Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yoshiaki Shiraishi is active.

Publication


Featured researches published by Yoshiaki Shiraishi.


consumer communications and networking conference | 2004

Port randomized VPN by mobile codes

Yoshiaki Shiraishi; Youji Fukuta; Masakatu Morii

A key advantage of SSL (secure socket layer) VPN is that no specialized client software is required. When a user requests access to a server, the SSL client module, which is a Java applet code, is downloaded into the host first. However, it is quite likely that not all applications run well, because a client cannot connect with a server through an HTTPS tunnel in some applications. Moreover, there is the possibility that we can not use the VPN connections when the SSL port is under denial of service (DoS) or distributed DoS (DDoS) attack. We propose a port randomized VPN architecture such that any application can use the VPN and the VPN has strength against DoS or DDoS attack. The proposed VPN uses the same Java applet as existing SSL VPNs use, but the function of the applet, which we call mobile code, is dynamically changed by Java remote method invocation (RMI). The VPN client applet can cooperate with a VPN server and a firewall in the server side.


workshop on information security applications | 2003

Remote Access VPN with Port Protection Function by Mobile Codes

Yoshiaki Shiraishi; Youji Fukuta; Masakatu Morii

Concern about SSL VPN technology as a class of VPNs has been growing recently because a key advantage of SSL VPN is that it requires no specialized client software. When a user requests access to a server, the SSL client module, a Java applet code, is downloaded into the host first. However, it is quite likely that not all applications run well because a client can not connect with a server through an HTTPS tunnel in some applications. This study proposes a remote access VPN architecture that allows any application to use the VPN. The proposed VPN uses the same Java applet as existing SSL VPNs, but the function of the applet, which we call mobile code, is changed dynamically by Java Remote Method Invocation (RMI). The VPN client applet can cooperate with a VPN server and a firewall in server side. As a result, the proposed VPN has strength against Denial of Service (DoS) attacks.


computational intelligence and security | 2005

FMS attack-resistant WEP implementation is still broken

Toshihiro Ohigashi; Yoshiaki Shiraishi; Masakatu Morii


電子情報通信学会技術研究報告. ICSS, 情報通信システムセキュリティ | 2015

A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology (情報通信システムセキュリティ)

Hitoshi Miyazaki; Masami Mohri; Yoshiaki Shiraishi


電子情報通信学会技術研究報告. ICSS, 情報通信システムセキュリティ | 2015

Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking (情報通信システムセキュリティ)

Makoto Sato; Masami Mohri; Hiroshi Doi; Yoshiaki Shiraishi


電子情報通信学会技術研究報告. ICSS, 情報通信システムセキュリティ | 2015

A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function (情報通信システムセキュリティ)

Koji Tomida; Hiroshi Doi; Masami Mohri; Yoshiaki Shiraishi


電子情報通信学会技術研究報告. ICSS, 情報通信システムセキュリティ | 2015

Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data (情報通信システムセキュリティ)

Takeru Naruse; Masami Mohri; Yoshiaki Shiraishi


IEICE technical report. Information and communication system security | 2014

Survey on Sense of Security and Consent for Information Systems and Services

Kaori Okumura; Masami Mohri; Yoshiaki Shiraishi; Akira Iwata


IEICE technical report. Information and communication system security | 2014

A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication

Kohei Isobe; Masanori Hirotomo; Youji Fukuta; Masami Mohri; Yoshiaki Shiraishi; Akira Iwata


全国大会講演論文集 | 2010

A Visualization Method by Selecting and Stacking Information Layers for Multidirectional Analysis of Security Level for Network Resource.

Yuichi Saito; Masami Mohri; Yoshiaki Shiraishi; Youji Fukuta; Ryoji Noguchi

Collaboration


Dive into the Yoshiaki Shiraishi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Masakatu Morii

Nagoya Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Youji Fukuta

Aichi University of Education

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Akira Iwata

Nagoya Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Koji Tomida

Nagoya Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Makoto Sato

Nagoya Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge