KINDAI UNIVERSITY


*A space between the first name and last name, please enter

FUKUTA Youji

Profile

FacultyDepartment of Informatics
PositionLecturer
Degree
Commentator Guidehttps://www.kindai.ac.jp/meikan/1489-fukuta-youji.html
URL
Mail
Last Updated :2020/09/30

Education and Career

Academic & Professional Experience

  •   2016 04 ,  - 現在, Kindai University
  •   2005 04 ,  - 2016 03 , Aichi University of Education

Research Activities

Research Areas

  • Informatics, Information security

Research Interests

  • cryptanalysis, digital forensics, network security, network application, stream cipher

Published Papers

  • Zero-Knowledge Identification Scheme Using LDPC Codes, Haruka ITO, Masanori HIROTOMO, Youji FUKUTA, Masami MOHRI, Yoshiaki SHIRAISHI, IEICE TRANS. INF. & SYST., IEICE TRANS. INF. & SYST., E101-D(11), 2688 - 2697, Nov. 2018 , Refereed
  • Controlling Signature Verification of Network Coded Packet on VANET, Tomoki MATSUKAWA, Taisuke YAMAMOTO, Youji FUKUTA, Masanori HIROTOMO, Masami MOHRI, Yoshiaki SHIRAISHI, 2012 International Symposium on Information Theory and its Applications (ISITA2012), 2012 International Symposium on Information Theory and its Applications (ISITA2012), 679 - 683, Nov. 2012 , Refereed
  • A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service, Yoshiaki SHIRAISHI, Masami MOHRI, Youji FUKUTA, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications(JoWUA), Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications(JoWUA), 2(2), 83 - 94, Jun. 2011 , Refereed
  • A Filter Check System for Defeating Attacks which employ IP Source Address Spoofing, Yoshiaki SHIRAISHI, Youji FUKUTA, Masakatu MORII, Proc. of The 11th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2007), Proc. of The 11th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2007), II, 289 - 292, Jul. 2007 , Refereed
  • A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications, Youji FUKUTA, Yoshiaki SHIRAISHI, Masakatu MORII, IEICE Trans. FUNDAMENTALS, IEICE Trans. FUNDAMENTALS, E86-A(8), 2155 - 2158, Aug. 2003 , Refereed
  • Improvement of Fast Correlation Attack Using Parity Check Equations, Youji FUKUTA, Yoshiaki SHIRAISHI, Masakatu MORII, International Symposium on Information Theory and Its Applications(ISITA2002), International Symposium on Information Theory and Its Applications(ISITA2002), 659 - 662, Oct. 2002 , Refereed
  • A Distribution Scheme of Certificate Revocation List by Inter-vehicle Communication Using a Random Network Coding, Taisuke Yamamoto, Youji Fukuta, Masami Mohri, Masanori Hirotomo, Yoshiaki Shiraishi, 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 392 - 395, 2012 , Refereed
    Summary:Intelligent Transport System (ITS) is for resolving traffic accidents and congestion by using information and communications technology. It is important to ensure the reliability of data in ITS. Public key encryption and digital signature are used for data security. Certification authority (CA) issues a certificate for a public key and manages a certificate revocation list (CRL). While a vehicle moves, it cannot always access the network infrastructure such as road side unit (RSU). If the distribution of CRL is slowly, a vehicle cannot verify the validity of a certificate correctly. This paper proposes a CRL distribution scheme by inter-vehicle communication using random network coding in the situations near intersections with high vehicle density.
  • Access control by service connector with single sign-on function, Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii, WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 2, II, 255 - 259, 2005 , Refereed
    Summary:In operation of server hosts in client/server model, allowing to connect a service with public is a frequent cause of illegal access. An administrator takes on heavy work load in conventional model of service provision, because access control is implemented in each application level. In this paper, we propose a model for access control using an application gateway which has functions of single sign-on, user authentication and service provisions. We call the application gateway service connector. The proposed model can improve security on server host and realize centralized user management and access-log analysis, and it has an effect to reduce a load of administrator.
  • Port randomized VPN by mobile codes, Y Shiraishi, Y Fukuta, M Morii, CCNC 2004: 1ST IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, PROCEEDINGS, CCNC 2004: 1ST IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, PROCEEDINGS, 671 - 673, 2004 , Refereed
    Summary:A key advantage of SSL VPN is that no specialized client software is required. When a user requests access to a server, the SSL client module, which is a Java applet code, is downloaded into the host at first. However, it is quite likely that not all applications run well, because a client can not connect with a server through an HTTPS tunnel in some applications as we know. Moreover, there is the possibility that we can not use the VPN connections when the SSL port is under Denial of Service (DoS) or Distributed DoS (DDoS) attack. In this paper, we propose a port randomized VPN architecture such that any application can use the VPN and the VPN has strength against DoS or DDoS attack. The proposed VPN uses the same Java applet as existing SSL VPNs use, but the function of the applet, which we call mobile code, is dynamically changed by Java Remote Method Invocation (RMI). The VPN client applet can cooperate with a VPN server and a firewall in server side.
  • Remote access VPN with port protection function by mobile codes, Y Shiraishi, Y Fukuta, M Morii, INFORMATION SECURITY APPLICATIONS, INFORMATION SECURITY APPLICATIONS, 2908, 16 - 26, 2003 , Refereed
    Summary:Concern about SSL VPN technology as a class of VPNs has been growing recently because a key advantage of SSL VPN is that it requires no specialized client software. When a user requests access to a server, the SSL client module, a Java applet code, is downloaded into the host first. However, it is quite likely that not all applications run well because a client can not connect with a server through an HTTPS tunnel in some applications. This study proposes a remote access VPN architecture that allows any application to use the VPN. The proposed VPN uses the same Java applet as existing SSL VPNs, but the function of the applet, which we call mobile code, is changed dynamically by Java Remote Method Invocation (RMI). The VPN client applet can cooperate with a VPN server and a firewall in server side. As a result, the proposed VPN has strength against Denial of Service (DoS) attacks.

Conference Activities & Talks

  • Reading Out Scheme for Digitally Signed Random Network Coded Communication on VANET, Tomoki MATSUKAWA, Taisuke YAMAMOTO, Youji FUKUTA, Masanori HIROTOMO, Masami MOHRI, Yoshiaki SHIRAISHI, IPSJ SIG Technical Report, 2014-ITS-56, no.6, pp.1-7,   2014 02

Research Grants & Projects

  • Basic Science Research Program, On Correlation Attack for Stream Ciphers