P2P Multiple Secret Sharing P2P IP ISP Named Data Networking(NDN) NDN P2P Multiple Secret Sharing i

Size: px
Start display at page:

Download "P2P Multiple Secret Sharing P2P IP ISP Named Data Networking(NDN) NDN P2P Multiple Secret Sharing i"

Transcription

1

2 P2P Multiple Secret Sharing P2P IP ISP Named Data Networking(NDN) NDN P2P Multiple Secret Sharing i

3 P2P Digital Right Management(DRM) DRM DRM P2P P2P Distributed Hash Table(DHT) P2P CGM :(k, n) :Multiple Secret Sharing Multiple Secret Sharing ii

4 3 NDN Named Data Networking NDN NDN Content Firewall D cmd iii

5 % % % Interest packet Data packet NDN router iv

6 v

7 1

8 P2P P2P ISP ASP P2P Content Delivery Network(CDN) CDN CDN CDN Google Google Youtube Google ISP ASP 1.2 ASP

9 1 3 P2P P2P IP Multiple Secret Sharing P2P ISP Named Data Networking(NDN) NDN P2P Content Firewall P2P Multiple Secret Sharing P2P 3 NDN 2 Secret Sharing Multiple Secret Sharing 3 NDN NDN Content Firewall P2P P2P Multiple Secret Sharing

10 2 P2P

11 2 P2P %P2P [1] [2] Youtube [3] [4] CGM(Consumer Generated Media) ISP 4 1 [5] CGM iphone 3.9G LTE P2P P2P [6] Sharecast [7] UG Live [8] P2P P2P CGM P2P Contents Delivery Network(CDN) [9] P2P P2P P2P CGM CGM P2P Einy OnDemand Skeedcast Windows Media Digital Rights Management(WMDRM) [10] CGM DRM CGM

12 2 P2P 6 Veoh P2P CGM P2P PPLive DRM [11] [12] P2P DRM CGM [13, 14] P2P CGM Multiple Secret Sharing 2.2 DRM 2.3 P2P 2.4 P2P Digital Right Management(DRM) DRM DRM DRM DRM WMDRM Fairplay DRM DRM

13 2 P2P 7 (3) DTCP DRM DRM DRM CGM DRM DRM CGM 2.3 P2P P2P P2P ( ) Hybrid P2P Super node P2P Pure P2P 3 Hybrid P2P Super node P2P Node Node Super node CGM Super node Pure P2P Pure P2P

14 2 P2P Distributed Hash Table(DHT) Pure P2P Distributed Hash Table(DHT) DHT Pastry [15] Chord [16] Kademlia [17] Pastry 10 P2P 4 DHT DHT ( ) DHT 2.4 P2P CGM P2P CGM 2.3 P2P CGM CGM 1 ID 2 3 ID DHT P2P (ID) ID IP DHT Pure P2P ID P2P ID

15 2 P2P 9 ID ID DHT ID ID (DRM) CGM (CGM ) CGM P2P CGM P2P CGM P2P 3. CGM P2P P2P P2P P2P CGM P2P (PKI)

16 2 P2P 10 CGM 2.5 :(k, n) 2.4 Shamir [18] Blakley [19] (k, n) (Secret Sharing Scheme) [13, 14] (k, n) n k : 1. P2P P2P DHT

17 2 P2P (k, n) n P2P 3. ID P2P ID DHT 5. P2P k P2P P2P k 1 P2P DHT 2.5.2

18 2 P2P : 2.1: % 10% - 60% (10% ) n 100 DHT 60 Pastry() ( 2.1) Overlay Weaver [20] P2P 10% P2P M/M/S(0) [21] PPLive [22] 21 ( 2.2) k 22

19 2 P2P 13 n k P2P n k k n P2P n P2P 2.6 :Multiple Secret Sharing 2.5 P2P n P2P Multiple Secret Sharing 1 P2P DHT ID P2P Multiple Secret Sharing Multiple Secret Sharing Multiple Secret Sharing Multiple Secret Sharing Scheme He Dawson [23] (k, n) Multiple Secret Sharing 1 Multiple Secret Sharing Duo Liu Multiple Secret Sharing [24] (k, n) Duo Liu Multiple Secret Sharing Duo Liu Bilinear self-pairing

20 2 P2P 14 q GF (q) E : y 2 = x 3 + ax + b ( a, b GF (q), 4a b 2 0 ) [24] P = (x 1, y 1 ) E P = (x 1, y 1 ) E Q = (x 2, y 2 ) E Q P P + Q = (x 3, y 3 ) x 3 = λ 2 x 1 x 2 y 3 = λ(x 1 x 3 ) y 1 (y 2 y 1 ) (x λ = 2 x 1 ), P Q; (3x 2 1 +a) (2y 1 ), P = Q. Bilinear self-pairing Lee Bilinear self-pairing [25] K 0 p E = E(K) K K K P E lp = 0 l E P l- lp = 0 P E(K) E(K)[l] E(K) l- (l 0) E(K)[l] E[l] l K char(k) 0 p (p l ) E[l] E[l] = Z l Z l G H E[l] E[l] G H E[l] P = a 1 G+b 1 H Q = a 2 G+b 2 H a 1, a 2, b 1, b 2 [0, l 1] α, β [0, l 1] E[l] E[l] E[l] L α,β (P, Q) = (a 1 b 2 a 2 b 1 )(αg + βh) α, β = D n {U 1, U 2,..., U n }

21 2 P2P : 1. D GF (q) E(GF (q)) q = p r p GF (q) E(GF (q)) 2. D l l t E[l] E(GF (q t )) 3. D {G, H} E[l] L α,β α, β [1, l 1] 4. D {E, q, l, t, αg + βh} P2P 5. D A : k 1 A = k (n 1) (n 1) 2 (n 1) k 1 n k 6. D 2k {ã j, b j } 1 j k ã j, b j [0, l 1] (1 j k)

22 2 P2P D (a 1, a 2,, a n ) T = A (ã 1, ã 2,, ã k ) T (b 1, b 2,, b n ) T = A ( b 1, b 2,, b k ) T 8. D 1 j n U j {a j, b j } : m {M 1, M 2,, M m } {M 1, M 2,, M m } i 1 i m

23 2 P2P D P k = ã k G + b k H 2. D c i, d i [0, l 1] Q i = c i G + d i H 3. D R i = L α,β (Q i, P k )+M i {c i, d i, R i } P2P {U u1, U u2,, U uk } i 1 i m j 1 j k 1. U uj D {a j, b j } 2. U uj D {E, q, l, t, αg + βh} M i {c i, d i, R i } 3. U uj Q i,j = L α,β (Q i, P uj ) P uj Q i P uj = a uj G + b uj H Q i = c i G + d i H 4. U uj Q i,j {M i } 1 i m i 1 i m j 1 i k 1. U uj Q i,j 2. k T i = y j Q i,j j=1 y j = k (u j u J ) J=1,J j 1 3. D {c i, d i, R i } M i = R i T i

24 2 P2P : 1. P2P 2. P2P ( 2.5) 3. k 1 P2P k 1 k 1

25 2 P2P (2.6.2 ) O(1) (2.6.3) 4 1 O(1) 6 1 O(1) 1 k 2 k O(k 2 ) Windows media DRM(WMDRM) ID 2KB [10] P2P 2.5 n P2P n DHT DHT 1 n DHT 1 DHT

26 2 P2P m O(mn) P2P n () P2P 1 DHT 1 m O((n+1)+m) = O(n+m) m CGM m DHT Kademlia Python2.5.2 M/M/S(0) [21] 20% 80% Kademlia key value Kademlia Network 2.2

27 2 P2P : Parameter k-bucket size 20 α 3 republish interval 60 min. expire interval 120 min. Number of nodes 1000 Number of malicious nodes 100 Number of contents 10 Number of shadows per content 100 Average online rate 20% 40% 60% Percentage of heavy users 20% Percentage of popular contents 20% Average online period 60 min. Usage period of each accessed content 10 min. Timeout of relaying delete requests 30 min. Number of contents chached on a node 4

28 2 P2P 22 k-bucket 10 Kademlia Network 2.2 Kademlia Network k-bucket Kademlia Network α Kademlia Petar [17] key-value expire expire ( ) 20% % republish () expire expire

29 2 P2P 23 Kademlia Publish lookup k-bucket expire P2P (30 ) republish 60 republish expire republish expire 3 lookup expire expire republish 90 expire expire : 20% 20% 40% 60%P2P

30 2 P2P : 40% 2.8: 60%

31 2 P2P lookup k-bucket %- 20% republish % republish Kademlia republish k % 20% republish k 40 40% republish 9 20% k 65 60% republish

32 2 P2P 26 k k-bucket lookup 2.9 DRM P2P CGM P2P (k, n) P2P (k, n) Multiple Secret Sharing (k, n) 2 P2P

33 3 NDN

34 3 NDN Named Data Networking(NDN) NDN P2P TCP/IP P2P CDN Content Pollution DDoS Location independent NDN Supervisor Application NDN 3.2 Named Data Networking NDN NDN NDN router Interest packet Data packet( 3.1 [26]) Packet NDN router LAN 3G/4G (face) ( 3.2)NDN Jacobson [26,27] NDN NDN router 3.3 User Application Interest packet NDN router Interest packet URL /u-tokyo.ac.jp/videos/hoge.mp4 Data packet VoIP

35 3 NDN : Interest packet Data packet Figure 1: Packets In the NDN Architecture. Interest packet /u-tokyo.ac.jp/voip/alice to bob/ v / s2 URL NDN achieved by conventions agreed between data producers and NDN router Interest packet versioning and segmentation. Name conventions are specific NDN router Interest packet Pending Interest Table(PIT) Forwarding Names do not Information needbase(fib) to be globally unique, 3.2.1althoughretrie uniqueness. /u-tokyo.ac.jp/videos/hoge.mp4 Names intended for Name local /u-tokyo.ac.jp/ communication may b -> faces 1,2 Name FIB face Interest only local routing (or local broadcast) to find corresponding d packet /u-tokyo.ac.jp/video/ -> faces 1 FIB To retrieve NDN router dynamically generated data, consumers must b FIB Interest packet Name for a desired piece of data without having previously seen Data packet algorithm Intrest allows producer packet FIB and consumer IP to arrive at the s and/or (2) consumers can retrieve datainterest based packet on partial nam PIT /parc/videos/widgeta.mpg and get back a data packet n FIB consumer OSPF [28] can BGP then [29] specify later segments and request them IP forwarding table [30] FIB by the first data packet and the naming convention agreed upo The naming system is the most important piece in the NDN particular, how to define and allocate top level names remain need be answered immediately, however; the opaqueness o Fi

36 3 NDN : NDN router NDN router Interest packet Data packet Data packet Data packet Data packet FIB NDN router Data packet NDN router Interest packet Data packet PIT Interest packet Data packet PIT Content Store Data packet Data packet Interest packet Data packet Interest packet Data packet Interest packet Data packet

37 3 NDN Interest packet NDN router Data packet Interest packet FIB Intrest packet (3.2.1 ) Data packet Interest packet NDN NDN 2.1 NDN Data packet NDN router Content Store Data packet Data packet Data packet VoIP IM NDN Data packet PKI [31] PGP Web of Trust [32] SDSI/SPKI [33 35] CRL OCSP [36] NDN Data packet Content Store IP NDN P2P NDN router Content Store NDN Content Firewall NDN router Packet Policy [26]

38 3 NDN 32 NDN NDN Interest Flooding Attacks Content Pollution Attacks Interest Flooding Attacks IP DDoS Interest packet Interest packet Name Name NDN router Name Interest packet Data packet Interest packet NDN router Content Firewall NDN Data packet Interest packet Data Flooding Attacks Content Pollution Attacks Interest packet Data packet Data packet NDN router NDN router FIB FIB Strategy Layer NDN router FIB User Application NDN router Medium Application Supervisor Supervisor Application 3 ( 3.3) NDN router face ( 3.2) Supervisor Application NDN router D per key.sec.super Medium Application User Application D per key.pub.super Alice key.sec.alice key.pub.alice E H key C E key (C) H(C) C name Content Firewall NDN router Content Firewall(3.2.2 )

39 3 NDN : 3.4: C C Alice User Application C D per Alice key.sec.alice E key.sec.alice ((C name ), H(C)) Interest packet D req ( 3.4) D req FIB face C NDN router D req D req Interest Flooding Attacks NDN face D req Supervisor Application Alice D req C Alice key.pub.alice D req C

40 3 NDN : 3.6: Alice C D per Data packet ( 3.4) D req D per Content Supervisor Application D per key.sec.super C H(C) D per Data packet Alice User Application D per key.pub.super D per Content C Name D per Content Content Name Interest packet D cmd FIB Medium Application ( 3.5) Medium Application D cmd D cmd D per D per key.pub.super User Application C Content Firewall Policy(3.2.2 ) Content Store C Data packet Medium Application NDN router FIB face Medium Application

41 3 NDN 35 face D cmd face D cmd D cmd ( 3.6) D cmd face Data packet D fin Interest packet D fin D cmd face ( 3.5, 3.6) Content Firewall Policy C Interest packet FIB Interest packet Medium Application face [26] Alice D fin D cmd D cmd Medium Application Content Firewall Policy C NDN routet Content Firewall C Alice Stakeholder Stakeholder Supervisor Supervisor D cmd Supervisor Application D req D cmd 3.4 Supervisor Application Medium Application 3.3 IP NDN NDN router ISP ASP NDN router Medium Application Supervisor Application NDN router IP NDN router Medium Application Medium Application 3.3 D cmd [37] Secret Sharing Alice C Bob C Alice C k n

42 3 NDN NDN Alice n S j (1 j n) 2. Alice S j (1 j n) Alice key.sec.alice NDN NDN (3.2.1 ) Data packet host ( host ) NDN Medium Application 3. Alice C Alice NDN key.sec.alice C key.sec.alice.c E key.sec.alice.c (C) NDN 4. Alice C key.pub.alice.c SP I key.pub.alice.c NDN 5. C Bob NDN E key.sec.alice.c (C) Aliice SP I key.pub.alice.c 6. Bob SP I key.pub.alice.c S j (1 j n) Interest packet I P S.j ( 3.8) 7. S j Medium Application I P S.j key.pub.alice.c S j P S j Data packet D P S.j ( 3.8) 8. Bob k D P S.j Multiple Secret Sharing Alice key.pub.alice.c k P S j key.pub.alice.c E key.sec.alice.c (C) Medium Application ID ISP (ISP name) ID(random ID) Interest packetss req ( 3.7) ID Medium Application ID Interest packet Medium Application Data packetss res Medium Application Interest packetrs req Interest packet Data packetrs res ( 3.7)

43 3 NDN : 3.8: ID N ISP Medium Application l N = l Medium Application N < l Medium Application k N > l Medium Application ID Medium Application Interest packet NDN D cmd 3.5.2

44 3 NDN Alice key.pub.alice.c 2. Alice P S j 3.5 D cmd D cmd Medium Application Content Store P S j Content Firewall Policy P S j Medium Application k 1 Medium Application key.pub.alice.c E key.sec.alice.c (C) C 3. Alice Alice D cmd Interest packet D cmd Flooding NDN Medium Application D cmd C D cmd PIT D cmd face Data packet D fin C key.sec.medium Interest packet Flooding D cmd Name domain D cmd Flooding NDN D cmd Interest Flooding Attacks D cmd D fin Medium Application PIT face D fin D fin D fin Medium Application D cmd Content Store D fin NDN Name Interest packet Interest Flooding Attacks (3.2.2 ) SS req (random ID) SS res Medium Application (random ID) Interest Flooding Attacks (random ID) Content Firewall SS req Name

45 3 NDN 39 /domain/content management/send shadow/ 3.6 NDN NDN router Multiple Secret Sharing

46 4

47 ISP ASP ASP P2P Multiple Secret Sharing P2P P2P ISP ASP ISP Named Data Networking(NDN) NDN Content Firewall Content Firewall P2P Multiple Secret Sharing 4.2 P2P P2P DHT Kademlia P2P

48 4 42 NDN Content Firewall NDN NDN

49 43

50 44 [1] Cisco Systems, Cisco visual networking index: Forecast and methodology, , ns341/ns525/ ns537/ns705/ns827/white_paper_c pdf [2] Cisco Systems, Hyperconnectivity and the approaching zettabyte era, ns705/ns827/vni_hyperconnectivity_wp.pdf [3] Google, Youtube, [4] (9), [5], [6] S. Androutsellis-Theotokis and D. Spinellis, A survey of peer-to-peer content distribution technologies, ACM Computing Surveys, vol.36, no.4, pp , Dec [7] Bitmedia and ANCL, Sharecast, [8] UG Live, [9] C. Labovitz, D. McPherson, and S. Iekel-Johnson, Internet Observatory 2009 Annual Report, The North American Network Operators, pp.1 32, Labovitz_ObserveReport_N47_Mon.pdf [10] Microsoft, [MS-DRM]: Digital Rights Management License Protocol Specification, EF66AF BB0-A41D-A4F81802D92C/[MS-DRM].pdf [11] V. Networks, Veoh video network, [12] PPLive Inc., Pptv,

51 4 45 [13] P2P,. IN, vol.108 no.458 pp [14] Y. Kawahara, L. Wang, and T. Asami, Resilient Suppressor Mechanism against Illegal Content Redistribution on Peer-to-Peer Video Sharing Networks, Communications (ICC), 2010 IEEE International Conference onieee, pp [15] A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems, Middleware 2001Springer, pp [16] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for internet applications, Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communicationsacm, pp [17] P. Maymounkov and D. Mazieres, Kademlia: A peer-to-peer information system based on the xor metric, Peer-to-Peer Systems, pp.53 65, [18] A. Shamir, How to share a secret, Communications of the ACM, vol.22, no.11, pp , [19] G. BLAKLEY, Safeguarding cryptographic keys, National Computer ConferenceAFIPS Press., p [20] Overlay Weaver, : vol.47 no.12 pp [21] 1990 [22] Y. Huang, T.Z. Fu, D.-M. Chiu, J.C. Lui, and C. Huang, Challenges, design and analysis of a large-scale p2p-vod system, SIGCOMM Comput. Commun. Rev., vol.38, pp , Aug [23] J. He and E. Dawson, Multistage secret sharing based on one-way function, Electronics Letters, vol.30, no.19, pp , [24] D. Liu, D. Huang, P. Luo, and Y. Dai, New schemes for sharing points on an elliptic curve, Computers & Mathematics with Applications, vol.56, no.6, pp , 2008.

52 4 46 [25] H.S. Lee, A self-pairing map and its applications to cryptography* 1, Applied Mathematics and Computation, vol.151, no.3, pp , [26] V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard, Networking named content, Proceedings of the 5th international conference on Emerging networking experiments and technologies - CoNEXT 09, p.1, ACM Press, New York, New York, USA, [27] L. Zhang, D. Estrin, J. Burke, and V. Jacobson, Named data networking (ndn) project, [28] J. Moy, OSPF Version 2, Technical report, RFC2328, April [29] Y. Rekhter, T. Li, and S. Hares, A Border Gateway Protocol 4(BGP-4), Technical report, RFC4271, Jan [30] Xin Zhao and Yaoqing Liu and Lan Wang and Beichuan Zhang, On the Aggregatability of Router Forwarding Tables, Proc. of the 29th conference on INFO- COM, pp.1 9, INFOCOM 10, March [31] D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, Internet X. 509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Technical report, RFC5280, May [32] P.R. Zimmermann, The Official PGP User s Guide, MIT Press, [33] M. Abadi, On SDSI s Linked Local Name Spaces, Journal of Computer Security, vol.6(1-2), pp.3 21, [34] R. Rivest, B. Lampson, C.M. Ellison, B. Frantz, and S. Bell, SPKI Certificate Theory, Technical report, RFC2693, Sept [35] R.L. Rivest and B. Lampson, Sdsi-a simple distributed security infrastructure, Technical report, MIT Technical Report, [36] M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP, Technical report, RFC2560, June [37] P2P Multiple Secret Sharing,. B, vol.94 no.10 pp

53 47 [P1], P2P Multiple Secret Sharing, B Vol.J94-B,No.10, pp , Oct [P2],,,, P2P Multiple Secret Sharing, Vol.110, No.128, MoMuC , pp.57-62, July 2010 [P3] Vol.110, No.449, IN , pp.85-90, March [P4] Vol.111, No.409, IN , pp.17-22, Jan [P5] P2P Multiple Secret Sharing B-7-30, Sept [P6], T. T. Quang,,, B-7-39, Sept [P7] B-7-13, March 2011.

スライド 1

スライド 1 WWW Request Client Data Server Request Data Client WWW Request Data Client Server Request Data Client WWW CPU Request Data Client Server Request Data Client Request Client Data Server Request Data Client

More information

23

23 Master's Thesis / 修 士 論 文 映 像 配 信 の 中 断 から 復 旧 までの 時 間 を 短 縮 するネットワーク 再 構 築 手 法 の 改 良 隅 田, 貴 久 三 重 大 学, 2011. 三 重 大 学 大 学 院 地 域 イノベーション 学 研 究 科 博 士 前 期 課 程 地 域 イノベーション 学 専 攻 http://hdl.handle.net/10076/12400

More information

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i

P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i 26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information

More information

Run-Based Trieから構成される 決定木の枝刈り法

Run-Based Trieから構成される  決定木の枝刈り法 Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

Microsoft PowerPoint IEICE-ICN

Microsoft PowerPoint IEICE-ICN ICN における Content 名と Naming Scheme に関する 考察 亀山渉朴容震早稲田大学基幹理工学部情報通信学科 2016 年 4 月 20 日電子情報通信学会 ICN 時限研専 1 発表内容 1. 背景と本発表の目的 2. これまでに提案されている Content Naming Scheme 3. Content ID 標準にみる Naming Scheme の考え方 4. ICN

More information

スライド 1

スライド 1 JANOG 14 2004.07.23 NTT kamei.satoshi@lab.ntt.co.jp 1 Peer-to-Peer ISP P2P AS / Copyright 2004 NTT Corporation, All Rights Reserved 2 Peer-to-Peer ISP P2P AS Copyright 2004 NTT Corporation, All Rights

More information

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

paper.dvi

paper.dvi 28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret

More information

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U

27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM U YouTube 2016 2 16 27 YouTube YouTube UGC User Generated Content CDN Content Delivery Networks LRU Least Recently Used UGC YouTube CGM Consumer Generated Media CGM CGM UGC UGC YouTube k-means YouTube YouTube

More information

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web

More information

/07/ /10/12 I

/07/ /10/12 I Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...

More information

guideline_1_0.dvi

guideline_1_0.dvi Version 1.0 ( 22 5 ) cflkanta Matsuura Laboratory 2010, all rights reserved. I 3 1 3 2 3 3 4 II 8 4 8 5 9 5.1......................... 9 5.2......................... 10 5.3......................... 10

More information

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2

1 Web DTN DTN 2. 2 DTN DTN Epidemic [5] Spray and Wait [6] DTN Android Twitter [7] 2 2 DTN 10km 50m % %Epidemic 99% 13.4% 10km DTN [8] 2 DEIM Forum 2014 E7-1 Web DTN 112 8610 2-1-1 UCLA Computer Science Department 3803 Boelter Hall, Los Angeles, CA 90095-1596, USA E-mail: yuka@ogl.is.ocha.ac.jp, mineo@cs.ucla.edu, oguchi@computer.org Web

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

9_4.dvi

9_4.dvi Vol. 50 No. 9 2298 2311 (Sep. 2009) ID/Locator 1 2, 3 3 ID locator ID/Locator ID ID Transport IP locator Locator Transport ID locator P2P PIAX 10,000 1% A Mechanism of ID/Locator Separation in Overlay

More information

DTN DTN DTN DTN i

DTN DTN DTN DTN i 28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee

More information

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact

8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact 8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

PowerPoint プレゼンテーション

PowerPoint プレゼンテーション 岡山情報通信技術研究会 (OICT 会 ) 2014 年 8 月 27 日 ( 水 ) データ指向型ネットワーク 横平徳美 岡山大学大学院自然科学研究科 ( 工学部電気通信系学科 ) 1 講演内容 1. 背景 2. データ指向型ネットワークとは... 3. 具体例 4. 課題 2 1. 背景 3 インターネットはどのように発展してきたか (1) 4 インターネットはどのように発展してきたか (2)

More information

ID Z-Ordering 4) P2P P2P 2. Peer-to-Peer(P2P) P2P Gnutella ) BitTorrent 2) P2P (DHT:Distributed Hash Table) Chord 5) CAN(Content Adressable Network) 6

ID Z-Ordering 4) P2P P2P 2. Peer-to-Peer(P2P) P2P Gnutella ) BitTorrent 2) P2P (DHT:Distributed Hash Table) Chord 5) CAN(Content Adressable Network) 6 Vol.29-DPS-39 No.3 29/6/8 P2P 2 P2P P2P P2P A configuration method for structured P2P overlay network considering delay variations Tomoya Kitani and Yoshitaka Nakamura 2 P2P networks can achieve high scalability

More information

17 Multiple video streams control for the synchronous delivery and playback 1085404 2006 3 10 Web IP 1 1 1 3,,, i Abstract Multiple video streams control for the synchronous delivery and playback Yoshiyuki

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

Content-Centric Networking CCN Unmanned Air V

Content-Centric Networking CCN Unmanned Air V 565 0871 1 5 558 8585 3 3 138 E-mail: {t-kitagawa,murata}@ist.osaka-u.ac.jp, ata@info.eng.osaka-cu.ac.jp Content-Centric NetworkingCCN Unmanned Air VehicleUAV CCN UAV CCNUAV Retrieving Information with

More information

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of

More information

Copyright 2001 by Junichi Sawase

Copyright 2001 by Junichi Sawase JAIST Reposi https://dspace.j Title 知識コミュニティを活性化するインフォーマルコミュ ニケーションツールの開発 Author(s) 澤瀬, 順一 Citation Issue Date 2001-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/716

More information

DEIM Forum 2017 E Netflix (Video on Demand) IP 4K [1] Video on D

DEIM Forum 2017 E Netflix (Video on Demand) IP 4K [1] Video on D DEIM Forum 2017 E1-1 700-8530 3-1-1 E-mail: inoue-y@mis.cs.okayama-u.ac.jp, gotoh@cs.okayama-u.ac.jp 1. Netflix (Video on Demand) IP 4K [1] Video on Demand ( VoD) () 2. 2. 1 VoD VoD 2. 2 AbemaTV VoD VoD

More information

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,

More information

109 Peer-to-Peer Peer-to-Peer (P2P) [5]. P2P P2P P2P P2P [10] [11], [12] [4] For an efficient contents sharing by a lot of network users, various kind

109 Peer-to-Peer Peer-to-Peer (P2P) [5]. P2P P2P P2P P2P [10] [11], [12] [4] For an efficient contents sharing by a lot of network users, various kind 109 Peer-to-Peer Peer-to-Peer (P2P) [5]. P2P P2P P2P P2P [10] [11], [12] [4] For an efficient contents sharing by a lot of network users, various kinds of content replication strategies in pure Peer-to-Peer

More information

book.dvi

book.dvi P2P Web Proxy 1120180 24 3 16 1 3 2 5 2.1 Web........................ 5 2.2 Web Proxy.................................... 10 2.2.1 P2P Web Proxy.............................. 11 3 P2P Web Proxy 13 3.1...................................

More information

untitled

untitled 2011 2 9 Akamai Technologies, Inc., et al., Plaintiff Appellant, v. Limelight Networks, Inc., Defendant-Cross Appellant. 1 ( ) 2 3 CAFC BMC 4 (control or 3 Aro Mfg. Co. v. Convertible Top Replacement Co.,

More information

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S

Publish/Subscribe KiZUNA P2P 2 Publish/Subscribe KiZUNA 2. KiZUNA 1 Skip Graph BF Skip Graph BF Skip Graph Skip Graph Skip Graph DDLL 2.1 Skip Graph S KiZUNA: P2P 1,a) 1 1 1 P2P KiZUNA KiZUNA Pure P2P P2P 1 Skip Graph ALM(Application Level Multicast) Pub/Sub, P2P Skip Graph, Bloom Filter KiZUNA: An Implementation of Distributed Microblogging Service

More information

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055 1 1 1 2 DCRA 1. 1.1 1) 1 Tactile Interface with Air Jets for Floating Images Aya Higuchi, 1 Nomin, 1 Sandor Markon 1 and Satoshi Maekawa 2 The new optical device DCRA can display floating images in free

More information

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I

IPSJ SIG Technical Report Vol.2013-CE-122 No.16 Vol.2013-CLE-11 No /12/14 Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(I Android 1,a) 1 1 GPS LAN 2 LAN Android,,, Android, HTML5 LAN 1. ICT(Information and Communication Technology) (Google [2] [5] ) 2. Google 2.1 Google Google [2]( 1) Google Web, Google Web Google Chrome

More information

TCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18)

TCP T ransmission Control Protocol TCP TCP TCP TCP TCP TCP TCP TCP c /(18) 3 -- 4 1 TCP T ransmission Control Protocol 2013 12 TCP TCP TCP TCP TCP TCP TCP TCP c 2013 1/(18) 3 -- 4 -- 1 1--1 TCP 2013 12 TCP Transmission Control Protocol TCP TCP TCP 1981 RFC 793 Request for Comments

More information

, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei

, Evaluation of Certificate Verification Methods in Mobile Environment Katsuyuki UMEZAWA,, Mitsuhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigei , Evaluation of Certificate Verification Method in Mobile Environment Katuyuki UMEZAWA,, Mituhiro OIKAWA, Seiichi SUSAKI, Satoru TEZUKA, and Shigeichi HIRASAWA PKI PKI CRL OCSP CVS 3 3 CVS PKI CVS OCSP

More information

Web Web Web Web Web, i

Web Web Web Web Web, i 22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity

More information

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre 3 RIR RIR APNIC 1. 2. MyAPNIC RIPE NCC 1. 2. LIR Portal ARIN 3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination

More information

第3 章 電子認証技術に関する国際動向

第3 章 電子認証技術に関する国際動向 3 IETF PKI TAM Trust Anchor Management 3. IETF Internet Engineering Task Force PKIX WG 3.1. IETF PKIX WG 1 2006 PKI Public-Key Infrastructure IETF PKIX WG 2007 69 IETF 70 IETF WG PKIX WG 2006 3 2 3.2.

More information

IPSJ SIG Technical Report Vol.2013-OS-127 No.2 Vol.2013-EMB-31 No /12/ SNS(Social Networking Service) SNS Friend News System Friend

IPSJ SIG Technical Report Vol.2013-OS-127 No.2 Vol.2013-EMB-31 No /12/ SNS(Social Networking Service) SNS Friend News System Friend 1 1 1 1 1 1 SNS(Social Networking Service) SNS Friend News System Friend News System SNS Friend News System 1. [1] 2013 6 Microsoft Facebook SNS(Social Networking Service) [2] Facebook SNS LAN SNS Friend

More information

CSIS (No.324) {kazuya-o, okuda, 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geograp

CSIS (No.324) {kazuya-o, okuda, 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geograp CSIS (No.324) {kazuya-o, okuda, suguru}@is.naist.jp 2012 IP (LBM) IPv6 GALMA LBM GALMA GALMA 1 (LBM:Location Based Multicast) LBM IP IP GALMA (Geographically Aggregatable Location-based Multicast Address)

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

WMN Wi-Fi MBCR i

WMN Wi-Fi MBCR i 27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI

More information

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe

Vol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2

More information

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi

Macintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi 3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.

More information

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info

IPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3

More information

RFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html

RFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html RFID LSI sozo@c.csce.kyushu-u.ac.jp RFID Radio Frequency mm 0.5 5m 2m 1 64k IC http://www.tij.co.jp/jmc/docs/tiris/goods/index.html RF http://www.hitachisemiconduct or.com/sic/jsp/japan/jpn/gain/1 35/next/

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [

IPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [ 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)

More information

untitled

untitled better RFID 1 /?? PKI PKI ) (GPKI) GtoB GPKI 3300- LGPKI GtoC -> Identrus B2B GPKI Identrus PKI 2 Internet-VPN PKI? HTTPS ( ) HTTPS 3 PKI??????? PDA/ /? RFIDPKI?? 4 Challenge

More information

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i

P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i 27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087

More information

A Study on Traffic Characteristics in Multi-hop Wireless Networks 2010 3 Yoichi Yamasaki ( ) 21 Local Area Network (LAN) LAN LAN LAN (AP, Access Point) LAN AP LAN AP AP AP (MWN, Multi-hop Wireless Network)

More information

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

AirMac ネットワーク for Windows

AirMac ネットワーク for Windows AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac

More information

IT IBM Corporation

IT IBM Corporation 2009/9/25 ATC. 1 2009 IBM Corporation 1. 1. 2. 3. IT 2 2009 IBM Corporation 2006 8 9 (?) Google CEO, Eric Schmidt @ Search Engine Strategies Conference (*) emergent () 10 Network ComputerAjax LAMP (Linux

More information

Web Web Web

Web Web Web P2P Web Proxy The Cooperation P2P Web Proxy for reduction of offer resources 1165054 26 3 20 1 5 2 7 2.1...................................... 7 2.1.1 Web...................... 7 2.1.2 Web.....................

More information

paper

paper WISS2013 EpisoPass:. / EpisoPass EpisoPass / 1 [21] [8] Florêncio 2007 25 6.5 3 4.28% [5] 2011 19.4 3.1 [23] [1][3][12] [18] Copyright is held by the author(s). Toshiyuki Masui, [25] [2][19] EpisoPass

More information

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2

1. HNS [1] HNS HNS HNS [2] HNS [3] [4] [5] HNS 16ch SNR [6] 1 16ch 1 3 SNR [4] [5] 2. 2 HNS API HNS CS27-HNS [1] (SOA) [7] API Web 2 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 657 8531 1 1 E-mail: {soda,matsubara}@ws.cs.kobe-u.ac.jp, {masa-n,shinsuke,shin,yosimoto}@cs.kobe-u.ac.jp,

More information

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn

QoS [3], [4] [5], [6] [3] i3 (Internet Indirection Infrastructure) i3 i3 packet trigger i3 i3 trigger packet trigger QoS [7] P2P P2P (Peer-to-Peer) Gn THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 565 871 1 5 E-mail: {j-konisi,wakamiya,murata}@ist.osaka-u.ac.jp QoS P2P P2P P2P P2P (Peer-to-Peer)

More information

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF.

1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF. 2011 2012 1 31 5110B036-6 1 5 1.1..................................... 5 1.2..................................... 5 1.3.................................... 6 2 OSPF 7 2.1 OSPF....................................

More information

4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5

4 2000 3500 5 (2) (1) 4 24 NTT Super Cash1999-2001 2000.10-2001.3 <http://www.s-cash.gr.jp/whats_news/1016/r1_3.html>(31 1 May.2001) 5 1997 12 1999 5 No.5, 185-196 (2004) Conformity to the next-generation currency seen from a Electronic money classification : OSHIMA Kazuchika Nihon University, Graduate School of Social and Cultural Studies Internet

More information

AirMac ネットワーク構成の手引き

AirMac ネットワーク構成の手引き AirMac 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac 8 AirMac Express 8 AirMac 9 AirMac 10 AirTunes 10 AirMac Extreme AirMac Express 10 2 13 15 Mac OS X IP 16 Mac OS X AirMac 3 17 AirMac 17

More information

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twitter Ustream 1 Graduate School of Information Science and Technology, Osaka University, Japan 2 Cybermedia Center, Osaka University,

More information

( 1 ) [1] OTT (over-thetop) OTT 1:? YouTube Netflix Spotify Facebook Twitter OTT Skype Google Talk WhatsApp OTT OTT OTT OTT (100 ) 5,000 4,000 3,000 2

( 1 ) [1] OTT (over-thetop) OTT 1:? YouTube Netflix Spotify Facebook Twitter OTT Skype Google Talk WhatsApp OTT OTT OTT OTT (100 ) 5,000 4,000 3,000 2 2013 5 ( 1 ) [1] OTT (over-thetop) OTT 1:? YouTube Netflix Spotify Facebook Twitter OTT Skype Google Talk WhatsApp OTT OTT OTT OTT (100 ) 5,000 4,000 3,000 2,000 1,000 : 2012 PC 0 2009 2010 2011 2012 2013

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. P2P 337-87 37 E-mail: {m199,miyoshi}@shibaura-it.ac.jp, olivier.fourmaux@upmc.fr P2P P2P ISP Internet Service

More information

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy 1, 2 3 1, 2 Web Fischer Social Creativity 1) Social Creativity CG Network Analysis of an Emergent Massively Collaborative Creation Community Masahiro Hamasaki, 1, 2 Hideaki Takeda 3 and Takuichi Nishimura

More information

Web Basic Web SAS-2 Web SAS-2 i

Web Basic Web SAS-2 Web SAS-2 i 19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE

More information

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights 1 Internet Week 2001 ( ) kuma@isid.co.jp 2 CodeRed 1 3 (EXCEED ) se cu ri ty? 4? 2 5 Web IP Web MP3 6 3 7 1.5Mbps8Mbps 500 MP3 CM VoD 8 4 ADSL (Asymmetric Digital Subscriber Line) () CATV FWA (Fixed Wireless

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

ディスプレイと携帯端末間の通信を実現する映像媒介通信技術

ディスプレイと携帯端末間の通信を実現する映像媒介通信技術 Data Transfer Technology to Enable Communication between Displays and Smart Devices 倉木健介 中潟昌平 田中竜太 阿南泰三 あらまし Abstract Recently, the chance to see videos in various places has increased due to the speedup

More information

HTTP

HTTP 2008 P2P 2009 2 6 5107B024-5 1 5 1.1...................................... 5 1.2...................................... 6 1.3..................................... 7 2 HTTP 8 2.1.............................

More information

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing 1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November

More information

1 CCN CCN(Content-Centric-Network) [1] PUR- SUIT [2]DONA(Data-Oriented-Network Architecture) [3] 4WARD [4]PSIRP [5] Energy Efficient and Enhanced-type

1 CCN CCN(Content-Centric-Network) [1] PUR- SUIT [2]DONA(Data-Oriented-Network Architecture) [3] 4WARD [4]PSIRP [5] Energy Efficient and Enhanced-type THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 223 8522 3 14 1 E-mail: miyazaki@yamanaka.ics.keio.ac.jp Content Centric Network(CCN) CCN CCN LRU(Least-Recently-Used)Prob-Cache(Probablistic

More information

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int SOA 1 1 1 1 (HNS) HNS SOA SOA 3 3 A Service-Oriented Platform for Feature Interaction Detection and Resolution in Home Network System Yuhei Yoshimura, 1 Takuya Inada Hiroshi Igaki 1, 1 and Masahide Nakamura

More information

:

: An Analysis of TV Game Market: From the viewpoints of network externalities and whole of services Masaki Matsumura, Hiroyuki Kurimoto, and Toshio Kobayashi It has been understood that a standard would

More information

3_39.dvi

3_39.dvi Vol. 49 No. 3 Mar. 2008 Web 1 2 PC Web Web Windows Web Access Watchdog Systems for Children Protection Tatsumi Ueda 1 and Yoshiaki Takai 2 For today s children, the Internet is one of the most familiar

More information

untitled

untitled The Impact of Digitization on Music Production: From a Perspective of Modularity 51 2 pp. 87-108 2003 12 I 21 3 Information and Communication Technology, ICT 0 1 1 20 1 199820012000 1 MP3 CD 2 3 II CD

More information

IP RTP 2 QoS i

IP RTP 2 QoS i 17 IP A study on IP path quality forecasting from the IP path delay measurements 1060339 2006 3 10 IP RTP 2 QoS i Abstract A study on IP path quality forecasting from the IP path delay measurements Kotaro

More information

Web Web Web Web i

Web Web Web Web i 28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

21 VOD A study of the VOD contents decentralization delivery for unicast VOD 1100314 2010 3 1 VOD VOD Video on Demand VOD, Management Server Management Server Management Server 4 VOD CDN i Abstract A

More information

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN

DEIM Forum 2017 H2-2 Android LAN Android 1 Android LAN DEIM Forum 2017 H2-2 Android LAN 112-8610 2-1-1 163-8677 1-24-2 E-mail: {ayano,oguchi}@ogl.is.ocha.ac.jp, sane@cc.kogakuin.ac.jp Android 1 Android LAN Ayano KOYANAGI, Saneyasu YAMAGUCHI, and Masato OGUCHI

More information

Web Social Networking Service Virtual Private Network 84

Web Social Networking Service Virtual Private Network 84 Promising business utilized five senses information media through the Next Generation Network Toshio ASANO Next Generation Network 2004 11 2010 6,000 3,000 2006 12 2008 83 Web Social Networking Service

More information

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2

TCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2 Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service

More information

IP IPv4-IPv6

IP IPv4-IPv6 IPv6 Mobility IETF 2006 6 9 14:00-15:30 Interop Tokyo 2006 IIJ Nautilus6 IP IPv4-IPv6 L2 L3 Mobile IPv6 HIP L3.5 Shim6(?) L4 SCTP IPv6 Mobile IPv6/NEMO BS IETF RFC3775 - Mobile IPv6 RFC3963 - NEMO Basic

More information

MANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d

MANET MANET MANET (DTN: Delay Tolerant Network) DTN DTN DTN DTN [7], [3], [11] [8] % N M m M n N D(m, n) Size(m) m MD(m) m M, n N, MD(m) = max{d DEIM Forum 2013 F1-4 DTN, 565-0871 1-5 567-0047 5-1 184-8795 4-2-1 565-0871 2-1 E-mail: {sawamura.yusuke,nishio}@ist.osaka-u.ac.jp, teranisi@cmc.osaka-u.ac.jp, harumoto@eng.osaka-u.ac.jp DTN (DTN ) DTN

More information

IEEE e

IEEE e 2007 IEEE 802.11e LAN VoIP 2008 2 4 3606U075-2 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 IEEE 802.11e LAN

More information

Microsoft Word - toyoshima-deim2011.doc

Microsoft Word - toyoshima-deim2011.doc DEIM Forum 2011 E9-4 252-0882 5322 252-0882 5322 E-mail: t09651yt, sashiori, kiyoki @sfc.keio.ac.jp CBIR A Meaning Recognition System for Sign-Logo by Color-Shape-Based Similarity Computations for Images

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk

More information

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:

More information

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral

Shonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**

More information

ACS電子ジャーナル利用マニュアル

ACS電子ジャーナル利用マニュアル American Chemical Society ACS Web Edition & Journal Archives American Chemical Society ACS 4 Web Edition 2002 7 1879 Journal Archives ACS 1...2 2 2-1...3 2-2...4 2-3...5 3 3-1 Abstract...6 3-2 Full Text

More information

nakayama15icm01_l7filter.pptx

nakayama15icm01_l7filter.pptx Layer-7 SDN SDN NFV 50 % 3 MVNO 1 2 ICM @ 2015/01/16 2 1 1 2 2 1 2 2 ICM @ 2015/01/16 3 2 Service Dependent Management (SDM) SDM Simple Management of Access-Restriction Translator Gateway (SMART-GW) ICM

More information

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1

All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 asaba@iij.ad.jp All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 1 All Rights Reserved. Copyright(c)1997 Internet Initiative Japan Inc. 2 user IX IX IX All Rights Reserved. Copyright(c)1997

More information

"CAS を利用した Single Sign On 環境の構築"

CAS を利用した Single Sign On 環境の構築 CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC

More information