Yasuo Okabe

Orcid: 0000-0003-0825-2256

According to our database1, Yasuo Okabe authored at least 121 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Linking Contexts from Distinct Data Sources in Zero Trust Federation.
J. Inf. Process., 2024

Putting Authorization Servers on User-Owned Devices in User-Managed Access.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

Dynamic VLAN Assignment for Local Users Under External IdP Management in RADIUS-Based Wi-Fi Roaming.
Proceedings of the International Conference on Information Networking, 2024

Network State Estimation by Spectral Analysis of Passively Measured TCP Flows.
Proceedings of the International Conference on Information Networking, 2024

DDoS Attack Information Sharing Among CDNs Interconnected Through CDNI.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

A Cross-Organizational Identity Proofing System for Seamless Online ID Re-Binding Leveraging Individual Number Cards.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
Knowledge Engineering Framework for IoT Robotics Applied to Smart Healthcare and Emotional Well-Being.
Int. J. Soc. Robotics, March, 2023

Vantage Point Placement Based on Inference of AS-level Connections.
J. Inf. Process., 2023

CREBAS: Enabling Network Access Control in a Home with One Click.
J. Inf. Process., 2023

Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities.
J. Inf. Process., 2023

Monitoring Cascading Changes of Resources in the Kubernetes Control Plane.
CoRR, 2023

Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Is Puzzle-Based CAPTCHA Secure Against Attacks Based on CNN?
Proceedings of the International Conference on Information Networking, 2023

Protocol-Independent Context Propagation for Sharing Microservices in Multiple Environments.
Proceedings of the IEEE International Conference on Cloud Engineering, 2023

Efficient Container Image Updating in Low-bandwidth Networks with Delta Encoding.
Proceedings of the IEEE International Conference on Cloud Engineering, 2023

A Policy-Based Path Selection Mechanism in QUIC Multipath Extension.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Partial Outsourcing of Malware Dynamic Analysis Without Disclosing File Contents.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation.
CoRR, 2022

Acila: attaching identities of workloads for efficient packet classification in a cloud data center network.
Proceedings of the FIRA@SIGCOMM 2022: Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, 2022

Capability Based Network Access Control for Smart Home Devices.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

2021
Centralized Control of Account Migration at Single Sign-On in Shibboleth.
J. Inf. Process., 2021

Zero Trust Federation: Sharing Context under User Control towards Zero Trust in Identity Federation.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021

An Anonymous Distributed Electronic Voting System Using Zerocoin.
Proceedings of the International Conference on Information Networking, 2021

Precursory Analysis of Attack-Log Time Series by Machine Learning for Detecting Bots in CAPTCHA.
Proceedings of the International Conference on Information Networking, 2021

Analysis of Inter-regional Relationship among Regional Tier-1 ASes in the Internet.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Mutual Secrecy of Attributes and Authorization Policies in Identity Federation.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

QoS Network Control for Elderly Support Services.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Coflow-Like Online Data Acquisition from Low-Earth-Orbit Datacenters.
IEEE Trans. Mob. Comput., 2020

Identifying Link Layer Home Network Topologies Using HTIP.
IEICE Trans. Inf. Syst., 2020

Traffic-aware Access Control List Reconstruction.
Proceedings of the 2020 International Conference on Information Networking, 2020

Network Routing Optimization Based on Machine Learning Using Graph Networks Robust against Topology Change.
Proceedings of the 2020 International Conference on Information Networking, 2020

Detection of Bots in CAPTCHA as a Cloud Service Utilizing Machine Learning.
Proceedings of the 2020 International Conference on Information Networking, 2020

Improving Attack Detection Performance in NIDS Using GAN.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Data distribution infrastructure and applications for robotic therapy for blind elderly.
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers, 2019

Detecting Successful Attacks from IDS Alerts Based On Emulation of Remote Shellcodes.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Xilara: An XSS Filter Based on HTML Template Restoration.
Proceedings of the Security and Privacy in Communication Networks, 2018

Message from the IWFIT 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

A Mixed Integer Programming Solution for Network Optimization Under Tunneling-Based Traffic Engineering Schemes.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Message from the CDS 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Detecting Emerging Large-Scale Vulnerability Scanning Activities by Correlating Low-Interaction Honeypots with Darknet.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Competitive buffer management for multi-queue switches in QoS networks using packet buffering algorithms.
Theor. Comput. Sci., 2017

User Identification of Pseudonyms without Identity Information Exposure - A Scenario in Access Federations.
J. Inf. Process., 2017

Reactive configuration updating for Intent-Based Networking.
Proceedings of the 2017 International Conference on Information Networking, 2017

A Collusion-Resilient Hybrid P2P Framework for Massively Multiplayer Online Games.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

A Threshold-Based Authentication System Which Provides Attributes Using Secret Sharing.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
A Packet-In Message Filtering Mechanism for Protection of Control Plane in OpenFlow Switches.
IEICE Trans. Inf. Syst., 2016

Optimizing Packet Transmission Scheduling for Enhanced Web QoE in Wireless LAN.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

User Identification of Pseudonyms without Identity Information Exposure in Access Federations.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Authentication Federation Proxy Which Conceals Attributes and Authorization Policies Each Other.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Editor's Message to Special Issue of "Students' and Young Researchers' Papers".
J. Inf. Process., 2015

A Traceable and Pseudonymous P2P Information Distribution System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Design and Implementation of an On-Demand Home Power Management System Based on a Hierarchical Protocol.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Approximability of Two Variants of Multiple Knapsack Problems.
Proceedings of the Algorithms and Complexity - 9th International Conference, 2015

Fast Failure Detection of OpenFlow Channels.
Proceedings of the Asian Internet Engineering Conference, 2015

2014
Privacy Enhancing Proxies in a Federation: Agent Approach and Cascade Approach.
J. Inf. Process., 2014

Privacy Preserving Attribute Aggregation Method without Shared Identifier Binding.
J. Inf. Process., 2014

Digital Fingerprinting on Executable File for Tracking Illegal Uproaders.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Development of an automatic managing system of wide-area distributed networks with defined network specification.
Proceedings of the 10th International Conference on Network and Service Management, 2014

A packet-in message filtering mechanism for protection of control plane in openflow networks.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014

2013
Toward a more practical unsupervised anomaly detection system.
Inf. Sci., 2013

A Mail Transfer System Selectively Restricting a Huge Amount of E-Mails.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Power Allocation Algorithms of PoE for On-Demand Power Supply.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Managing Networks Independently of the Physical Topology by Service Defined Network.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Privacy Enhancing Proxies in Attribute Releases: Two Approaches.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Design of Cooperative Load Distribution for Addressing Flash Crowds Using P2P File Sharing Network.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Privacy Preserved Attribute Aggregation to Avoid Correlation of User Activities across Shibboleth SPs.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

An Extension of the Link Layer Discovery Protocol for On-Demand Power Supply Network by PoE.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

Design and Implementation of a Functional Extension Framework for Authn & Authz Federation Infrastructure Using Web Browser Add-on.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

A GMPLS-based Power Resource Reservation System toward Energy-on-Demand Home Networking.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Access Control Architecture Separating Privilege by a Thread on a Web Server.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Packet-In Message Control for Reducing CPU Load and Control Traffic in OpenFlow Switches.
Proceedings of the European Workshop on Software Defined Networking, 2012

Secure ID Transformation for Robust Pseudonymity against Backflow of Personal Information in SAML Federation.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
The Design and Implementation of an On-demand DC Grid in Home.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Design and Implementation of a Certified Document Delivery System without a Trusted Intermediate Authority.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Power routing switches toward energy-on-demand home networking.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Quality-aware energy routing toward on-demand home energy networking: (Position paper).
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluation.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

Providing ubiquitous networks securely using host identity protocol (HIP).
Proceedings of the AINTEC '11, Asian Internet Engineering Conference, Bangkok, Thailand, November 09, 2011

Host-Centric Site-Exit Router Selection in IPv6 Site Multihoming Environment.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

Policy-Based IP Address Selection in SCTP Automatic Address Reconfiguration.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data.
IEICE Trans. Inf. Syst., 2010

A Web-Based Privacy-Secure Content Trading System for Small Content Providers Using Semi-Blind Digital Watermarking.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM.
IEICE Trans. Commun., 2009

The Online Graph Exploration Problem on Restricted Graphs.
IEICE Trans. Inf. Syst., 2009

Design and Implementation of a Certified Mail Exchange System Using Simultaneous Secret Exchange.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Security Analysis on Privacy-Secure Image Trading Framework Using Blind Watermarking.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

An Enhanced Location Privacy Framework with Mobility Using Host Identity Protocol.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Reliable Streaming Transmission Using PR-SCTP.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Leveraging PKI in SAML 2.0 Federation for Enhanced Discovery Service.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Semi-blind Fingerprinting Utilizing Ordinary Existing Watermarking Techniques.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

2008
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System.
IEICE Trans. Inf. Syst., 2008

Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information.
IEICE Trans. Inf. Syst., 2008

A Tight Upper Bound on Online Buffer Management for Multi-Queue Switches with Bicodal Buffers.
IEICE Trans. Inf. Syst., 2008

A Tight Bound on Online Buffer Management for Two-Port Shared-Memory Switches.
IEICE Trans. Inf. Syst., 2008

Privacy Oriented Attribute Exchange in Shibboleth Using Magic Protocols.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

2007
Special Section on New Challenge for Internet Technology and its Architecture.
IEICE Trans. Commun., 2007

Message from the Organizers of the Workshop on Middleware Architecture in the Internet.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Analysis for Topological Properties of the Network Feeding Usenet News.
Proceedings of the 2007 International Symposium on Applications and the Internet (SAINT 2007), 2007

A Privacy Oriented Extension of Attribute Exchange in Shibboleth.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System.
Proceedings of the Advances in Databases: Concepts, 2007

A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts.
Proceedings of the Advances in Computer Science, 2007

2006
Priority Control in Receiving E-mails by Giving a Separate Response to Each DNS Query.
Proceedings of the 2006 International Symposium on Applications and the Internet (SAINT 2006), 2006

Cheat-Proof Serverless Network Games.
Proceedings of the Computers and Games, 5th International Conference, 2006

2005
Single backup table schemes for shortest-path routing.
Theor. Comput. Sci., 2005

Security analysis on public wireless internet service models.
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005

Pipelined Parallelization in HPF Programs on the Earth Simulator.
Proceedings of the High-Performance Computing - 6th International Symposium, 2005

Automatic Address Assignment for IPv6 End-to-End Multihoming Sites.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

2004
Management of parallel UBR flows over TCP in congested ATM networks.
Comput. Commun., 2004

2003
Avoiding Routing Loops on the Internet.
Theory Comput. Syst., 2003

The MIAKO.NET public wireless internet service in Kyoto.
Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2003

Polynomial-Time Computable Backup Tables for Shortest-Path Routing.
Proceedings of the SIROCCO 10: Proceedings of the 10th Internaltional Colloquium on Structural Information Complexity, 2003

Multihoming Support based on Mobile Node Protocol LIN6.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

Improving Performance of SCTP over Broadband High Latency Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

2002
Parallelizing Local Search for CNF Satisfiability Using Vectorization and PVM.
ACM J. Exp. Algorithmics, 2002

Interference among Multiple TCP Flows over Congested ATM Links.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Evaluation of the HPF/JA Extensions on Fujitsu VPP Using the NAS Parallel Benchmarks.
Proceedings of the High Performance Computing, 4th International Symposium, 2002

Design and Implementation of a Web-Based Internet Broadcasting System on QoS Multicast Routers.
Proceedings of the Advances in Computing Science, 2002

2001
Separating Oblivious and Non-oblivious BPs.
Proceedings of the Computing and Combinatorics, 7th Annual International Conference, 2001

1988
Parallel Computational Complexity of Logic Programs and Alternating Turing Machines.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1988


  Loading...