending Interest Table(PIT) Forwarding Names do not Information needbase(fib) to be globally unique, 3.2.1althoughretrie uniqueness. /u-tokyo.ac.jp/videos/hoge.mp4 Names intended for Name local /u-tokyo.ac.jp/ communication may b -> faces 1,2 Name FIB face Interest only local routing (or local broadcast) to find corresponding d packet /u-tokyo.ac.jp/video/ -> faces 1 FIB To retrieve NDN router dynamically generated data, consumers must b FIB Interest packet Name for a desired piece of data without having previously seen Data packet algorithm Intrest allows producer packet FIB and consumer IP to arrive at the s and/or (2) consumers can retrieve datainterest based packet on partial nam PIT /parc/videos/widgeta.mpg and get back a data packet n FIB consumer OSPF [28] can BGP then [29] specify later segments and request them IP forwarding table [30] FIB by the first data packet and the naming convention agreed upo The naming system is the most important piece in the NDN particular, how to define and allocate top level names remain need be answered immediately, however; the opaqueness o Fi
36 3 NDN : NDN router NDN router Interest packet Data packet Data packet Data packet Data packet FIB NDN router Data packet NDN router Interest packet Data packet PIT Interest packet Data packet PIT Content Store Data packet Data packet Interest packet Data packet Interest packet Data packet Interest packet Data packet
37 3 NDN Interest packet NDN router Data packet Interest packet FIB Intrest packet (3.2.1 ) Data packet Interest packet NDN NDN 2.1 NDN Data packet NDN router Content Store Data packet Data packet Data packet VoIP IM NDN Data packet PKI [31] PGP Web of Trust [32] SDSI/SPKI [33 35] CRL OCSP [36] NDN Data packet Content Store IP NDN P2P NDN router Content Store NDN Content Firewall NDN router Packet Policy [26]
38 3 NDN 32 NDN NDN Interest Flooding Attacks Content Pollution Attacks Interest Flooding Attacks IP DDoS Interest packet Interest packet Name Name NDN router Name Interest packet Data packet Interest packet NDN router Content Firewall NDN Data packet Interest packet Data Flooding Attacks Content Pollution Attacks Interest packet Data packet Data packet NDN router NDN router FIB FIB Strategy Layer NDN router FIB User Application NDN router Medium Application Supervisor Supervisor Application 3 ( 3.3) NDN router face ( 3.2) Supervisor Application NDN router D per key.sec.super Medium Application User Application D per key.pub.super Alice key.sec.alice key.pub.alice E H key C E key (C) H(C) C name Content Firewall NDN router Content Firewall(3.2.2 )
39 3 NDN : 3.4: C C Alice User Application C D per Alice key.sec.alice E key.sec.alice ((C name ), H(C)) Interest packet D req ( 3.4) D req FIB face C NDN router D req D req Interest Flooding Attacks NDN face D req Supervisor Application Alice D req C Alice key.pub.alice D req C
40 3 NDN : 3.6: Alice C D per Data packet ( 3.4) D req D per Content Supervisor Application D per key.sec.super C H(C) D per Data packet Alice User Application D per key.pub.super D per Content C Name D per Content Content Name Interest packet D cmd FIB Medium Application ( 3.5) Medium Application D cmd D cmd D per D per key.pub.super User Application C Content Firewall Policy(3.2.2 ) Content Store C Data packet Medium Application NDN router FIB face Medium Application
41 3 NDN 35 face D cmd face D cmd D cmd ( 3.6) D cmd face Data packet D fin Interest packet D fin D cmd face ( 3.5, 3.6) Content Firewall Policy C Interest packet FIB Interest packet Medium Application face [26] Alice D fin D cmd D cmd Medium Application Content Firewall Policy C NDN routet Content Firewall C Alice Stakeholder Stakeholder Supervisor Supervisor D cmd Supervisor Application D req D cmd 3.4 Supervisor Application Medium Application 3.3 IP NDN NDN router ISP ASP NDN router Medium Application Supervisor Application NDN router IP NDN router Medium Application Medium Application 3.3 D cmd [37] Secret Sharing Alice C Bob C Alice C k n
42 3 NDN NDN Alice n S j (1 j n) 2. Alice S j (1 j n) Alice key.sec.alice NDN NDN (3.2.1 ) Data packet host ( host ) NDN Medium Application 3. Alice C Alice NDN key.sec.alice C key.sec.alice.c E key.sec.alice.c (C) NDN 4. Alice C key.pub.alice.c SP I key.pub.alice.c NDN 5. C Bob NDN E key.sec.alice.c (C) Aliice SP I key.pub.alice.c 6. Bob SP I key.pub.alice.c S j (1 j n) Interest packet I P S.j ( 3.8) 7. S j Medium Application I P S.j key.pub.alice.c S j P S j Data packet D P S.j ( 3.8) 8. Bob k D P S.j Multiple Secret Sharing Alice key.pub.alice.c k P S j key.pub.alice.c E key.sec.alice.c (C) Medium Application ID ISP (ISP name) ID(random ID) Interest packetss req ( 3.7) ID Medium Application ID Interest packet Medium Application Data packetss res Medium Application Interest packetrs req Interest packet Data packetrs res ( 3.7)
43 3 NDN : 3.8: ID N ISP Medium Application l N = l Medium Application N < l Medium Application k N > l Medium Application ID Medium Application Interest packet NDN D cmd 3.5.2
44 3 NDN Alice key.pub.alice.c 2. Alice P S j 3.5 D cmd D cmd Medium Application Content Store P S j Content Firewall Policy P S j Medium Application k 1 Medium Application key.pub.alice.c E key.sec.alice.c (C) C 3. Alice Alice D cmd Interest packet D cmd Flooding NDN Medium Application D cmd C D cmd PIT D cmd face Data packet D fin C key.sec.medium Interest packet Flooding D cmd Name domain D cmd Flooding NDN D cmd Interest Flooding Attacks D cmd D fin Medium Application PIT face D fin D fin D fin Medium Application D cmd Content Store D fin NDN Name Interest packet Interest Flooding Attacks (3.2.2 ) SS req (random ID) SS res Medium Application (random ID) Interest Flooding Attacks (random ID) Content Firewall SS req Name
45 3 NDN 39 /domain/content management/send shadow/ 3.6 NDN NDN router Multiple Secret Sharing
46 4
47 ISP ASP ASP P2P Multiple Secret Sharing P2P P2P ISP ASP ISP Named Data Networking(NDN) NDN Content Firewall Content Firewall P2P Multiple Secret Sharing 4.2 P2P P2P DHT Kademlia P2P
48 4 42 NDN Content Firewall NDN NDN
49 43
50 44 [1] Cisco Systems, Cisco visual networking index: Forecast and methodology, , ns341/ns525/ ns537/ns705/ns827/white_paper_c pdf [2] Cisco Systems, Hyperconnectivity and the approaching zettabyte era, ns705/ns827/vni_hyperconnectivity_wp.pdf [3] Google, Youtube, [4] (9), [5], [6] S. Androutsellis-Theotokis and D. Spinellis, A survey of peer-to-peer content distribution technologies, ACM Computing Surveys, vol.36, no.4, pp , Dec [7] Bitmedia and ANCL, Sharecast, [8] UG Live, [9] C. Labovitz, D. McPherson, and S. Iekel-Johnson, Internet Observatory 2009 Annual Report, The North American Network Operators, pp.1 32, Labovitz_ObserveReport_N47_Mon.pdf [10] Microsoft, [MS-DRM]: Digital Rights Management License Protocol Specification, EF66AF BB0-A41D-A4F81802D92C/[MS-DRM].pdf [11] V. Networks, Veoh video network, [12] PPLive Inc., Pptv,
51 4 45 [13] P2P,. IN, vol.108 no.458 pp [14] Y. Kawahara, L. Wang, and T. Asami, Resilient Suppressor Mechanism against Illegal Content Redistribution on Peer-to-Peer Video Sharing Networks, Communications (ICC), 2010 IEEE International Conference onieee, pp [15] A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Middleware 2001Springer, pp [16] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communicationsacm, pp [17] P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer information system based on the xor metric, Peer-to-Peer Systems, pp.53 65, [18] A. Shamir, How to share a secret, Communications of the ACM, vol.22, no.11, pp , [19] G. BLAKLEY, Safeguarding cryptographic keys, National Computer ConferenceAFIPS Press., p [20] Overlay Weaver, : vol.47 no.12 pp [21] 1990 [22] Y. Huang, T.Z. Fu, D.-M. Chiu, J.C. Lui, and C. Huang, Challenges, design and analysis of a large-scale p2p-vod system, SIGCOMM Comput. Commun. Rev., vol.38, pp , Aug [23] J. He and E. Dawson, Multistage secret sharing based on one-way function, Electronics Letters, vol.30, no.19, pp , [24] D. Liu, D. Huang, P. Luo, and Y. Dai, New schemes for sharing points on an elliptic curve, Computers & Mathematics with Applications, vol.56, no.6, pp , 2008.
52 4 46 [25] H.S. Lee, A self-pairing map and its applications to cryptography* 1, Applied Mathematics and Computation, vol.151, no.3, pp , [26] V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard, Networking named content, Proceedings of the 5th international conference on Emerging networking experiments and technologies - CoNEXT 09, p.1, ACM Press, New York, New York, USA, [27] L. Zhang, D. Estrin, J. Burke, and V. Jacobson, Named data networking (ndn) project, [28] J. Moy, OSPF Version 2, Technical report, RFC2328, April [29] Y. Rekhter, T. Li, and S. Hares, A Border Gateway Protocol 4(BGP-4), Technical report, RFC4271, Jan [30] Xin Zhao and Yaoqing Liu and Lan Wang and Beichuan Zhang, On the Aggregatability of Router Forwarding Tables, Proc. of the 29th conference on INFO- COM, pp.1 9, INFOCOM 10, March [31] D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Technical report, RFC5280, May [32] P.R. Zimmermann, The Official PGP User s Guide, MIT Press, [33] M. Abadi, On SDSI s Linked Local Name Spaces, Journal of Computer Security, vol.6(1-2), pp.3 21, [34] R. Rivest, B. Lampson, C.M. Ellison, B. Frantz, and S. Bell, SPKI Certificate Theory, Technical report, RFC2693, Sept [35] R.L. Rivest and B. Lampson, Sdsi-a simple distributed security infrastructure, Technical report, MIT Technical Report, [36] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP, Technical report, RFC2560, June [37] P2P Multiple Secret Sharing,. B, vol.94 no.10 pp
53 47 [P1], P2P Multiple Secret Sharing, B Vol.J94-B,No.10, pp , Oct [P2],,,, P2P Multiple Secret Sharing, Vol.110, No.128, MoMuC , pp.57-62, July 2010 [P3] Vol.110, No.449, IN , pp.85-90, March [P4] Vol.111, No.409, IN , pp.17-22, Jan [P5] P2P Multiple Secret Sharing B-7-30, Sept [P6], T. T. Quang,,, B-7-39, Sept [P7] B-7-13, March 2011.
スライド 1
WWW Request Client Data Server Request Data Client WWW Request Data Client Server Request Data Client WWW CPU Request Data Client Server Request Data Client Request Client Data Server Request Data Client
More information23
Master's Thesis / 修 士 論 文 映 像 配 信 の 中 断 から 復 旧 までの 時 間 を 短 縮 するネットワーク 再 構 築 手 法 の 改 良 隅 田, 貴 久 三 重 大 学, 2011. 三 重 大 学 大 学 院 地 域 イノベーション 学 研 究 科 博 士 前 期 課 程 地 域 イノベーション 学 専 攻 http://hdl.handle.net/10076/12400
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More information1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
More informationMicrosoft PowerPoint IEICE-ICN
ICN における Content 名と Naming Scheme に関する 考察 亀山渉朴容震早稲田大学基幹理工学部情報通信学科 2016 年 4 月 20 日電子情報通信学会 ICN 時限研専 1 発表内容 1. 背景と本発表の目的 2. これまでに提案されている Content Naming Scheme 3. Content ID 標準にみる Naming Scheme の考え方 4. ICN
More informationスライド 1
JANOG 14 2004.07.23 NTT kamei.satoshi@lab.ntt.co.jp 1 Peer-to-Peer ISP P2P AS / Copyright 2004 NTT Corporation, All Rights Reserved 2 Peer-to-Peer ISP P2P AS Copyright 2004 NTT Corporation, All Rights
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationpaper.dvi
28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret
More information27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U
YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube
More information/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR
for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web
More information/07/ /10/12 I
Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...
More informationguideline_1_0.dvi
Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10
More information1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2
DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More information9_4.dvi
Vol. 50 No. 9 2298 2311 (Sep. 2009) ID/Locator 1 2, 3 3 ID locator ID/Locator ID ID Transport IP locator Locator Transport ID locator P2P PIAX 10,000 1% A Mechanism of ID/Locator Separation in Overlay
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact
8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More informationPowerPoint プレゼンテーション
岡山情報通信技術研究会 (OICT 会 ) 2014 年 8 月 27 日 ( 水 ) データ指向型ネットワーク 横平徳美 岡山大学大学院自然科学研究科 ( 工学部電気通信系学科 ) 1 講演内容 1. 背景 2. データ指向型ネットワークとは... 3. 具体例 4. 課題 2 1. 背景 3 インターネットはどのように発展してきたか (1) 4 インターネットはどのように発展してきたか (2)
More informationID Z-Ordering 4) P2P P2P 2. Peer-to-Peer(P2P) P2P Gnutella ) BitTorrent 2) P2P (DHT:Distributed Hash Table) Chord 5) CAN(Content Adressable Network) 6
Vol.29-DPS-39 No.3 29/6/8 P2P 2 P2P P2P P2P A configuration method for structured P2P overlay network considering delay variations Tomoya Kitani and Yoshitaka Nakamura 2 P2P networks can achieve high scalability
More information17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki
More information28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationContent-Centric Networking CCN Unmanned Air V
565 0871 1 5 558 8585 3 3 138 E-mail: {t-kitagawa,murata}@ist.osaka-u.ac.jp, ata@info.eng.osaka-cu.ac.jp Content-Centric NetworkingCCN Unmanned Air VehicleUAV CCN UAV CCNUAV Retrieving Information with
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More informationCopyright 2001 by Junichi Sawase
JAIST Reposi https://dspace.j Title 知識コミュニティを活性化するインフォーマルコミュ ニケーションツールの開発 Author(s) 澤瀬, 順一 Citation Issue Date 2001-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/716
More informationDEIM Forum 2017 E Netflix (Video on Demand) IP 4K [1] Video on D
DEIM Forum 2017 E1-1 700-8530 3-1-1 E-mail: inoue-y@mis.cs.okayama-u.ac.jp, gotoh@cs.okayama-u.ac.jp 1. Netflix (Video on Demand) IP 4K [1] Video on Demand ( VoD) () 2. 2. 1 VoD VoD 2. 2 AbemaTV VoD VoD
More informationCisco® ASA シリーズルーター向けDigiCert® 統合ガイド
Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,
More information109 Peer-to-Peer Peer-to-Peer (P2P) [5]. P2P P2P P2P P2P [10] [11], [12] [4] For an efficient contents sharing by a lot of network users, various kind
109 Peer-to-Peer Peer-to-Peer (P2P) [5]. P2P P2P P2P P2P [10] [11], [12] [4] For an efficient contents sharing by a lot of network users, various kinds of content replication strategies in pure Peer-to-Peer
More informationbook.dvi
P2P Web Proxy 1120180 24 3 16 1 3 2 5 2.1 Web........................ 5 2.2 Web Proxy.................................... 10 2.2.1 P2P Web Proxy.............................. 11 3 P2P Web Proxy 13 3.1...................................
More informationuntitled
2011 2 9 Akamai Technologies, Inc., et al., Plaintiff Appellant, v. Limelight Networks, Inc., Defendant-Cross Appellant. 1 ( ) 2 3 CAFC BMC 4 (control or 3 Aro Mfg. Co. v. Convertible Top Replacement Co.,
More informationPublish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S
KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service
More information2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055
1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free
More informationIPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I
Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(Information and Communication Technology) (Google [2] [5] ) 2. Google 2.1 Google Google [2]( 1) Google Web, Google Web Google Chrome
More informationTCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18)
3 -- 4 1 TCP T ransmission Control Protocol 2013 12 TCP TCP TCP TCP TCP TCP TCP TCP c 2013 1/(18) 3 -- 4 -- 1 1--1 TCP 2013 12 TCP Transmission Control Protocol TCP TCP TCP 1981 RFC 793 Request for Comments
More information, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei
, Evaluation of Certificate Verification Method in Mobile Environment Katuyuki UMEZAWA,, Mituhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigeichi HIRASAWA PKI PKI CRL OCSP CVS 3 3 CVS PKI CVS OCSP
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More information3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre
3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination
More information第3 章 電子認証技術に関する国際動向
3 IETF PKI TAM Trust Anchor Management 3. IETF Internet Engineering Task Force PKIX WG 3.1. IETF PKIX WG 1 2006 PKI Public-Key Infrastructure IETF PKIX WG 2007 69 IETF 70 IETF WG PKIX WG 2006 3 2 3.2.
More informationIPSJ SIG Technical Report Vol.2013-OS-127 No.2 Vol.2013-EMB-31 No /12/ SNS(Social Networking Service) SNS Friend News System Friend
1 1 1 1 1 1 SNS(Social Networking Service) SNS Friend News System Friend News System SNS Friend News System 1. [1] 2013 6 Microsoft Facebook SNS(Social Networking Service) [2] Facebook SNS LAN SNS Friend
More informationCSIS (No.324) {kazuya-o, okuda, 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geograp
CSIS (No.324) {kazuya-o, okuda, suguru}@is.naist.jp 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geographically Aggregatable Location-based Multicast Address)
More information21 Key Exchange method for portable terminal with direct input by user
21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More informationMacintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi
3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More informationRFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html
RFID LSI sozo@c.csce.kyushu-u.ac.jp RFID Radio Frequency mm 0.5 5m 2m 1 64k IC http://www.tij.co.jp/jmc/docs/tiris/goods/index.html RF http://www.hitachisemiconduct or.com/sic/jsp/japan/jpn/gain/1 35/next/
More informationVol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A
Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,
More informationIPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [
1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)
More informationuntitled
better RFID 1 /?? PKI PKI ) (GPKI) GtoB GPKI 3300- LGPKI GtoC -> Identrus B2B GPKI Identrus PKI 2 Internet-VPN PKI? HTTPS ( ) HTTPS 3 PKI??????? PDA/ /? RFIDPKI?? 4 Challenge
More informationP2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087
More informationA Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)
More information(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More informationAirMac ネットワーク for Windows
AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac
More informationIT IBM Corporation
2009/9/25 ATC. 1 2009 IBM Corporation 1. 1. 2. 3. IT 2 2009 IBM Corporation 2006 8 9 (?) Google CEO, Eric Schmidt @ Search Engine Strategies Conference (*) emergent () 10 Network ComputerAjax LAMP (Linux
More informationWeb Web Web
P2P Web Proxy The Cooperation P2P Web Proxy for reduction of offer resources 1165054 26 3 20 1 5 2 7 2.1...................................... 7 2.1.1 Web...................... 7 2.1.2 Web.....................
More informationpaper
WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass
More information1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,
More informationQoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 565 871 1 5 E-mail: {j-konisi,wakamiya,murata}@ist.osaka-u.ac.jp QoS P2P P2P P2P P2P (Peer-to-Peer)
More information1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF.
2011 2012 1 31 5110B036-6 1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF....................................
More information4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5
No.5, 185-196 (2004) Conformity to the next-generation currency seen from a Electronic money classification : OSHIMA Kazuchika Nihon University, Graduate School of Social and Cultural Studies Internet
More informationAirMac ネットワーク構成の手引き
AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17
More informationIPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit
2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twitter Ustream 1 Graduate School of Information Science and Technology, Osaka University, Japan 2 Cybermedia Center, Osaka University,
More information( 1 ) [1] OTT (over-thetop) OTT 1:? YouTube Netflix Spotify Facebook Twitter OTT Skype Google Talk WhatsApp OTT OTT OTT OTT (100 ) 5,000 4,000 3,000 2
2013 5 ( 1 ) [1] OTT (over-thetop) OTT 1:? YouTube Netflix Spotify Facebook Twitter OTT Skype Google Talk WhatsApp OTT OTT OTT OTT (100 ) 5,000 4,000 3,000 2,000 1,000 : 2012 PC 0 2009 2010 2011 2012 2013
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 337-87 37 E-mail: {m199,miyoshi}@shibaura-it.ac.jp, olivier.fourmaux@upmc.fr P2P P2P ISP Internet Service
More informationWikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy
1, 2 3 1, 2 Web Fischer Social Creativity 1) Social Creativity CG Network Analysis of an Emergent Massively Collaborative Creation Community Masahiro Hamasaki, 1, 2 Hideaki Takeda 3 and Takuichi Nishimura
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More informationIW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights
1 Internet Week 2001 ( ) kuma@isid.co.jp 2 CodeRed 1 3 (EXCEED ) se cu ri ty? 4? 2 5 Web IP Web MP3 6 3 7 1.5Mbps8Mbps 500 MP3 CM VoD 8 4 ADSL (Asymmetric Digital Subscriber Line) () CATV FWA (Fixed Wireless
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More informationディスプレイと携帯端末間の通信を実現する映像媒介通信技術
Data Transfer Technology to Enable Communication between Displays and Smart Devices 倉木健介 中潟昌平 田中竜太 阿南泰三 あらまし Abstract Recently, the chance to see videos in various places has increased due to the speedup
More informationHTTP
2008 P2P 2009 2 6 5107B024-5 1 5 1.1...................................... 5 1.2...................................... 6 1.3..................................... 7 2 HTTP 8 2.1.............................
More information[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing
1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November
More information1 CCN CCN(Content-Centric-Network) [1] PUR- SUIT [2]DONA(Data-Oriented-Network Architecture) [3] 4WARD [4]PSIRP [5] Energy Efficient and Enhanced-type
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 223 8522 3 14 1 E-mail: miyazaki@yamanaka.ics.keio.ac.jp Content Centric Network(CCN) CCN CCN LRU(Least-Recently-Used)Prob-Cache(Probablistic
More informationB HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int
SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura
More information:
An Analysis of TV Game Market: From the viewpoints of network externalities and whole of services Masaki Matsumura, Hiroyuki Kurimoto, and Toshio Kobayashi It has been understood that a standard would
More information3_39.dvi
Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar
More informationuntitled
The Impact of Digitization on Music Production: From a Perspective of Modularity 51 2 pp. 87-108 2003 12 I 21 3 Information and Communication Technology, ICT 0 1 1 20 1 199820012000 1 MP3 CD 2 3 II CD
More informationIP RTP 2 QoS i
17 IP A study on IP path quality forecasting from the IP path delay measurements 1060339 2006 3 10 IP RTP 2 QoS i Abstract A study on IP path quality forecasting from the IP path delay measurements Kotaro
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More information21 VOD A study of the VOD contents decentralization delivery for unicast VOD 1100314 2010 3 1 VOD VOD Video on Demand VOD, Management Server Management Server Management Server 4 VOD CDN i Abstract A
More informationDEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN
DEIM Forum 2017 H2-2 Android LAN 112-8610 2-1-1 163-8677 1-24-2 E-mail: {ayano,oguchi}@ogl.is.ocha.ac.jp, sane@cc.kogakuin.ac.jp Android 1 Android LAN Ayano KOYANAGI, Saneyasu YAMAGUCHI, and Masato OGUCHI
More informationWeb Social Networking Service Virtual Private Network 84
Promising business utilized five senses information media through the Next Generation Network Toshio ASANO Next Generation Network 2004 11 2010 6,000 3,000 2006 12 2008 83 Web Social Networking Service
More informationTCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2
Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service
More informationIP IPv4-IPv6
IPv6 Mobility IETF 2006 6 9 14:00-15:30 Interop Tokyo 2006 IIJ Nautilus6 IP IPv4-IPv6 L2 L3 Mobile IPv6 HIP L3.5 Shim6(?) L4 SCTP IPv6 Mobile IPv6/NEMO BS IETF RFC3775 - Mobile IPv6 RFC3963 - NEMO Basic
More informationMANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d
DEIM Forum 2013 F1-4 DTN, 565-0871 1-5 567-0047 5-1 184-8795 4-2-1 565-0871 2-1 E-mail: {sawamura.yusuke,nishio}@ist.osaka-u.ac.jp, teranisi@cmc.osaka-u.ac.jp, harumoto@eng.osaka-u.ac.jp DTN (DTN ) DTN
More informationIEEE e
2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN
More information01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六
*1 2 PR ( ) 1. 1 1.1. 2 1 2.2 3. 4. 5. 6. *1 Graduate School for Creative Cities, Osaka City University 1.2. Vol.6 (March, 2006) 3. 01) 02) ( ) 03) 04) 05) 06) 07) 08) 5.2.1. 09) 10),11) 2. 2.1. 2 1 2
More informationMicrosoft Word - toyoshima-deim2011.doc
DEIM Forum 2011 E9-4 252-0882 5322 252-0882 5322 E-mail: t09651yt, sashiori, kiyoki @sfc.keio.ac.jp CBIR A Meaning Recognition System for Sign-Logo by Color-Shape-Based Similarity Computations for Images
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More information1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan
SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:
More informationShonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral
MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**
More informationACS電子ジャーナル利用マニュアル
American Chemical Society ACS Web Edition & Journal Archives American Chemical Society ACS 4 Web Edition 2002 7 1879 Journal Archives ACS 1...2 2 2-1...3 2-2...4 2-3...5 3 3-1 Abstract...6 3-2 Full Text
More informationnakayama15icm01_l7filter.pptx
Layer-7 SDN SDN NFV 50 % 3 MVNO 1 2 ICM @ 2015/01/16 2 1 1 2 2 1 2 2 ICM @ 2015/01/16 3 2 Service Dependent Management (SDM) SDM Simple Management of Access-Restriction Translator Gateway (SMART-GW) ICM
More informationAll Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1
asaba@iij.ad.jp All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 2 user IX IX IX All Rights Reserved. Copyright(c)1997
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
More information