National Institute of Information and Communications Technology

Displaying 1-16 of 16 results

  • White Papers // Jan 2015

    Reflective Network Tomography Based on Compressed Sensing

    Network tomography means to estimate internal link states from end-to-end path measurements. In conventional network tomography, to make packets transmissively penetrate a network, a cooperation between transmitter and receiver nodes is required, which are located at different places in the network. In this paper, the authors propose a reflective network...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Nov 2013

    PUF-Based RFID Authentication Secure and Private Under Complete Memory Leakage

    RFID tags are getting their presence noticeable on Smartphones, credit cards, toll payment devices, and other objects. They are expected to become an important tool for e-commerce, logistics, point-of-sale transactions, and so on, representing \"Things\" and \"Human holding things\" in transactions. Since a huge amount of tags are expected to...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Oct 2012

    On Network System Evaluation Under Various Failures

    Evaluating the scalability or performance of target technologies themselves is, of course, important, but studying their behavior in abnormal situations is also important for understanding problems with surrounding services and the target technology itself. Their system uses simulation and emulation in a large-scale test-bed to reproduce abnormal situations including router...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Jun 2012

    Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures

    At Eurocrypt 2010, Freeman proposed a transformation from pairing-based schemes in composite-order bilinear groups to equivalent ones in prime-order bilinear groups. This transformation can be applied to pairing-based cryptosystems exploiting only one of two properties of composite-order bilinear groups: cancelling and projecting. At Asiacrypt 2010, Meiklejohn, Shacham, and Freeman showed...

    Provided By National Institute of Information and Communications Technology

  • White Papers // May 2012

    An Energy-Efficient Beaconless Synchronization Mechanism for Smart Utility Networks Operating in TV White Space

    This paper proposes an energy-efficient beaconless synchronization mechanism for SUN operating in the TVWS. From the aspects of fulfilling the pervasive yet stringent requirements of low-energy wireless meters and TVWS regulations, the proposed mechanism is able to prolong battery lifespan beyond the required level for wireless smart meters, and is...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Mar 2012

    Coexistence of Secondary User Networks Under Primary User Constraints in TV White Space

    Moving forward based on the current spectrum regulations and industrial standardization for unlicensed usage of TV white space, the authors postulate a potential deployment scenario and describe the management procedure of coexisting Secondary User (SU) networks under the interference constraints to the Primary User (PU) receivers. For the quantitative evaluation...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Feb 2012

    Information Networks Secured by the Laws of Physics

    In this paper, the authors survey the state of the art of the secure key exchange method that is secured by the laws of classical statistical physics, and involves the Kirchhoff's law and the generalized Johnson noise equation, too. They discuss the major characteristics and advantages of these schemes especially...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Oct 2011

    On Feasibility of P2P Traffic Control Through Network Performance Manipulation

    The authors propose a new kind of P2P traffic control technique, called Netpherd exploiting the peer selection adaptation (i.e., preferring the peers who are likely to provide better performance). Netpherd tries to enable the peers to communicate with the peers of the local domain by affecting the peer selection adaptation...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Apr 2011

    Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space

    The recent regulatory development has opened up new opportunities for unlicensed wireless communication systems to utilize unoccupied TV channels (a.k.a TV White Space or TVWS) in the Very High Frequency (VHF) and UltraHigh-Frequency (UHF) bands. TVWS is defined as the TV bands that can be occupied by secondary (often unlicensed)...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Feb 2011

    Activities of APAN Sensor Network WG: Toward a Federated Sensor Network Framework

    The APAN Sensor Network Working Group (SensNet WG) was established in July 2009. Its aim is to exchange sensor network knowledge and federate sensor networks for realizing wide-area coverage in order to activate a sensor network and its versatile applications in the Asia-Pacific region. The members of APAN SensNet WG...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Dec 2010

    A SOM Based Malware Visualization System Using Resource Access Filter of Virtual Machine

    Modern operating system such as Windows OS has become so sophisticated that its behavior is too complicated for the ability of information processing of human being. Besides, malware (malicious software) is now serious problem with the difficulty of detecting it in complex operating system environment. Is this paper, the authors...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Oct 2010

    Locator ID Separation for Mobility Management in the New Generation Network

    Given that the majority of communications devices are mobile terminals, efficient mobility support should be a key feature in the new generation network or future Internet. The current Internet does not have native mobility support. Although variants of Mobile IP protocols have been developed to address this problem, these protocols...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Jul 2010

    An Enhancement of Trusted Domain Enforcement for Dynamic Protection of Virtual Cluster Using Live Migration

    As virtualization technologies are widely used, the authors are facing new security problem in virtualized and complicated network environment. In this paper, they propose an enhancement of trusted domain enforcement for the dynamic protection of virtual cluster using live migration. TDE (Trusted Domain Enforcement) is an extension of TE (Type...

    Provided By National Institute of Information and Communications Technology

  • White Papers // May 2010

    Structure-Preserving Signatures and Commitments to Group Elements

    A modular approach for cryptographic protocols leads to a simple design but often inefficient constructions. On the other hand, ad hoc constructions may yield efficient protocols at the cost of losing conceptual simplicity. The authors suggest structure-preserving commitments and signatures to overcome this dilemma and provide a way to construct...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Oct 2009

    Application of Asynchronous Channels Method to the W-CDMA Systems

    The authors evaluate new interference suppression method that utilizes the effect of asynchronous accesses in wireless telecommunication. The method is called as asynchronous channels (ACL), which can be applied to one of the present third generation standards, wideband code division multiple access (W-CDMA) systems. The simulation result shows that the...

    Provided By National Institute of Information and Communications Technology

  • White Papers // May 2009

    A Visualization of Anomaly Memory Behavior of Full-Virtualized Windows OS Using Virtual Machine Introspection

    Nowadays, a variety of applications of Windows OS has become more sophisticated and the complexity of its behavior has also been increased. Large scale applications generate the vast size of traffic and logs hard to understand for a shot while which impose a great burden on administrators. Visualization could be...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Jan 2015

    Reflective Network Tomography Based on Compressed Sensing

    Network tomography means to estimate internal link states from end-to-end path measurements. In conventional network tomography, to make packets transmissively penetrate a network, a cooperation between transmitter and receiver nodes is required, which are located at different places in the network. In this paper, the authors propose a reflective network...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Oct 2009

    Application of Asynchronous Channels Method to the W-CDMA Systems

    The authors evaluate new interference suppression method that utilizes the effect of asynchronous accesses in wireless telecommunication. The method is called as asynchronous channels (ACL), which can be applied to one of the present third generation standards, wideband code division multiple access (W-CDMA) systems. The simulation result shows that the...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Feb 2011

    Activities of APAN Sensor Network WG: Toward a Federated Sensor Network Framework

    The APAN Sensor Network Working Group (SensNet WG) was established in July 2009. Its aim is to exchange sensor network knowledge and federate sensor networks for realizing wide-area coverage in order to activate a sensor network and its versatile applications in the Asia-Pacific region. The members of APAN SensNet WG...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Apr 2011

    Enabling Technologies for a Practical Wireless Communication System Operating in TV White Space

    The recent regulatory development has opened up new opportunities for unlicensed wireless communication systems to utilize unoccupied TV channels (a.k.a TV White Space or TVWS) in the Very High Frequency (VHF) and UltraHigh-Frequency (UHF) bands. TVWS is defined as the TV bands that can be occupied by secondary (often unlicensed)...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Dec 2010

    A SOM Based Malware Visualization System Using Resource Access Filter of Virtual Machine

    Modern operating system such as Windows OS has become so sophisticated that its behavior is too complicated for the ability of information processing of human being. Besides, malware (malicious software) is now serious problem with the difficulty of detecting it in complex operating system environment. Is this paper, the authors...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Jul 2010

    An Enhancement of Trusted Domain Enforcement for Dynamic Protection of Virtual Cluster Using Live Migration

    As virtualization technologies are widely used, the authors are facing new security problem in virtualized and complicated network environment. In this paper, they propose an enhancement of trusted domain enforcement for the dynamic protection of virtual cluster using live migration. TDE (Trusted Domain Enforcement) is an extension of TE (Type...

    Provided By National Institute of Information and Communications Technology

  • White Papers // May 2009

    A Visualization of Anomaly Memory Behavior of Full-Virtualized Windows OS Using Virtual Machine Introspection

    Nowadays, a variety of applications of Windows OS has become more sophisticated and the complexity of its behavior has also been increased. Large scale applications generate the vast size of traffic and logs hard to understand for a shot while which impose a great burden on administrators. Visualization could be...

    Provided By National Institute of Information and Communications Technology

  • White Papers // May 2012

    An Energy-Efficient Beaconless Synchronization Mechanism for Smart Utility Networks Operating in TV White Space

    This paper proposes an energy-efficient beaconless synchronization mechanism for SUN operating in the TVWS. From the aspects of fulfilling the pervasive yet stringent requirements of low-energy wireless meters and TVWS regulations, the proposed mechanism is able to prolong battery lifespan beyond the required level for wireless smart meters, and is...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Oct 2011

    On Feasibility of P2P Traffic Control Through Network Performance Manipulation

    The authors propose a new kind of P2P traffic control technique, called Netpherd exploiting the peer selection adaptation (i.e., preferring the peers who are likely to provide better performance). Netpherd tries to enable the peers to communicate with the peers of the local domain by affecting the peer selection adaptation...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Mar 2012

    Coexistence of Secondary User Networks Under Primary User Constraints in TV White Space

    Moving forward based on the current spectrum regulations and industrial standardization for unlicensed usage of TV white space, the authors postulate a potential deployment scenario and describe the management procedure of coexisting Secondary User (SU) networks under the interference constraints to the Primary User (PU) receivers. For the quantitative evaluation...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Oct 2010

    Locator ID Separation for Mobility Management in the New Generation Network

    Given that the majority of communications devices are mobile terminals, efficient mobility support should be a key feature in the new generation network or future Internet. The current Internet does not have native mobility support. Although variants of Mobile IP protocols have been developed to address this problem, these protocols...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Oct 2012

    On Network System Evaluation Under Various Failures

    Evaluating the scalability or performance of target technologies themselves is, of course, important, but studying their behavior in abnormal situations is also important for understanding problems with surrounding services and the target technology itself. Their system uses simulation and emulation in a large-scale test-bed to reproduce abnormal situations including router...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Feb 2012

    Information Networks Secured by the Laws of Physics

    In this paper, the authors survey the state of the art of the secure key exchange method that is secured by the laws of classical statistical physics, and involves the Kirchhoff's law and the generalized Johnson noise equation, too. They discuss the major characteristics and advantages of these schemes especially...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Jun 2012

    Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures

    At Eurocrypt 2010, Freeman proposed a transformation from pairing-based schemes in composite-order bilinear groups to equivalent ones in prime-order bilinear groups. This transformation can be applied to pairing-based cryptosystems exploiting only one of two properties of composite-order bilinear groups: cancelling and projecting. At Asiacrypt 2010, Meiklejohn, Shacham, and Freeman showed...

    Provided By National Institute of Information and Communications Technology

  • White Papers // Nov 2013

    PUF-Based RFID Authentication Secure and Private Under Complete Memory Leakage

    RFID tags are getting their presence noticeable on Smartphones, credit cards, toll payment devices, and other objects. They are expected to become an important tool for e-commerce, logistics, point-of-sale transactions, and so on, representing \"Things\" and \"Human holding things\" in transactions. Since a huge amount of tags are expected to...

    Provided By National Institute of Information and Communications Technology

  • White Papers // May 2010

    Structure-Preserving Signatures and Commitments to Group Elements

    A modular approach for cryptographic protocols leads to a simple design but often inefficient constructions. On the other hand, ad hoc constructions may yield efficient protocols at the cost of losing conceptual simplicity. The authors suggest structure-preserving commitments and signatures to overcome this dilemma and provide a way to construct...

    Provided By National Institute of Information and Communications Technology