Domestic Conferences

33. R. Li, and H. Asaeda, “DataTrust: A Data-Centric Any-to-Any Authentication Scheme,” IEICE IA Technical Report, Mar. 5, 2018. 

32. R. Li, and H. Asaeda, “DPD-ICIoT: A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT,” IEICE IA Technical Report, A2016-85, Jan. 27, 2017. 

31. R. Li, and H. Asaeda, “Community-Oriented Information Centric Network,” NICT Journal, vol.61, no.2, pp.127-132, 2015.

30. R. Li,  and H.Asaeda, “Toward the Implementation of Community-oriented Cyber Physical Systems,” IEICE ICN Technical Report, July 3 2015.   

29. R. Li, K. Matsuzono, and H.Asaeda, “A Survey on Mobility Management for Information-Centric Network,” IEICE MoNA Technical Report, Jan. 2015. 

28. R. Li, and H.Asaeda, “Community-Oriented Communication Using Information-Centric Network Approach,” IEICE IN Technical Report, June 2013.

27. R. Li, V. P. Kafle, and M. Inoue, “ITU-T IoT Standardization Progress,” IoT.est General Assembly, May 13-17, Osanabrueck, Germany, 2013.

26. Ruidong Li, Kazuyuki Morioka, Yasunori Owada, Masaaki Ohishi, and Hiroaki Harai, “Implementation and Experiments of Proactive Distributed Authentication Framework over Regional Network,”IEICE IN Technical Report, Apr. 2013.

25. R. Li, and H. Harai, “NINA: A Named Information Network Architecture,” University of Tsukuba, July 12, 2012.

24. R. Li, Ved P. Kafle and H. Harai, “Self-Protectable Secure Name Mapping System (S2NMS),” IEICE Technical Report, ICSS 2011-42, pp. 17-24, Tokyo, Mar. 16, 2012.

23. R. Li, Ved P. Kafle, and M. Inoue, “ITU-T Standardization Activities on IoT,” 3rd IoT.est General Assembly, May 30-31, Bucharest, Romania, 2012.

22. Ved P. Kafle, R. Li, D. Inoue, and H. Harai, “Integrated Security Approach for ID/Locator Split-based Network,” IEICE Technical Report, IN2011-198, pp. 365-370, Miyazaki, Mar. 9, 2012.

21. R. Li, Masaaki Ohnishi, Yasunori Owada, and H. Harai, “Proactive Distributed Authentication Framework (PDAF) for Regional Network,” IEICE Technical Report, IN 2011-100, pp. 43-48, Fukuoka, Nov. 18, 2011.

20. R. Li, Ved P. Kafle and H. Harai, “Proactive Trustworthy ID/Locator Separation Framework (PTISF),” IEICE Technical Report, IN 2011-91, pp. 69-74, Osaka, Oct. 21, 2011.

19. R. Li, and H. Harai, “Named Information Network,” IEICE Technical Report, NS 2011-81, pp. 127-132, Sendai, Sept. 2, 2011.

18. R. Li, and M. Inoue, “A Proposal of Trustworthy Information-Oriented Network (TION),” IEICE Technical Report, IN 2010-190, pp. 277-282, Okinawa, Mar. 4, 2011.

17. (Invited Talk) M. Inoue, M. Ohnishi, R. Li, and Y. Owada, “A Network Integrating Wireless Multihop and Distributed Information Processing, ” IEICE Technical Report, RCS/MoMuC/SR workshop, pp.67-74, Mar. 3, 2011.

16. R. Li, and M. Inoue, “A Comparative Survey on Information-Centric Network,” IEICE Technical Report, IN 2010-139, pp 121-126, Osaka, Jan. 21, 2011.

15. R. Li, and M. Inoue, “Secure Sensor Sharing Framework for Allowing Unbundled Sensor Owners and Service Providers,” IEICE Technical Report, MoMuC 2010-36, pp 77-82, Fukuoka, Sept. 9-10, 2010.

14. R. Li, Ved P. Kafle, and M. Inoue, “Trust, Security, Privacy in IoT.est,” 1st IoT.est General Assembly, Oct. , Surrey, U. K., 2010.

13. R. Li, and M. Inoue, “S3F: Secure Sensor Sharing in NerveNet,” Forum on Information Technology 2010 (FIT 2010), L-037, Fukuoka, Sept. 7-9, 2010.

12. M. Inoue, V. Kafle, T. Umezawa, M. Ohnishi, R. Li, and Y. Owada, “Research Status for Mobile Access Network Architecture –NerveNet & ID/Locator Separation,” IEICE NWGN Workshop 2010, Kakojima, Aug. 16-17, 2010.

11. M. Inoue, M. Ohnishi, Y. Owada, R. Li, T. Umezawa, V. Kafle, and H. Morino, “NerveNet: Distributed Wireless Regional Network for Sensor Information Dissemination,” the 4th New Generation Network Workshop, Koganei, Tokyo, June. 23, 2010.

10. R. Li, M. Inoue, “Trustable Network Concept for Diverse Interests Accommodation in New Generation Network (NWGN),” IEICE General Conference, Mar. 2010.

9. C. Peng, M. Ohnishi, and R. Li, M. Inoue, “A New Algorithm on Finding Multiple Disjoint Paths for Reliable Wireless Mesh Networking,” IEICE General Conference, Mar. 2010.

8. C. Peng, M. Ohnishi, R. Li, and M. Inoue, “Cost-Effective Base Station Layout Algorithms for Multiple-cell Networks,”IEICE Mobile Communication Workshop, Yokosuka Research Park, Mar. 3-6, 2010.

7. R. Li, M. Inoue, “Study on Trust & Security Goals and Requirements for New Generation Network (NWGN),” IEICE Technical Report, NWGN, Nov. 12, 2009.

6. R.. Li, J. Li, “Invited Talk: Security Architecture Establishment and Mobility Management for Information Networks,” IPSJ Technical Report, Vol.2009-MBL-50 No.10, Sept. 11, 2009.

5. R. Li, M. Ohnishi, C. Peng, Ved P. Kafle, and M. Inoue, “On Capacity Analysis of Managed Mesh Network,” IEICE Technical Report, AN2009-4, pp.17-22, May 22, 2009.

4. R. Li, M. Ohnishi, C. Peng, and M. Inoue, “Queueing Analysis on Capacity of Community Mesh Network,” IEICE General Conference, Mar. 2009.

3. M. Ohnishi, R. Li, C. Peng, and M. Inoue, “A Study on the Wireless Mesh Network Performance Model Based on the Base Stations’ Topology,” IEICE General Conference, Mar. 2009.

2. M. Ohnishi, R. Li, C. Peng, and M. Inoue, “A Study on the Performance Evaluation Model of Wireless Mesh Networks,” IEICE Technical Report, AN2008-45, pp.93-98, Oct. 15, 2008.

1. D. Hiroki, R. Li, “A Development of WEB Environment Simulator for Mobile Ad hoc Network,” System Development    Project Technical Report, Tsukuba University,   pp. 17-25, 2006.