Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kensaku Fujimoto is active.

Publication


Featured researches published by Kensaku Fujimoto.


international conference on distributed computing systems | 2001

Gateway technologies for home network and their implementations

Takeshi Saito; Ichiro Tomoda; Yoshiaki Takabatake; Keiichi Teramoto; Kensaku Fujimoto

We propose two gateway architectures. The first one is the home gateway, which interconnects home networks and the public (access) network. We show its requirements and software design. We implemented an experimental home gateway based on a Web server enhanced with Java facilities. It interconnects the Internet and the home networks (IEEE1394 AV network and the ECHONET home automation network). It also has a real time MP1394 transcoding function which transcodes AV data on IEEE1394 into MPEG4 video. It provides the capability of remote control of the home, and AV data transmission/translation capabilities. The second one is the wireless gateway. We show the background with respect to the wireless gateway and its design. The key issue is to develop interconnectivity between wired and wireless networks, and then we show our implementation of it. It interconnects IEEE1394 and 802.11b 2.4 GHz band high-speed wireless network, and transmits AV control commands and high-quality AV data.


wireless mobile applications and services on wlan hotspots | 2004

Secure universal mobility for wireless internet

Ashutosh Dutta; Tao Zhang; Sunil Madhani; Kenichi Taniuchi; Kensaku Fujimoto; Yasuhiro Katsube; Yoshihiro Ohba; Henning Schulzrinne

The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802.11, WCDMA, cdma2000, and GPRS. An enterprise user desires to be reachable while outside ones enterprise networks and requires minimum interruption while ensuring that the signaling and data traffic is not compromised during ones movement within the enterprise and between enterprise and external networks. We describe the design, implementation and performance of a Secure Universal Mobility (SUM) architecture. It uses standard protocols, such as SIP and Mobile IP, to support mobility and uses standard virtual private network (VPN) technologies (e.g., IPsec) to support security (authentication and encryption). It uses pre-processing and make-before-break handoff techniques to achieve seamless mobility (i.e., with little interruption to users and user applications) across heterogeneous radio systems. It separates the handlings of initial mobility management and user application signaling messages from user application traffic so that VPNs can be established only when needed, thus reducing the interruptions to users.


Mobile Computing and Communications Review | 2005

Secure universal mobility for wireless Internet

Ashutosh Dutta; Tao Zhang; Sunil Madhani; Kenichi Taniuchi; Kensaku Fujimoto; Yasuhiro Katsube; Yoshihiro Ohba; Henning Schulzrinne

The advent of the mobile wireless Internet has created the need for seamless and secure communication over heterogeneous access networks such as IEEE 802,11, WCDMA, cdma2000, and GPRS. An enterprise user desires to be reachable while outside ones enterprise networks and requires minimum interruption while ensuring that the signaling and data traffic is not compromised during ones movement within the enterprise and between enterprise and external networks. We describe the design, implementation and performance of a Secure Universal Mobility (SUM) architecture. It uses standard protocols, such as SIP and Mobile IP, to support mobility and uses standard virtual private network (VPN) technologies (e.g., IPsec) to support security (authentication and encryption.) It uses pre-processing and make-before-break handoff techniques to achieve seamless mobility across heterogeneous radio systems. It separates the handlings of initial mobility management and user application signaling messages from user application traffic so that VPNs can be established only when needed, thus reducing the interruptions to users.


Archive | 2001

Tamper resistant microprocessor

Mikio Hashimoto; Keiichi Teramoto; Takeshi Saito; Kenji Shirakawa; Kensaku Fujimoto


Archive | 2004

Dynamic host configuration and network access authentication

Kensaku Fujimoto; Yasuhiro Katsube; Yoshihiro Oba


Archive | 2001

Microprocessor with program and data protection function under multi-task environment

Kenji Shirakawa; Mikio Hashimoto; Keiichi Teramoto; Satoshi Ozaki; Kensaku Fujimoto


Archive | 2001

Method and system for distributing programs using tamper resistant processor

Mikio Hashimoto; Kensaku Fujimoto; Kenji Shirakawa; Keiichi Teramoto; Takeshi Saito


Archive | 2002

Microprocessor with improved task management and table management mechanism

Mikio Hashimoto; Kensaku Fujimoto; Kenji Shirakawa


Archive | 2002

Microprocessor using asynchronous public key decryption processing

Mikio Hashimoto; Kenji Shirakawa; Keiichi Teramoto; Kensaku Fujimoto; Satoshi Ozaki


Archive | 2002

Tamper resistant microprocessor using fast context switching

Kensaku Fujimoto; Kenji Shirakawa; Mikio Hashimoto; Keiichi Teramoto; Satoshi Ozaki

Collaboration


Dive into the Kensaku Fujimoto's collaboration.

Researchain Logo
Decentralizing Knowledge