

{"id":295,"date":"2021-03-08T17:12:55","date_gmt":"2021-03-08T08:12:55","guid":{"rendered":"http:\/\/www.li-nlab.org\/?page_id=295"},"modified":"2021-03-08T23:39:41","modified_gmt":"2021-03-08T14:39:41","slug":"domestic-conferences","status":"publish","type":"page","link":"http:\/\/www.li-nlab.org\/?page_id=295","title":{"rendered":"Domestic Conferences"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">33.&nbsp;R. Li, and H. Asaeda, &#8220;DataTrust: A Data-Centric Any-to-Any Authentication Scheme,&#8221;&nbsp;IEICE IA Technical Report, Mar. 5, 2018.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">32.&nbsp;R. Li, and H. Asaeda, &#8220;DPD-ICIoT: A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT,&#8221;&nbsp;IEICE IA Technical Report, A2016-85, Jan. 27, 2017.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">31.&nbsp;R. Li, and H. Asaeda, &#8220;Community-Oriented Information Centric Network,&#8221;&nbsp;NICT Journal, vol.61, no.2, pp.127-132, 2015.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">30.&nbsp;R. Li, &nbsp;and H.Asaeda,&nbsp;\u201cToward the Implementation of Community-oriented Cyber Physical Systems,\u201d&nbsp;IEICE&nbsp;ICN&nbsp;Technical Report, July 3&nbsp;2015.&nbsp; &nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">29.&nbsp;R. Li, K. Matsuzono,&nbsp;and H.Asaeda,&nbsp;\u201cA Survey on Mobility Management for Information-Centric Network,\u201d&nbsp;IEICE&nbsp;MoNA&nbsp;Technical&nbsp;Report, Jan.&nbsp;2015.&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">28.&nbsp;R. Li,&nbsp;and H.Asaeda,&nbsp;\u201cCommunity-Oriented Communication Using Information-Centric Network Approach,\u201d&nbsp;IEICE IN Technical Report,&nbsp;June 2013.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">27.&nbsp;R. Li, V.&nbsp;P. Kafle, and M.&nbsp;Inoue, \u201cITU-T IoT Standardization Progress,\u201d IoT.est General Assembly, May&nbsp;13-17,&nbsp;Osanabrueck,&nbsp;Germany, 2013.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">26.&nbsp;Ruidong Li,&nbsp;Kazuyuki&nbsp;Morioka, Yasunori&nbsp;Owada, Masaaki&nbsp;Ohishi, and Hiroaki&nbsp;Harai,&nbsp;\u201cImplementation and Experiments of Proactive Distributed Authentication Framework over Regional Network,\u201dIEICE IN Technical Report, Apr. 2013.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">25.&nbsp;R. Li, and&nbsp;H.&nbsp;Harai, \u201cNINA: A Named Information Network Architecture,\u201d&nbsp;University of Tsukuba, July 12, 2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">24.&nbsp;R. Li,&nbsp;Ved P. Kafle&nbsp;and&nbsp;H.&nbsp;Harai, \u201cSelf-Protectable Secure Name Mapping System (S<sup>2<\/sup>NMS),\u201d IEICE Technical Report, ICSS&nbsp;2011-42, pp.&nbsp;17-24, Tokyo, Mar. 16, 2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">23.&nbsp;R. Li, Ved P. Kafle, and M. Inoue,&nbsp;\u201cITU-T Standardization Activities on IoT,\u201d&nbsp;3<sup>rd<\/sup>&nbsp;IoT.est General Assembly,&nbsp;May 30-31, Bucharest, Romania,&nbsp;2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">22.&nbsp;Ved P. Kafle,&nbsp;R. Li,&nbsp;D. Inoue,&nbsp;and&nbsp;H.&nbsp;Harai, \u201cIntegrated Security Approach for ID\/Locator Split-based Network,\u201d IEICE Technical Report, IN2011-198, pp. 365-370, Miyazaki, Mar. 9, 2012.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">21.&nbsp;R. Li, Masaaki Ohnishi, Yasunori Owada,&nbsp;and&nbsp;H.&nbsp;Harai, \u201cProactive Distributed Authentication Framework (PDAF) for Regional Network,\u201d IEICE Technical Report, IN&nbsp;2011-100, pp.&nbsp;43-48, Fukuoka, Nov. 18, 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">20.&nbsp;R. Li,&nbsp;Ved P. Kafle&nbsp;and&nbsp;H.&nbsp;Harai, \u201cProactive Trustworthy ID\/Locator Separation Framework (PTISF),\u201d IEICE Technical Report, IN 2011-91, pp. 69-74, Osaka, Oct. 21, 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">19.&nbsp;R. Li, and&nbsp;H.&nbsp;Harai, \u201cNamed Information Network,\u201d IEICE Technical Report, NS 2011-81, pp. 127-132, Sendai, Sept. 2, 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">18.&nbsp;R. Li, and M. Inoue, \u201cA Proposal of Trustworthy Information-Oriented Network (TION),\u201d IEICE Technical Report, IN 2010-190, pp. 277-282,&nbsp;Okinawa,&nbsp;Mar.&nbsp;4, 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">17. (Invited Talk) M. Inoue, M. Ohnishi,&nbsp;R. Li, and Y. Owada, \u201cA Network Integrating Wireless Multihop and Distributed Information Processing, \u201d IEICE Technical Report,&nbsp;RCS\/MoMuC\/SR workshop,&nbsp;pp.67-74, Mar. 3,&nbsp;2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">16.&nbsp;R. Li, and M. Inoue, \u201cA Comparative Survey on Information-Centric Network,\u201d IEICE Technical Report,&nbsp;IN 2010-139,&nbsp;pp 121-126,&nbsp;Osaka,&nbsp;Jan.&nbsp;21, 2011.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">15.&nbsp;R. Li, and M. Inoue, \u201cSecure Sensor Sharing Framework for Allowing Unbundled Sensor Owners and Service Providers,\u201d&nbsp;IEICE Technical Report,&nbsp;MoMuC 2010-36,&nbsp;pp 77-82,&nbsp;Fukuoka, Sept.&nbsp;9-10, 2010.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">14.&nbsp;R. Li, Ved P. Kafle, and M. Inoue,&nbsp;\u201cTrust, Security, Privacy in IoT.est,\u201d&nbsp;1<sup>st<\/sup>&nbsp;IoT.est General Assembly,&nbsp;Oct. , Surrey, U. K.,&nbsp;2010.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">13.&nbsp;R. Li, and M. Inoue, \u201cS3F: Secure Sensor Sharing in NerveNet,\u201d Forum on Information Technology 2010 (FIT 2010),&nbsp;L-037,&nbsp;Fukuoka, Sept. 7-9, 2010.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">12. M. Inoue, V. Kafle, T. Umezawa, M. Ohnishi,&nbsp;R. Li,&nbsp;and Y. Owada, \u201cResearch Status for Mobile Access Network Architecture \u2013NerveNet &amp; ID\/Locator Separation,\u201d&nbsp;IEICE&nbsp;NWGN Workshop 2010, Kakojima, Aug. 16-17, 2010.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">11.&nbsp;M. Inoue, M. Ohnishi, Y. Owada,&nbsp;R. Li,&nbsp;T. Umezawa,&nbsp;V. Kafle,&nbsp;and H. Morino,&nbsp;\u201cNerveNet: Distributed Wireless Regional Network for Sensor Information Dissemination,\u201d&nbsp;the 4<sup>th<\/sup>&nbsp;New Generation Network&nbsp;Workshop,&nbsp;Koganei,&nbsp;Tokyo,&nbsp;June.&nbsp;23, 2010.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">10.&nbsp;R.&nbsp;Li, M.&nbsp;Inoue,&nbsp;\u201cTrustable Network Concept for Diverse Interests Accommodation in New Generation Network (NWGN),\u201d&nbsp;IEICE General Conference, Mar. 2010.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">9. C. Peng,&nbsp;M.&nbsp;Ohnishi,&nbsp;and&nbsp;R. Li,&nbsp;M.&nbsp;Inoue, \u201cA New Algorithm on Finding Multiple Disjoint Paths for Reliable Wireless Mesh Networking,\u201d&nbsp;IEICE General Conference, Mar. 2010.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">8. C. Peng,&nbsp;M.&nbsp;Ohnishi,&nbsp;R. Li,&nbsp;and M.&nbsp;Inoue,&nbsp;\u201cCost-Effective Base Station Layout Algorithms for Multiple-cell Networks,\u201dIEICE Mobile Communication Workshop, Yokosuka Research Park, Mar. 3-6, 2010.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">7.&nbsp;R.&nbsp;Li, M.&nbsp;Inoue, \u201cStudy on Trust &amp; Security Goals and Requirements for New Generation Network (NWGN),\u201d&nbsp;IEICE Technical Report, NWGN, Nov. 12, 2009.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">6.&nbsp;R.. Li, J. Li, \u201cInvited Talk:&nbsp;Security Architecture Establishment and Mobility Management for Information Networks,\u201d&nbsp;IPSJ&nbsp;Technical Report, Vol.2009-MBL-50 No.10, Sept. 11, 2009.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">5.&nbsp;R. Li,&nbsp;M.&nbsp;Ohnishi, C.&nbsp;Peng,&nbsp;Ved P. Kafle,&nbsp;and M.&nbsp;Inoue,&nbsp;\u201cOn Capacity Analysis of Managed Mesh Network,\u201d&nbsp;IEICE Technical Report, AN2009-4, pp.17-22, May 22, 2009.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">4.&nbsp;R.&nbsp;Li, M.&nbsp;Ohnishi, C.&nbsp;Peng, and M.&nbsp;Inoue, \u201cQueueing Analysis on Capacity of Community Mesh Network,\u201d&nbsp;IEICE General Conference, Mar. 2009.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">3.&nbsp;M.&nbsp;Ohnishi,&nbsp;R.&nbsp;Li, C.&nbsp;Peng,&nbsp;and&nbsp;M.&nbsp;Inoue, \u201cA Study on the Wireless Mesh Network Performance Model Based on the Base Stations\u2019 Topology,\u201d&nbsp;IEICE General Conference, Mar. 2009.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">2.&nbsp;M.&nbsp;Ohnishi,&nbsp;R.&nbsp;Li, C.&nbsp;Peng,&nbsp;and&nbsp;M.&nbsp;Inoue, \u201cA Study on the Performance Evaluation Model of Wireless Mesh Networks,\u201d&nbsp;IEICE Technical Report, AN2008-45, pp.93-98,&nbsp;Oct. 15, 2008.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">1.&nbsp;D. Hiroki,&nbsp;R.&nbsp;Li,&nbsp;\u201cA Development of WEB Environment Simulator for Mobile Ad hoc Network,\u201d System Development&nbsp;&nbsp;&nbsp; Project Technical Report, Tsukuba University, &nbsp; pp. 17-25, 2006.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>33.&nbsp;R. Li, and H. Asaeda, &#8220;DataTrust: A Data-Centric Any-to-Any Authentication Scheme,&#8221;&nbsp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":191,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-295","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=295"}],"version-history":[{"count":2,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/295\/revisions"}],"predecessor-version":[{"id":399,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/295\/revisions\/399"}],"up":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/191"}],"wp:attachment":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}