Yasuo Okabe
Orcid: 0000-0003-0825-2256
According to our database1,
Yasuo Okabe
authored at least 121 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Inf. Process., 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Dynamic VLAN Assignment for Local Users Under External IdP Management in RADIUS-Based Wi-Fi Roaming.
Proceedings of the International Conference on Information Networking, 2024
Proceedings of the International Conference on Information Networking, 2024
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
A Cross-Organizational Identity Proofing System for Seamless Online ID Re-Binding Leveraging Individual Number Cards.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
2023
Knowledge Engineering Framework for IoT Robotics Applied to Smart Healthcare and Emotional Well-Being.
Int. J. Soc. Robotics, March, 2023
J. Inf. Process., 2023
J. Inf. Process., 2023
Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities.
J. Inf. Process., 2023
CoRR, 2023
Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the International Conference on Information Networking, 2023
Protocol-Independent Context Propagation for Sharing Microservices in Multiple Environments.
Proceedings of the IEEE International Conference on Cloud Engineering, 2023
Proceedings of the IEEE International Conference on Cloud Engineering, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
2022
Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation.
CoRR, 2022
Acila: attaching identities of workloads for efficient packet classification in a cloud data center network.
Proceedings of the FIRA@SIGCOMM 2022: Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
2021
J. Inf. Process., 2021
Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the International Conference on Information Networking, 2021
Precursory Analysis of Attack-Log Time Series by Machine Learning for Detecting Bots in CAPTCHA.
Proceedings of the International Conference on Information Networking, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
IEEE Trans. Mob. Comput., 2020
IEICE Trans. Inf. Syst., 2020
Proceedings of the 2020 International Conference on Information Networking, 2020
Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change.
Proceedings of the 2020 International Conference on Information Networking, 2020
Proceedings of the 2020 International Conference on Information Networking, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
2019
Data distribution infrastructure and applications for robotic therapy for blind elderly.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019
Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
Competitive buffer management for multi-queue switches in QoS networks using packet buffering algorithms.
Theor. Comput. Sci., 2017
User Identification of Pseudonyms without Identity Information Exposure - A Scenario in Access Federations.
J. Inf. Process., 2017
Proceedings of the 2017 International Conference on Information Networking, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
A Threshold-Based Authentication System Which Provides Attributes Using Secret Sharing.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow Switches.
IEICE Trans. Inf. Syst., 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
User Identification of Pseudonyms without Identity Information Exposure in Access Federations.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
J. Inf. Process., 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Design and Implementation of an On-Demand Home Power Management System Based on a Hierarchical Protocol.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the Algorithms and Complexity - 9th International Conference, 2015
Proceedings of the Asian Internet Engineering Conference, 2015
2014
J. Inf. Process., 2014
J. Inf. Process., 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Development of an automatic managing system of wide-area distributed networks with defined network specification.
Proceedings of the 10th International Conference on Network and Service Management, 2014
A packet-in message filtering mechanism for protection of control plane in openflow networks.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014
2013
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
An Extension of the Link Layer Discovery Protocol for On-Demand Power Supply Network by PoE.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Design and Implementation of a Functional Extension Framework for Authn & Authz Federation Infrastructure Using Web Browser Add-on.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Packet-In Message Control for Reducing CPU Load and Control Traffic in OpenFlow Switches.
Proceedings of the European Workshop on Software Defined Networking, 2012
Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
2011
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
Quality-aware energy routing toward on-demand home energy networking: (Position paper).
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010
A Web-Based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
2009
IEICE Trans. Commun., 2009
IEICE Trans. Inf. Syst., 2009
Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
2008
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System.
IEICE Trans. Inf. Syst., 2008
Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information.
IEICE Trans. Inf. Syst., 2008
A Tight Upper Bound on Online Buffer Management for Multi-Queue Switches with Bicodal Buffers.
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Inf. Syst., 2008
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008
2007
IEICE Trans. Commun., 2007
Message from the Organizers of the Workshop on Middleware Architecture in the Internet.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
Proceedings of the 2007 International Symposium on Applications and the Internet (SAINT 2007), 2007
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007
A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System.
Proceedings of the Advances in Databases: Concepts, 2007
Proceedings of the Advances in Computer Science, 2007
2006
Priority Control in Receiving E-mails by Giving a Separate Response to Each DNS Query.
Proceedings of the 2006 International Symposium on Applications and the Internet (SAINT 2006), 2006
Proceedings of the Computers and Games, 5th International Conference, 2006
2005
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005
Proceedings of the High-Performance Computing - 6th International Symposium, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
2004
Comput. Commun., 2004
2003
Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2003
Polynomial-Time Computable Backup Tables for Shortest-Path Routing.
Proceedings of the SIROCCO 10: Proceedings of the 10th Internaltional Colloquium on Structural Information Complexity, 2003
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003
2002
ACM J. Exp. Algorithmics, 2002
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002
Evaluation of the HPF/JA Extensions on Fujitsu VPP Using the NAS Parallel Benchmarks.
Proceedings of the High Performance Computing, 4th International Symposium, 2002
Design and Implementation of a Web-Based Internet Broadcasting System on QoS Multicast Routers.
Proceedings of the Advances in Computing Science, 2002
2001
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001
1988
Parallel Computational Complexity of Logic Programs and Alternating Turing Machines.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1988