Obserwuj
Akira Otsuka
Akira Otsuka
Graduate School of Information Security, Institute of Information Security (IISEC)
Zweryfikowany adres z iisec.ac.jp
Tytuł
Cytowane przez
Cytowane przez
Rok
New attestation based security architecture for in-vehicle communication
H Oguma, A Yoshioka, M Nishikawa, R Shigetomi, A Otsuka, H Imai
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
812008
Traceability in permissioned blockchain
T Mitani, A Otsuka
IEEE Access 8, 21573-21588, 2020
762020
Theoretical framework for constructing matching algorithms in biometric authentication systems
M Inuma, A Otsuka, H Imai
Advances in Biometrics: Third International Conference, ICB 2009, Alghero …, 2009
602009
Wolf attack probability: A new security measure in biometric authentication systems
M Une, A Otsuka, H Imai
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
552007
Exploring the dark web for cyber threat intelligence using machine leaning
M Kadoguchi, S Hayashi, M Hashimoto, A Otsuka
2019 IEEE International Conference on Intelligence and Security Informatics …, 2019
532019
Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
Y Inatomi, A Minemura, M Yokobori, H Ito, T Fujimatsu, M Inuma, A Otsuka
US Patent 9,049,191, 2015
472015
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC
S Matsuo, K Miyazaki, A Otsuka, D Basin
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010
382010
Wolf attack probability: A theoretical security measure in biometric authentication systems
M Une, A Otsuka, H Imai
IEICE transactions on information and systems 91 (5), 1380-1389, 2008
362008
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ...
International Journal of Information Security 14, 73-84, 2015
322015
Cryptography with information theoretic security
H Imai, G Hanaoka, J Shikata, A Otsuka, AC Nascimento
Proceedings of the IEEE Information Theory Workshop, 73, 2002
312002
LDPC-code generating method, communication apparatus, and code-string generating method
S Uchida, A Otsuka, W Matsumoto
US Patent 7,805,653, 2010
232010
Information theoretically secure oblivious polynomial evaluation: model, bounds, and constructions
G Hanaoka, H Imai, J Mueller-Quade, ACA Nascimento, A Otsuka, ...
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
232004
Universally composable and statistically secure verifiable secret sharing scheme based on pre-distributed data
R Dowsley, J MULLER-QUADE, A Otsuka, G Hanaoka, H Imai, ...
IEICE transactions on fundamentals of electronics, communications and …, 2011
222011
Cyexec*: A high-performance container-based cyber range with scenario randomization
R Nakata, A Otsuka
IEEE Access 9, 109095-109114, 2021
192021
Formally verifiable features in embedded vehicular security systems
G Lee, H Oguma, A Yoshioka, R Shigetomi, A Otsuka, H Imai
2009 IEEE Vehicular Networking Conference (VNC), 1-7, 2009
162009
Deep self-supervised clustering of the dark web for cyber threat intelligence
M Kadoguchi, H Kobayashi, S Hayashi, A Otsuka, M Hashimoto
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
142020
o-glassesX: Compiler provenance recovery with attention mechanism from a short code fragment
Y Otsubo, A Otsuka, M Mimura, T Sakaki, H Ukegawa
Proceedings of the 3nd Workshop on Binary Analysis Research, 2020
132020
Unconditionally secure electronic voting
A Otsuka, H Imai
Towards Trustworthy Elections: New Directions in Electronic Voting, 107-123, 2010
122010
Practical searching over encrypted data by private information retrieval
R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
102010
Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model
ACA Nascimento, J Müller-Quade, A Otsuka, G Hanaoka, H Imai
Applied Cryptography and Network Security: Second International Conference …, 2004
102004
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20