[Kaken]
Project Name | Term | in 2006 | in 2007 | in 2008 | in 2009 | in 2010 | in 2011 |
---|---|---|---|---|---|---|---|
ネットワークトラヒックを用いた ネットワークサービスの構造発見 と解析手法の確立 |
From 2009 To 2009 |
採択課題 報告書 |
採択課題 | 採択課題 | |||
プライバシーデータマイニングの ための暗号プロトコルの設計と安 全性評価 |
From 2008 To 2009 |
採択課題 報告書 |
採択課題 報告書 |
採択課題 | |||
人に寄り添うコンピューティング 基盤に関する研究 |
From 2006 To 2009 |
採択課題 報告書 |
採択課題 報告書 |
採択課題 報告書 |
採択課題 報告書 |
||
インターネット上でのプライバシ 保護が可能なオンライン生体認証 システムの構築 |
From 2006 To 2007 |
採択課題 報告書 |
採択課題 報告書 |
||||
インターネットフィッシング詐欺 に対する情報セキュリティ対策技 術の研究 |
From 2006 To 2007 |
採択課題 報告書 |
採択課題 報告書 |
||||
サイバーシステムにおける内部攻 撃脅威に対する評価指標確立と体 系的対策研究 |
From 2011 To 2011 |
採択課題 |
[JST]
Project Name | Abstruct |
---|---|
Analysis of Cryptographic Algorithms and Evaluation on Enhancing Network Security Based on Mathmatical Science | Descriptions of the Cooperative research projects. maximum 6 pages[1] How collaboration will be carried out, with clear statements of what roles Japanese and Indian researchers will play respectively in a proposed project; This research focuses on design and analysis of cryptographic algorithms and protocols, and also on technologies for enhancing network security, which use specific mathematical argument for their analysis and evaluation. Japan side already proposed many schemes and have implemented, though their argument of security is not enough. Whereas Indian side has many strong research stuffs who have sophisticated techniques with mathematical theory. Therefore, each side takes the following role in this project: Japan side:Design cryptographic algorithms including protocols, and implementation with developing prototype. Also gathering information on network incident data and modeling them. India Side:Analysis and Prove the security of cryptographic algorithms and protocols with algorithmic/mathematical theory including combinatorics, statistics, number theory etc Note that modifying models and revising design are planning to be done by both Japan and India, also with collaborating discussion. |
[SSR]
Project Name | Abstruct |
---|---|
クラウドコン ピューティング環境におけるセキュリティとプライバシに関する調査研究 | クラウドコンピューティングにおけるセキュリティとブライバシ確保のために、必要な所有権、アクセス制御ならびにそれらの評価に関 し、ソフトウェア設計の 観点から調査研究を行う。 |
[SCOPE]
Project Name | Abstruct |
---|---|
[地 域ICT振興型研究開発] Research and Development on High Reliable Multi-hop Wireless Network | We develop a high reliable multi-hop wireless network which consists of self-configured packet relay nodes to prevent fault and accident of the relay nodes, and performance degradation by using monitoring and self-configuring scheme on the nodes. The proposed self-configured packet relay nodes enable to provide sustainability packet forwarding services. We also implement prototype nodes and build an experimental multi-hop wireless network to evaluate its effectiveness. |