scispace - formally typeset
Search or ask a question
Author

Kenji Suzuki

Bio: Kenji Suzuki is an academic researcher. The author has contributed to research in topics: Communications system & Application layer. The author has an hindex of 3, co-authored 6 publications receiving 26 citations.

Papers
More filters
Patent

[...]

06 Mar 1995
TL;DR: An efficient packed encoding rules (EPER) for ASN.1 is presented in this article, in which structure of an encoding data is divided into three fields of a bit field, an octet field following the bit field and an offset field selectively added to before bit field.
Abstract: An efficient packed encoding rules (EPER) for ASN.1 for efficiently encoding the value to each type of abstract syntax definition, in which structure of an encoding data is divided into three fields of a bit field, an octet field following the bit field, and an offset field selectively added to before the bit field, in the bit field, bit data is set in the order of the abstract syntax definition, in the octet field, octet data in a unit of octet is set in the order of the abstract syntax definition, in the offset field, a length information of bit field is set and, in the bit field, padding is made so that a total length of the offset field and the bit field is an integer multiple of 8 bits, and the offset field is added when the length of bit field is not determined from the abstract syntax definition, thereby eliminating problems of PER.

13 citations

[...]

01 Jan 1988

8 citations

[...]

01 Jan 1986

4 citations

Journal ArticleDOI

[...]

01 Apr 1978
TL;DR: Intercomputer communications through public data networks by means of packet switching are expected to become common in the future and the interfaces between the networks and subscriber terminals are very inportant, and they contain many problems requiring solution.
Abstract: Promoted by the advancement of computer communication technology and social needs for data communications, many countries are setting up public data networks using mostly packet switching technology. Meanwhile, with the wide distribution of data communication service areas, interconnection of local networks and computers have become very important. Intercomputer communications through public data networks by means of packet switching are expected to become common in the future. In that case, the interfaces between the networks and subscriber terminals (i.e., DTE such as host computers and terminals) and the protocol are very inportant, and they contain many problems requiring solution.

1 citations

Journal Article

[...]

TL;DR: It is shown that the efficient OSI security communication system can be realized by SCSE and the proposed approach can be applied to the totally duplicate and the semiduplicate communications, which means that the method is applicable to all OSI communication applications.
Abstract: The authors have proposed a secure communications service element (SCSE) which can provide such security functions as authentification, information confidentiality, and data integrity (prevention of data modification), as application service elements (ASE) in the open-type system interconnection(OSI) application layer. The proposal is evaluated highly from the viewpoint of OSI protocol design technique to realize the security function. This paper attempts to verify the realizability of the proposed SCSE and the applicability to OSI communication. Further, it reports on the design of the SCSE software package and the implementation/evaluation. In the implementation/evaluation of the proposed package, especially, it is intended to demonstrate the applicability to OSI communication applications. As typical examples of SCSE applications, file transfer access and management (FTAM) assuming the totally duplicate communication function in the session layer, as well as document transfer and manipulation (DTAM) assuming the use of the semiduplicate communication function are adopted. Through the verification experiment such as the measurement of the processing load, the practical usefulness and the applicability of SCSE are evaluated. As a result, it is shown that the efficient OSI security communication system can be realized by SCSE. Since the proposed approach can be applied to the totally duplicate and the semiduplicate communications, it is shown that the method is applicable to all OSI communication applications.

Cited by
More filters
Patent

[...]

06 Jun 2007
TL;DR: In this paper, the authors present a system for the management of a plurality of electronic devices and processing of update information for updating software and/or firmware in the electronic devices, and authorization to update an electronic device may be secured using a subscriber identity module.
Abstract: Methods and devices supporting the management of a plurality of electronic devices and processing of update information for updating software and/or firmware in the electronic devices Prompting of users may be made using a language associated with the electronic device, and authorization to update an electronic device may be secured using a subscriber identity module

86 citations

Journal ArticleDOI

[...]

TL;DR: A set of tools (compiler and simulator/debugger) to help in the development process of communication protocols specified in the ISO standardized Formal Description Technique Estelle is presented.
Abstract: A set of tools (compiler and simulator/debugger) to help in the development process of communication protocols specified in the ISO standardized Formal Description Technique Estelle is presented.

63 citations

Patent

[...]

27 Jul 2007
TL;DR: A device and system supporting installation of updates to software and/or firmware in memory of an electronic device may be accompanied by advertising, promotional and information content that is dynamically displayed to a user during processing of the update in the electronic device.
Abstract: A device and system supporting installation of updates to software and/or firmware in memory of an electronic device. The updates may be accompanied by advertising, promotional and information content that is dynamically displayed to a user during processing of the update in the electronic device.

51 citations

Journal Article

[...]

TL;DR: This paper surveys recent developments in conformance testing and includes four important aspects of protocol testing: test architectures, test sequence selection techniques, conformance test suites for various protocols, and protocol test theory.
Abstract: With wide-spread acceptance of the ISO-OSI reference model and its standardized protocols in the areas of computer communication and information exchange, protocol testing has become an area of active research and development. This paper surveys recent developments in conformance testing. The discussion includes four important aspects of protocol testing: test architectures, test sequence selection techniques, conformance test suites for various protocols, and protocol test theory.

47 citations

Journal ArticleDOI

[...]

TL;DR: A survey of recent developments in conformance testing can be found in this article, where four important aspects of protocol testing are discussed: test architectures, test sequence selection techniques, conformance test suites for various protocols, and protocol test theory.
Abstract: With wide-spread acceptance of the ISO-OSI reference model and its standardized protocols in the areas of computer communication and information exchange, protocol testing has become an area of active research and development. This paper surveys recent developments in conformance testing. The discussion includes four important aspects of protocol testing: test architectures, test sequence selection techniques, conformance test suites for various protocols, and protocol test theory.

45 citations