BibTeX records: Akira Otsuka

download as .bib file

@article{DBLP:journals/access/OtsuboOM24,
  author       = {Yuhei Otsubo and
                  Akira Otsuka and
                  Mamoru Mimura},
  title        = {Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge
                  Mechanism},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {34477--34488},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3371499},
  doi          = {10.1109/ACCESS.2024.3371499},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/OtsuboOM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/MoriyamaO24,
  author       = {Koichi Moriyama and
                  Akira Otsuka},
  title        = {Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity
                  Utilizing Attested Execution Secure Processors},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {107},
  number       = {9},
  pages        = {1112--1122},
  year         = {2024},
  url          = {https://doi.org/10.1587/transinf.2023bci0001},
  doi          = {10.1587/TRANSINF.2023BCI0001},
  timestamp    = {Thu, 05 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/MoriyamaO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-01896,
  author       = {Hiroaki Maeshima and
                  Akira Otsuka},
  title        = {Robustness Bounds on the Successful Adversarial Examples: Theory and
                  Practice},
  journal      = {CoRR},
  volume       = {abs/2403.01896},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.01896},
  doi          = {10.48550/ARXIV.2403.01896},
  eprinttype    = {arXiv},
  eprint       = {2403.01896},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-01896.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ItoHO23,
  author       = {Norimitsu Ito and
                  Masaki Hashimoto and
                  Akira Otsuka},
  title        = {Feature Extraction Methods for Binary Code Similarity Detection Using
                  Neural Machine Translation Models},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {102796--102805},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3316215},
  doi          = {10.1109/ACCESS.2023.3316215},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ItoHO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HiguchiO23,
  author       = {Taishi Higuchi and
                  Akira Otsuka},
  editor       = {Aleksander Essex and
                  Shin'ichiro Matsuo and
                  Oksana Kulyk and
                  Lewis Gudgeon and
                  Ariah Klages{-}Mundt and
                  Daniel Perez and
                  Sam Werner and
                  Andrea Bracciali and
                  Geoff Goodell},
  title        = {Electronic Cash with Open-Source Observers},
  booktitle    = {Financial Cryptography and Data Security. {FC} 2023 International
                  Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia,
                  May 5, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13953},
  pages        = {286--302},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48806-1\_19},
  doi          = {10.1007/978-3-031-48806-1\_19},
  timestamp    = {Mon, 18 Dec 2023 16:44:30 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/HiguchiO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TakahashiHO22,
  author       = {Taisei Takahashi and
                  Taishi Higuchi and
                  Akira Otsuka},
  title        = {VeloCash: Anonymous Decentralized Probabilistic Micropayments With
                  Transferability},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {93701--93730},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3201071},
  doi          = {10.1109/ACCESS.2022.3201071},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TakahashiHO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/MasubuchiHO22,
  author       = {Yuma Masubuchi and
                  Masaki Hashimoto and
                  Akira Otsuka},
  title        = {{SIBYL:} {A} Method for Detecting Similar Binary Functions Using Machine
                  Learning},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {105-D},
  number       = {4},
  pages        = {755--765},
  year         = {2022},
  url          = {https://doi.org/10.1587/transinf.2021edp7135},
  doi          = {10.1587/TRANSINF.2021EDP7135},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/MasubuchiHO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/MoriyamaO22,
  author       = {Koichi Moriyama and
                  Akira Otsuka},
  title        = {Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity
                  Utilizing Attested Execution Secure Processors},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2022, Espoo,
                  Finland, August 22-25, 2022},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/Blockchain55522.2022.00012},
  doi          = {10.1109/BLOCKCHAIN55522.2022.00012},
  timestamp    = {Tue, 04 Oct 2022 22:39:15 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/MoriyamaO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-13110,
  author       = {Yuhei Otsubo and
                  Akira Otsuka and
                  Mamoru Mimura},
  title        = {Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge
                  Mechanism},
  journal      = {CoRR},
  volume       = {abs/2211.13110},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.13110},
  doi          = {10.48550/ARXIV.2211.13110},
  eprinttype    = {arXiv},
  eprint       = {2211.13110},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-13110.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NakataO21,
  author       = {Ryotaro Nakata and
                  Akira Otsuka},
  title        = {CyExec*: {A} High-Performance Container-Based Cyber Range With Scenario
                  Randomization},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {109095--109114},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3101245},
  doi          = {10.1109/ACCESS.2021.3101245},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NakataO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TakahashiO21,
  author       = {Taisei Takahashi and
                  Akira Otsuka},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Probabilistic Micropayments with Transferability},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {390--406},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_19},
  doi          = {10.1007/978-3-030-88418-5\_19},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TakahashiO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NakataO21,
  author       = {Ryotaro Nakata and
                  Akira Otsuka},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {CyExec*: Automatic Generation of Randomized Cyber Range Scenarios},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {226--236},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010324502260236},
  doi          = {10.5220/0010324502260236},
  timestamp    = {Tue, 02 Mar 2021 22:35:43 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NakataO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NakataO21a,
  author       = {Ryotaro Nakata and
                  Akira Otsuka},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Evaluation of Vulnerability Reproducibility in Container-based Cyber
                  Range},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {635--642},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010324606350642},
  doi          = {10.5220/0010324606350642},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NakataO21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakahashiO21,
  author       = {Taisei Takahashi and
                  Akira Otsuka},
  title        = {Probabilistic micropayments with transferability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1306},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1306},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakahashiO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MitaniO20,
  author       = {Tatsuo Mitani and
                  Akira Otsuka},
  title        = {Traceability in Permissioned Blockchain},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {21573--21588},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2969454},
  doi          = {10.1109/ACCESS.2020.2969454},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MitaniO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/OtsuboOMS20,
  author       = {Yuhei Otsubo and
                  Akira Otsuka and
                  Mamoru Mimura and
                  Takeshi Sakaki},
  title        = {o-glasses: Visualizing {X86} Code From Binary Using a 1D-CNN},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {31753--31763},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2972358},
  doi          = {10.1109/ACCESS.2020.2972358},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/OtsuboOMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MitaniO20,
  author       = {Tatsuo Mitani and
                  Akira Otsuka},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Confidential and Auditable Payments},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {466--480},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54455-3\_33},
  doi          = {10.1007/978-3-030-54455-3\_33},
  timestamp    = {Sun, 09 Aug 2020 16:11:05 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MitaniO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KadoguchiKHOH20,
  author       = {Masashi Kadoguchi and
                  Hanae Kobayashi and
                  Shota Hayashi and
                  Akira Otsuka and
                  Masaki Hashimoto},
  title        = {Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2020, Arlington, VA, USA, November 9-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISI49825.2020.9280485},
  doi          = {10.1109/ISI49825.2020.9280485},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KadoguchiKHOH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KobayashiKHOH20,
  author       = {Hanae Kobayashi and
                  Masashi Kadoguchi and
                  Shota Hayashi and
                  Akira Otsuka and
                  Masaki Hashimoto},
  title        = {An Expert System for Classifying Harmful Content on the Dark Web},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2020, Arlington, VA, USA, November 9-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISI49825.2020.9280536},
  doi          = {10.1109/ISI49825.2020.9280536},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KobayashiKHOH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-16024,
  author       = {Ryotaro Nakata and
                  Akira Otsuka},
  title        = {Evaluation of vulnerability reproducibility in container-based Cyber
                  Range},
  journal      = {CoRR},
  volume       = {abs/2010.16024},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.16024},
  eprinttype    = {arXiv},
  eprint       = {2010.16024},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-16024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MitaniO20,
  author       = {Tatsuo Mitani and
                  Akira Otsuka},
  title        = {Anonymous probabilistic payment in payment hub},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/748},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MitaniO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/MitaniO19,
  author       = {Tatsuo Mitani and
                  Akira Otsuka},
  title        = {Traceability in Permissioned Blockchain},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {286--293},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00045},
  doi          = {10.1109/BLOCKCHAIN.2019.00045},
  timestamp    = {Wed, 08 Jan 2020 16:20:56 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/MitaniO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TakahashiO19,
  author       = {Taisei Takahashi and
                  Akira Otsuka},
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Short Paper: Secure Offline Payments in Bitcoin},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  pages        = {12--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-43725-1\_2},
  doi          = {10.1007/978-3-030-43725-1\_2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/TakahashiO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KadoguchiHHO19,
  author       = {Masashi Kadoguchi and
                  Shota Hayashi and
                  Masaki Hashimoto and
                  Akira Otsuka},
  title        = {Exploring the Dark Web for Cyber Threat Intelligence using Machine
                  Leaning},
  booktitle    = {2019 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2019, Shenzhen, China, July 1-3, 2019},
  pages        = {200--202},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISI.2019.8823360},
  doi          = {10.1109/ISI.2019.8823360},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KadoguchiHHO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/UmayaharaSSKOT18,
  author       = {Yasutaka Umayahara and
                  Zu Soh and
                  Kiyokazu Sekikawa and
                  Toshihiro Kawae and
                  Akira Otsuka and
                  Toshio Tsuji},
  title        = {Estimation of Cough Peak Flow Using Cough Sounds},
  journal      = {Sensors},
  volume       = {18},
  number       = {7},
  pages        = {2381},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18072381},
  doi          = {10.3390/S18072381},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/UmayaharaSSKOT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/UmayaharaSSKOT18a,
  author       = {Yasutaka Umayahara and
                  Zu Soh and
                  Kiyokazu Sekikawa and
                  Toshihiro Kawae and
                  Akira Otsuka and
                  Toshio Tsuji},
  title        = {A Mobile Cough Strength Evaluation Device Using Cough Sounds},
  journal      = {Sensors},
  volume       = {18},
  number       = {11},
  pages        = {3810},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18113810},
  doi          = {10.3390/S18113810},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/UmayaharaSSKOT18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-05328,
  author       = {Yuhei Otsubo and
                  Akira Otsuka and
                  Mamoru Mimura and
                  Takeshi Sakaki and
                  Atsuhiro Goto},
  title        = {o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN},
  journal      = {CoRR},
  volume       = {abs/1806.05328},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.05328},
  eprinttype    = {arXiv},
  eprint       = {1806.05328},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-05328.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OhkiO17,
  author       = {Tetsushi Ohki and
                  Akira Otsuka},
  editor       = {Roger A. Hallman and
                  Kurt Rohloff and
                  Victor I. Chang},
  title        = {A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location
                  Data with Erasures},
  booktitle    = {Proceedings of the 2017 on Multimedia Privacy and Security, MPS@CCS
                  2017, Dallas, TX, USA, October 30, 2017},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3137616.3137620},
  doi          = {10.1145/3137616.3137620},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OhkiO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/OhkiO17,
  author       = {Tetsushi Ohki and
                  Akira Otsuka},
  title        = {Theoretical vulnerabilities in map speaker adaptation},
  booktitle    = {2017 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2017, New Orleans, LA, USA, March 5-9, 2017},
  pages        = {2042--2046},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICASSP.2017.7952515},
  doi          = {10.1109/ICASSP.2017.7952515},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/OhkiO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sii/UmayaharaSOMOT17,
  author       = {Yasutaka Umayahara and
                  Zu Soh and
                  T. Ozaki and
                  T. Murakami and
                  Akira Otsuka and
                  Toshio Tsuji},
  title        = {Ability to cough can be evaluated through cough sounds: An experimental
                  investigation of effects of microphone type on accuracy},
  booktitle    = {{IEEE/SICE} International Symposium on System Integration, {SII} 2017,
                  Taipei, Taiwan, December 11-14, 2017},
  pages        = {936--941},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SII.2017.8279343},
  doi          = {10.1109/SII.2017.8279343},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sii/UmayaharaSOMOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ar/TakakiSMTOC15,
  author       = {Takeshi Takaki and
                  Keisuke Shima and
                  Naohisa Mukaidani and
                  Toshio Tsuji and
                  Akira Otsuka and
                  Takaaki Chin},
  title        = {Electromyographic prosthetic hand using grasping-force-magnification
                  mechanism with five independently driven fingers},
  journal      = {Adv. Robotics},
  volume       = {29},
  number       = {24},
  pages        = {1586--1598},
  year         = {2015},
  url          = {https://doi.org/10.1080/01691864.2015.1079502},
  doi          = {10.1080/01691864.2015.1079502},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ar/TakakiSMTOC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TonicelliNDMIHO15,
  author       = {Rafael Tonicelli and
                  Anderson C. A. Nascimento and
                  Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Hideki Imai and
                  Goichiro Hanaoka and
                  Akira Otsuka},
  title        = {Information-theoretically secure oblivious polynomial evaluation in
                  the commodity-based model},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {73--84},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0247-8},
  doi          = {10.1007/S10207-014-0247-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/TonicelliNDMIHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/OhkiO14,
  author       = {Tetsushi Ohki and
                  Akira Otsuka},
  title        = {Theoretical vulnerability in likelihood-ratio-based biometric verification},
  booktitle    = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB}
                  2014, FL, USA, September 29 - October 2, 2014},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/BTAS.2014.6996247},
  doi          = {10.1109/BTAS.2014.6996247},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/OhkiO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/InumaOI13,
  author       = {Manabu Inuma and
                  Akira Otsuka and
                  Hideki Imai},
  title        = {A Theoretical Framework for Constructing Matching Algorithms Secure
                  against Wolf Attack},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {96-D},
  number       = {2},
  pages        = {357--364},
  year         = {2013},
  url          = {https://doi.org/10.1587/transinf.E96.D.357},
  doi          = {10.1587/TRANSINF.E96.D.357},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/InumaOI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbe/ShibanokiSTOC13,
  author       = {Taro Shibanoki and
                  Keisuke Shima and
                  Toshio Tsuji and
                  Akira Otsuka and
                  Takaaki Chin},
  title        = {A Quasi-Optimal Channel Selection Method for Bioelectric Signal Classification
                  Using a Partial Kullback-Leibler Information Measure},
  journal      = {{IEEE} Trans. Biomed. Eng.},
  volume       = {60},
  number       = {3},
  pages        = {853--861},
  year         = {2013},
  url          = {https://doi.org/10.1109/TBME.2012.2205990},
  doi          = {10.1109/TBME.2012.2205990},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbe/ShibanokiSTOC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biocas/NakamuraSSKHOHC13,
  author       = {Go Nakamura and
                  Taro Shibanoki and
                  Keisuke Shima and
                  Yuichi Kurita and
                  Masaki Hasegawa and
                  Akira Otsuka and
                  Yuichiro Honda and
                  Takaaki Chin and
                  Toshio Tsuji},
  title        = {A training system for the MyoBock hand in a virtual reality environment},
  booktitle    = {2013 {IEEE} Biomedical Circuits and Systems Conference (BioCAS), Rotterdam,
                  The Netherlands, October 31 - Nov. 2, 2013},
  pages        = {61--64},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/BioCAS.2013.6679640},
  doi          = {10.1109/BIOCAS.2013.6679640},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biocas/NakamuraSSKHOHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/btas/InumaO13,
  author       = {Manabu Inuma and
                  Akira Otsuka},
  title        = {Relations among security metrics for template protection algorithms},
  booktitle    = {{IEEE} Sixth International Conference on Biometrics: Theory, Applications
                  and Systems, {BTAS} 2013, Arlington, VA, USA, September 29 - October
                  2, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/BTAS.2013.6712714},
  doi          = {10.1109/BTAS.2013.6712714},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/btas/InumaO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/NagaiHYSOY12,
  author       = {Yukimasa Nagai and
                  Toshinori Hori and
                  Yosuke Yokoyama and
                  Naoki Shimizu and
                  Akira Otsuka and
                  Tetsuya Yokotani},
  title        = {Advanced wireless cooperation mechanisms for interference mitigation
                  in the 2.4 GHz {ISM} band},
  booktitle    = {2012 {IEEE} Consumer Communications and Networking Conference (CCNC),
                  Las Vegas, NV, USA, January 14-17, 2012},
  pages        = {364--365},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCNC.2012.6181124},
  doi          = {10.1109/CCNC.2012.6181124},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/NagaiHYSOY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1212-4195,
  author       = {Manabu Inuma and
                  Akira Otsuka},
  title        = {Relations among Security Metrics for Template Protection Algorithms},
  journal      = {CoRR},
  volume       = {abs/1212.4195},
  year         = {2012},
  url          = {http://arxiv.org/abs/1212.4195},
  eprinttype    = {arXiv},
  eprint       = {1212.4195},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1212-4195.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DowsleyMOHIN11,
  author       = {Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Akira Otsuka and
                  Goichiro Hanaoka and
                  Hideki Imai and
                  Anderson C. A. Nascimento},
  title        = {Universally Composable and Statistically Secure Verifiable Secret
                  Sharing Scheme Based on Pre-Distributed Data},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {2},
  pages        = {725--734},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.725},
  doi          = {10.1587/TRANSFUN.E94.A.725},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/DowsleyMOHIN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/InumaOIMT11,
  author       = {Manabu Inuma and
                  Akira Otsuka and
                  Yasushi Inatomi and
                  Atsushi Minemura and
                  Tatsuya Takehisa},
  title        = {{RFID} Tag Filtering Protocol},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2011, Kyoto, Japan, 5-9 June, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/icc.2011.5963182},
  doi          = {10.1109/ICC.2011.5963182},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/InumaOIMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/CallasNO11,
  author       = {Jon Callas and
                  Daniel Nagy and
                  Akira Otsuka},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Practical E-Cash},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {951--952},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_322},
  doi          = {10.1007/978-1-4419-5906-5\_322},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/CallasNO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceee/KangYIOI10,
  author       = {Hyunho Kang and
                  Shoko Yonezawa and
                  Manabu Inuma and
                  Akira Otsuka and
                  Hideki Imai},
  title        = {Wolf fingerprints against minutiae count matching systems},
  journal      = {{IEICE} Electron. Express},
  volume       = {7},
  number       = {10},
  pages        = {738--744},
  year         = {2010},
  url          = {https://doi.org/10.1587/elex.7.738},
  doi          = {10.1587/ELEX.7.738},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceee/KangYIOI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MuramatsuISO10,
  author       = {Daigo Muramatsu and
                  Manabu Inuma and
                  Junji Shikata and
                  Akira Otsuka},
  title        = {Enhanced Cancelable Biometrics for Online Signature Verification},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1254--1259},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1254},
  doi          = {10.1587/TRANSFUN.E93.A.1254},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MuramatsuISO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/OtsukaNM10,
  author       = {Akira Otsuka and
                  Keisuke Nakano and
                  Kazuyuki Miyakita},
  title        = {Theoretical Analysis of Mean Waiting Time for Message Delivery in
                  Lattice Ad Hoc Networks},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {19},
  number       = {8},
  pages        = {1711--1741},
  year         = {2010},
  url          = {https://doi.org/10.1142/S0218126610007006},
  doi          = {10.1142/S0218126610007006},
  timestamp    = {Thu, 26 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsc/OtsukaNM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MatsuoMOB10,
  author       = {Shin'ichiro Matsuo and
                  Kunihiko Miyazaki and
                  Akira Otsuka and
                  David A. Basin},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {How to Evaluate the Security of Real-Life Cryptographic Protocols?
                  - The Cases of {ISO/IEC} 29128 and {CRYPTREC}},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_16},
  doi          = {10.1007/978-3-642-14992-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MatsuoMOB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YoshidaCSSOI10,
  author       = {Rei Yoshida and
                  Yang Cui and
                  Tomohiro Sekino and
                  Rie Shigetomi and
                  Akira Otsuka and
                  Hideki Imai},
  title        = {Practical Searching over Encrypted Data by Private Information Retrieval},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5683316},
  doi          = {10.1109/GLOCOM.2010.5683316},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YoshidaCSSOI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/OtsukaI10,
  author       = {Akira Otsuka and
                  Hideki Imai},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Unconditionally Secure Electronic Voting},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_6},
  doi          = {10.1007/978-3-642-12980-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/OtsukaI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2010,
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1},
  doi          = {10.1007/978-3-642-17455-1},
  isbn         = {978-3-642-17454-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoMOSS09,
  author       = {Keisuke Nakano and
                  Kazuyuki Miyakita and
                  Akira Otsuka and
                  Masakazu Sengoku and
                  Shoji Shinoda},
  title        = {Analysis of Mean Waiting Time for Delivery of a Message in Mobile
                  Multi-Hop Networks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {9},
  pages        = {2236--2247},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.2236},
  doi          = {10.1587/TRANSFUN.E92.A.2236},
  timestamp    = {Thu, 26 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakanoMOSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cost/KojimaSIOI09,
  author       = {Yoshihiro Kojima and
                  Rie Shigetomi and
                  Manabu Inuma and
                  Akira Otsuka and
                  Hideki Imai},
  editor       = {Julian Fi{\'{e}}rrez{-}Aguilar and
                  Javier Ortega{-}Garcia and
                  Anna Esposito and
                  Andrzej Drygajlo and
                  Marcos Fa{\'{u}}ndez{-}Zanuy},
  title        = {A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication
                  Systems},
  booktitle    = {Biometric {ID} Management and Multimodal Communication, Joint {COST}
                  2101 and 2102 International Conference, BioID{\_}MultiComm 2009, Madrid,
                  Spain, September 16-18, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5707},
  pages        = {293--300},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04391-8\_38},
  doi          = {10.1007/978-3-642-04391-8\_38},
  timestamp    = {Sat, 09 Apr 2022 12:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/cost/KojimaSIOI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/InumaOI09,
  author       = {Manabu Inuma and
                  Akira Otsuka and
                  Hideki Imai},
  editor       = {Massimo Tistarelli and
                  Mark S. Nixon},
  title        = {Theoretical Framework for Constructing Matching Algorithms in Biometric
                  Authentication Systems},
  booktitle    = {Advances in Biometrics, Third International Conference, {ICB} 2009,
                  Alghero, Italy, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5558},
  pages        = {806--815},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01793-3\_82},
  doi          = {10.1007/978-3-642-01793-3\_82},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/InumaOI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/LeeOYSOI09,
  author       = {Gyesik Lee and
                  Hisashi Oguma and
                  Akira Yoshioka and
                  Rie Shigetomi and
                  Akira Otsuka and
                  Hideki Imai},
  title        = {Formally verifiable features in embedded vehicular security systems},
  booktitle    = {{IEEE} Vehicular Networking Conference, {VNC} 2009, Tokyo, Japan,
                  October 28-30, 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/VNC.2009.5416378},
  doi          = {10.1109/VNC.2009.5416378},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/LeeOYSOI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2009,
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6},
  doi          = {10.1007/978-3-642-10433-6},
  isbn         = {978-3-642-10432-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0904-1284,
  author       = {Manabu Inuma and
                  Akira Otsuka and
                  Hideki Imai},
  title        = {Theoretical framework for constructing matching algorithms in biometric
                  authentication systems},
  journal      = {CoRR},
  volume       = {abs/0904.1284},
  year         = {2009},
  url          = {http://arxiv.org/abs/0904.1284},
  eprinttype    = {arXiv},
  eprint       = {0904.1284},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0904-1284.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TonicelliDHIMON09,
  author       = {Rafael Tonicelli and
                  Rafael Dowsley and
                  Goichiro Hanaoka and
                  Hideki Imai and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Akira Otsuka and
                  Anderson C. A. Nascimento},
  title        = {Information-Theoretically Secure Oblivious Polynomial Evaluation in
                  the Commodity-Based Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {270},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/270},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TonicelliDHIMON09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyMOHIN09,
  author       = {Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Akira Otsuka and
                  Goichiro Hanaoka and
                  Hideki Imai and
                  Anderson C. A. Nascimento},
  title        = {Universally Composable and Statistically Secure Verifiable Secret
                  Sharing Scheme Based on Pre-Distributed Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DowsleyMOHIN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/UneOI08,
  author       = {Masashi Une and
                  Akira Otsuka and
                  Hideki Imai},
  title        = {Wolf Attack Probability: {A} Theoretical Security Measure in Biometric
                  Authentication Systems},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {5},
  pages        = {1380--1389},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.5.1380},
  doi          = {10.1093/IETISY/E91-D.5.1380},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/UneOI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CallasDNOQY08,
  author       = {Jon Callas and
                  Yvo Desmedt and
                  Daniel Nagy and
                  Akira Otsuka and
                  Jean{-}Jacques Quisquater and
                  Moti Yung},
  editor       = {Gene Tsudik},
  title        = {Real Electronic Cash Versus Academic Electronic Cash Versus Paper
                  Cash (Panel Report)},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {307--313},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_28},
  doi          = {10.1007/978-3-540-85230-8\_28},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CallasDNOQY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/OgumaYNSOI08,
  author       = {Hisashi Oguma and
                  Akira Yoshioka and
                  Makoto Nishikawa and
                  Rie Shigetomi and
                  Akira Otsuka and
                  Hideki Imai},
  title        = {New Attestation Based Security Architecture for In-Vehicle Communication},
  booktitle    = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
                  2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages        = {1909--1914},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/GLOCOM.2008.ECP.369},
  doi          = {10.1109/GLOCOM.2008.ECP.369},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/OgumaYNSOI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/robio/AkdoganSKHOT08,
  author       = {Erhan Akdogan and
                  Keisuke Shima and
                  Hitoshi Kataoka and
                  Masaki Hasegawa and
                  Akira Otsuka and
                  Toshio Tsuji},
  title        = {The Cybernetic Rehabilitation Aid: {A} novel concept for direct rehabilitation},
  booktitle    = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO}
                  2008, February 22-25, 2009, Bangkok, Thailand},
  pages        = {852--858},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ROBIO.2009.4913111},
  doi          = {10.1109/ROBIO.2009.4913111},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/robio/AkdoganSKHOT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/UneOI07,
  author       = {Masashi Une and
                  Akira Otsuka and
                  Hideki Imai},
  editor       = {Seong{-}Whan Lee and
                  Stan Z. Li},
  title        = {Wolf Attack Probability: {A} New Security Measure in Biometric Authentication
                  Systems},
  booktitle    = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul,
                  Korea, August 27-29, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4642},
  pages        = {396--406},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74549-5\_42},
  doi          = {10.1007/978-3-540-74549-5\_42},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/UneOI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/YoshidaSYOI07,
  author       = {Rei Yoshida and
                  Rie Shigetomi and
                  Kazuki Yoshizoe and
                  Akira Otsuka and
                  Hideki Imai},
  editor       = {Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christopher Wolf},
  title        = {A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent
                  Services},
  booktitle    = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
                  Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4945},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88353-1\_1},
  doi          = {10.1007/978-3-540-88353-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/YoshidaSYOI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShigetomiOFMI06,
  author       = {Rie Shigetomi and
                  Akira Otsuka and
                  Jun Furukawa and
                  Keith Martin and
                  Hideki Imai},
  title        = {A Provably Secure Refreshable Partially Anonymous Token and Its Applications},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {5},
  pages        = {1396--1406},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.5.1396},
  doi          = {10.1093/IETFEC/E89-A.5.1396},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShigetomiOFMI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/OtsukaSI06,
  author       = {Akira Otsuka and
                  Rie Shigetomi and
                  Hideki Imai},
  title        = {Lightweight Privacy for Ubiquitous Devices},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Taipei, Taiwan, October 8-11, 2006},
  pages        = {1233--1237},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICSMC.2006.384883},
  doi          = {10.1109/ICSMC.2006.384883},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/OtsukaSI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanaokaIMNOW04,
  author       = {Goichiro Hanaoka and
                  Hideki Imai and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento and
                  Akira Otsuka and
                  Andreas J. Winter},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Information Theoretically Secure Oblivious Polynomial Evaluation:
                  Model, Bounds, and Constructions},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {62--73},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_6},
  doi          = {10.1007/978-3-540-27800-9\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanaokaIMNOW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NascimentoMOHI04,
  author       = {Anderson C. A. Nascimento and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Akira Otsuka and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Unconditionally Non-interactive Verifiable Secret Sharing Secure against
                  Faulty Majorities in the Commodity Based Model},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {355--368},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_26},
  doi          = {10.1007/978-3-540-24852-1\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NascimentoMOHI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/trob/FukudaTKO03,
  author       = {Osamu Fukuda and
                  Toshio Tsuji and
                  Makoto Kaneko and
                  Akira Otsuka},
  title        = {A human-assisting manipulator teleoperated by {EMG} signals and arm
                  motions},
  journal      = {{IEEE} Trans. Robotics Autom.},
  volume       = {19},
  number       = {2},
  pages        = {210--222},
  year         = {2003},
  url          = {https://doi.org/10.1109/TRA.2003.808873},
  doi          = {10.1109/TRA.2003.808873},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/trob/FukudaTKO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/NascimentoOIM03,
  author       = {Anderson C. A. Nascimento and
                  Akira Otsuka and
                  Hideki Imai and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Marc P. C. Fossorier and
                  Tom H{\o}holdt and
                  Alain Poli},
  title        = {Unconditionally Secure Homomorphic Pre-distributed Commitments},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  15th International Symposium, AAECC-15, Toulouse, France, May 12-16,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2643},
  pages        = {87--97},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44828-4\_11},
  doi          = {10.1007/3-540-44828-4\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/NascimentoOIM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NascimentoMOHI03,
  author       = {Anderson C. A. Nascimento and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Akira Otsuka and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Unconditionally Secure Homomorphic Pre-distributed Bit Commitment
                  and Secure Two-Party Computations},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {151--164},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_12},
  doi          = {10.1007/10958513\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/NascimentoMOHI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xmlsec/ShigetomiOI03,
  author       = {Rie Shigetomi and
                  Akira Otsuka and
                  Hideki Imai},
  editor       = {Sushil Jajodia and
                  Michiharu Kudo},
  title        = {Anonymous authentication scheme for {XML} security standard with Refreshable
                  Tokens},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on {XML} Security, Fairfax,
                  VA, USA, October 31, 2003},
  pages        = {86--93},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/968559.968573},
  doi          = {10.1145/968559.968573},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/xmlsec/ShigetomiOI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OtsukaHSI02,
  author       = {Akira Otsuka and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  title        = {An Unconditionally Secure Electronic Cash Scheme with Computational
                  Untraceability},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {85-A},
  number       = {1},
  pages        = {140--148},
  year         = {2002},
  url          = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_140},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OtsukaHSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ShigetomiOOI02,
  author       = {Rie Shigetomi and
                  Akira Otsuka and
                  Takahide Ogawa and
                  Hideki Imai},
  editor       = {Agnes Hui Chan and
                  Virgil D. Gligor},
  title        = {An Anonymous Loan System Based on Group Signature Scheme},
  booktitle    = {Information Security, 5th International Conference, {ISC} 2002 Sao
                  Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2433},
  pages        = {244--256},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45811-5\_19},
  doi          = {10.1007/3-540-45811-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ShigetomiOOI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/ImaiHSON02,
  author       = {Hideki Imai and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Akira Otsuka and
                  Anderson C. A. Nascimento},
  title        = {Cryptography with information theoretic security},
  booktitle    = {Proceedings of the 2002 {IEEE} Information Theory Workshop, {ITW}
                  2002, 20-25 October 2002, Bangalore, India},
  pages        = {73},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ITW.2002.1115419},
  doi          = {10.1109/ITW.2002.1115419},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/ImaiHSON02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/FukudaTOK99,
  author       = {Osamu Fukuda and
                  Toshio Tsuji and
                  Akira Otsuka and
                  Makoto Kaneko},
  editor       = {Lakhmi C. Jain},
  title        = {A human supporting manipulator using neural network and its clinical
                  application for forearm amputation},
  booktitle    = {Third International Conference on Knowledge-Based Intelligent Information
                  Engineering Systems, {KES} 1999, Adelaide, South Australia, 31 August
                  - 1 September 1999, Proceedings},
  pages        = {129--134},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/KES.1999.820137},
  doi          = {10.1109/KES.1999.820137},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/FukudaTOK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/FukudaTOK98,
  author       = {Osamu Fukuda and
                  Toshio Tsuji and
                  Akira Otsuka and
                  Makoto Kaneko},
  title        = {EMG-based Human-Robot Interface for Rehabilitation Aid},
  booktitle    = {Proceedings of the {IEEE} International Conference on Robotics and
                  Automation, ICRA-98, Leuven, Belgium, May 16-20, 1998},
  pages        = {3492--3497},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ROBOT.1998.680978},
  doi          = {10.1109/ROBOT.1998.680978},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icra/FukudaTOK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}