Shozo NAITO


On the Characteristics of Internet Traffic Variability: Spikes and Elephants
Tatsuya MORI Ryoichi KAWAHARA Shozo NAITO Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/12/01
Vol. E87-D  No. 12  pp. 2644-2653
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet)
Category: Traffic Measurement and Analysis
Keyword: 
measurementanalysistrafficspikeselephant flow
 Summary | Full Text:PDF(1MB)

A Network Dependence Graph for Modeling Network Services and Its Use in Fault Location
Katsuhisa MARUYAMA Shozo NAITO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1999/04/25
Vol. E82-D  No. 4  pp. 737-746
Type of Manuscript:  Special Section PAPER (Special Issue on Internet Technology and Its Applications)
Category: 
Keyword: 
network managementnetwork fault locationdependence graphslicingdata and control flow analysis
 Summary | Full Text:PDF(342.6KB)

A Traffic-Adaptive Dynamic Routing Method and Its Performance Evaluation
Kimihiro YAMAMOTO Shozo NAITO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1999/04/25
Vol. E82-D  No. 4  pp. 870-878
Type of Manuscript:  Special Section PAPER (Special Issue on Internet Technology and Its Applications)
Category: 
Keyword: 
routingtraffic controlgame theorydistributed controlemergence
 Summary | Full Text:PDF(391.7KB)

Low Exponent Attacks against the Schwenk-Eisfeld Cryptoscheme and Signature
Tsuyoshi TAKAGI Shozo NAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/03/25
Vol. E81-A  No. 3  pp. 483-488
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
Schwenk-Eisfeld cryptosystemRSA cryptosystempolynomialfactoringlow exponent attack
 Summary | Full Text:PDF(557.6KB)

Extension of Rabin Cryptosystem to Eisenstein and Gauss Fields
Tsuyoshi TAKAGI Shozo NAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/04/25
Vol. E80-A  No. 4  pp. 753-760
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
Rabin cryptosystemquadratic fieldEisenstein fieldGauss fieldfactoring low exponent attack
 Summary | Full Text:PDF(641.8KB)