Akira Otsuka
Akira Otsuka
Graduate School of Information Security, Institute of Information Security (IISEC)
Zweryfikowany adres z iisec.ac.jp
Tytuł
Cytowane przez
Cytowane przez
Rok
New attestation based security architecture for in-vehicle communication
H Oguma, A Yoshioka, M Nishikawa, R Shigetomi, A Otsuka, H Imai
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
672008
Theoretical framework for constructing matching algorithms in biometric authentication systems
M Inuma, A Otsuka, H Imai
International Conference on Biometrics, 806-815, 2009
542009
Outbreak of highly pathogenic avian influenza in Japan and anti-influenza virus activity of povidone-iodine products
H Ito, T Ito, M Hikida, J Yashiro, A Otsuka, H Kida, K Otsuki
Dermatology 212 (Suppl. 1), 115-118, 2006
442006
Wolf attack probability: A new security measure in biometric authentication systems
M Une, A Otsuka, H Imai
International Conference on Biometrics, 396-406, 2007
372007
Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
Y Inatomi, A Minemura, M Yokobori, H Ito, T Fujimatsu, M Inuma, A Otsuka
US Patent 9,049,191, 2015
352015
How to evaluate the security of real-life cryptographic protocols?
S Matsuo, K Miyazaki, A Otsuka, D Basin
International Conference on Financial Cryptography and Data Security, 182-194, 2010
352010
Wolf attack probability: A theoretical security measure in biometric authentication systems
M Une, A Otsuka, H Imai
IEICE transactions on information and systems 91 (5), 1380-1389, 2008
332008
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ...
International Journal of Information Security 14 (1), 73-84, 2015
282015
Cryptography with information theoretic security
H Imai, G Hanaoka, J Shikata, A Otsuka, AC Nascimento
Proceedings of the IEEE Information Theory Workshop, 73, 2002
212002
Traceability in permissioned blockchain
T Mitani, A Otsuka
IEEE Access 8, 21573-21588, 2020
202020
Universally composable and statistically secure verifiable secret sharing scheme based on pre-distributed data
R Dowsley, J MULLER-QUADE, A Otsuka, G Hanaoka, H Imai, ...
IEICE transactions on fundamentals of electronics, communications and …, 2011
192011
LDPC-code generating method, communication apparatus, and code-string generating method
S Uchida, A Otsuka, W Matsumoto
US Patent 7,805,653, 2010
192010
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
M Grassl, W Geiselmann, T Beth
Lecture Notes in Computer Science (Springer, New York, 1999), 231, 1999
16*1999
Information theoretically secure oblivious polynomial evaluation: Model, bounds, and constructions
G Hanaoka, H Imai, J Mueller-Quade, ACA Nascimento, A Otsuka, ...
Australasian Conference on Information Security and Privacy, 62-73, 2004
152004
Formally verifiable features in embedded vehicular security systems
G Lee, H Oguma, A Yoshioka, R Shigetomi, A Otsuka, H Imai
2009 IEEE Vehicular Networking Conference (VNC), 1-7, 2009
132009
Practical searching over encrypted data by private information retrieval
R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
102010
Exploring the dark web for cyber threat intelligence using machine leaning
M Kadoguchi, S Hayashi, M Hashimoto, A Otsuka
2019 IEEE International Conference on Intelligence and Security Informatics …, 2019
92019
Relations among security metrics for template protection algorithms
M Inuma, A Otsuka
2013 IEEE Sixth International Conference on Biometrics: Theory, Applications …, 2013
82013
A provably secure refreshable partially anonymous token and its applications
R Shigetomi, A Otsuka, J Furukawa, K Martin, H Imai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2006
82006
Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model
ACA Nascimento, J Müller-Quade, A Otsuka, G Hanaoka, H Imai
International Conference on Applied Cryptography and Network Security, 355-368, 2004
82004
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20