default search action
BibTeX records: Akira Otsuka
@article{DBLP:journals/access/OtsuboOM24, author = {Yuhei Otsubo and Akira Otsuka and Mamoru Mimura}, title = {Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism}, journal = {{IEEE} Access}, volume = {12}, pages = {34477--34488}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3371499}, doi = {10.1109/ACCESS.2024.3371499}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/OtsuboOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/MoriyamaO24, author = {Koichi Moriyama and Akira Otsuka}, title = {Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {107}, number = {9}, pages = {1112--1122}, year = {2024}, url = {https://doi.org/10.1587/transinf.2023bci0001}, doi = {10.1587/TRANSINF.2023BCI0001}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/MoriyamaO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-01896, author = {Hiroaki Maeshima and Akira Otsuka}, title = {Robustness Bounds on the Successful Adversarial Examples: Theory and Practice}, journal = {CoRR}, volume = {abs/2403.01896}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.01896}, doi = {10.48550/ARXIV.2403.01896}, eprinttype = {arXiv}, eprint = {2403.01896}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-01896.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ItoHO23, author = {Norimitsu Ito and Masaki Hashimoto and Akira Otsuka}, title = {Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models}, journal = {{IEEE} Access}, volume = {11}, pages = {102796--102805}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3316215}, doi = {10.1109/ACCESS.2023.3316215}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ItoHO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HiguchiO23, author = {Taishi Higuchi and Akira Otsuka}, editor = {Aleksander Essex and Shin'ichiro Matsuo and Oksana Kulyk and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez and Sam Werner and Andrea Bracciali and Geoff Goodell}, title = {Electronic Cash with Open-Source Observers}, booktitle = {Financial Cryptography and Data Security. {FC} 2023 International Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia, May 5, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13953}, pages = {286--302}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48806-1\_19}, doi = {10.1007/978-3-031-48806-1\_19}, timestamp = {Mon, 18 Dec 2023 16:44:30 +0100}, biburl = {https://dblp.org/rec/conf/fc/HiguchiO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TakahashiHO22, author = {Taisei Takahashi and Taishi Higuchi and Akira Otsuka}, title = {VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability}, journal = {{IEEE} Access}, volume = {10}, pages = {93701--93730}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3201071}, doi = {10.1109/ACCESS.2022.3201071}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TakahashiHO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/MasubuchiHO22, author = {Yuma Masubuchi and Masaki Hashimoto and Akira Otsuka}, title = {{SIBYL:} {A} Method for Detecting Similar Binary Functions Using Machine Learning}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {105-D}, number = {4}, pages = {755--765}, year = {2022}, url = {https://doi.org/10.1587/transinf.2021edp7135}, doi = {10.1587/TRANSINF.2021EDP7135}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/MasubuchiHO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/MoriyamaO22, author = {Koichi Moriyama and Akira Otsuka}, title = {Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2022, Espoo, Finland, August 22-25, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/Blockchain55522.2022.00012}, doi = {10.1109/BLOCKCHAIN55522.2022.00012}, timestamp = {Tue, 04 Oct 2022 22:39:15 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/MoriyamaO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-13110, author = {Yuhei Otsubo and Akira Otsuka and Mamoru Mimura}, title = {Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism}, journal = {CoRR}, volume = {abs/2211.13110}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.13110}, doi = {10.48550/ARXIV.2211.13110}, eprinttype = {arXiv}, eprint = {2211.13110}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-13110.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NakataO21, author = {Ryotaro Nakata and Akira Otsuka}, title = {CyExec*: {A} High-Performance Container-Based Cyber Range With Scenario Randomization}, journal = {{IEEE} Access}, volume = {9}, pages = {109095--109114}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3101245}, doi = {10.1109/ACCESS.2021.3101245}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NakataO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TakahashiO21, author = {Taisei Takahashi and Akira Otsuka}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Probabilistic Micropayments with Transferability}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {390--406}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_19}, doi = {10.1007/978-3-030-88418-5\_19}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TakahashiO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakataO21, author = {Ryotaro Nakata and Akira Otsuka}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {CyExec*: Automatic Generation of Randomized Cyber Range Scenarios}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {226--236}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010324502260236}, doi = {10.5220/0010324502260236}, timestamp = {Tue, 02 Mar 2021 22:35:43 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakataO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakataO21a, author = {Ryotaro Nakata and Akira Otsuka}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Evaluation of Vulnerability Reproducibility in Container-based Cyber Range}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {635--642}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010324606350642}, doi = {10.5220/0010324606350642}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakataO21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakahashiO21, author = {Taisei Takahashi and Akira Otsuka}, title = {Probabilistic micropayments with transferability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1306}, year = {2021}, url = {https://eprint.iacr.org/2021/1306}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakahashiO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MitaniO20, author = {Tatsuo Mitani and Akira Otsuka}, title = {Traceability in Permissioned Blockchain}, journal = {{IEEE} Access}, volume = {8}, pages = {21573--21588}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2969454}, doi = {10.1109/ACCESS.2020.2969454}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MitaniO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/OtsuboOMS20, author = {Yuhei Otsubo and Akira Otsuka and Mamoru Mimura and Takeshi Sakaki}, title = {o-glasses: Visualizing {X86} Code From Binary Using a 1D-CNN}, journal = {{IEEE} Access}, volume = {8}, pages = {31753--31763}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2972358}, doi = {10.1109/ACCESS.2020.2972358}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/OtsuboOMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MitaniO20, author = {Tatsuo Mitani and Akira Otsuka}, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Confidential and Auditable Payments}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {466--480}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3\_33}, doi = {10.1007/978-3-030-54455-3\_33}, timestamp = {Sun, 09 Aug 2020 16:11:05 +0200}, biburl = {https://dblp.org/rec/conf/fc/MitaniO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KadoguchiKHOH20, author = {Masashi Kadoguchi and Hanae Kobayashi and Shota Hayashi and Akira Otsuka and Masaki Hashimoto}, title = {Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2020, Arlington, VA, USA, November 9-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISI49825.2020.9280485}, doi = {10.1109/ISI49825.2020.9280485}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/KadoguchiKHOH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KobayashiKHOH20, author = {Hanae Kobayashi and Masashi Kadoguchi and Shota Hayashi and Akira Otsuka and Masaki Hashimoto}, title = {An Expert System for Classifying Harmful Content on the Dark Web}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2020, Arlington, VA, USA, November 9-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISI49825.2020.9280536}, doi = {10.1109/ISI49825.2020.9280536}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/KobayashiKHOH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-16024, author = {Ryotaro Nakata and Akira Otsuka}, title = {Evaluation of vulnerability reproducibility in container-based Cyber Range}, journal = {CoRR}, volume = {abs/2010.16024}, year = {2020}, url = {https://arxiv.org/abs/2010.16024}, eprinttype = {arXiv}, eprint = {2010.16024}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-16024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MitaniO20, author = {Tatsuo Mitani and Akira Otsuka}, title = {Anonymous probabilistic payment in payment hub}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2020}, url = {https://eprint.iacr.org/2020/748}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MitaniO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/MitaniO19, author = {Tatsuo Mitani and Akira Otsuka}, title = {Traceability in Permissioned Blockchain}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {286--293}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00045}, doi = {10.1109/BLOCKCHAIN.2019.00045}, timestamp = {Wed, 08 Jan 2020 16:20:56 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/MitaniO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TakahashiO19, author = {Taisei Takahashi and Akira Otsuka}, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Short Paper: Secure Offline Payments in Bitcoin}, booktitle = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, pages = {12--20}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-43725-1\_2}, doi = {10.1007/978-3-030-43725-1\_2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/TakahashiO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KadoguchiHHO19, author = {Masashi Kadoguchi and Shota Hayashi and Masaki Hashimoto and Akira Otsuka}, title = {Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning}, booktitle = {2019 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2019, Shenzhen, China, July 1-3, 2019}, pages = {200--202}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISI.2019.8823360}, doi = {10.1109/ISI.2019.8823360}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/KadoguchiHHO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/UmayaharaSSKOT18, author = {Yasutaka Umayahara and Zu Soh and Kiyokazu Sekikawa and Toshihiro Kawae and Akira Otsuka and Toshio Tsuji}, title = {Estimation of Cough Peak Flow Using Cough Sounds}, journal = {Sensors}, volume = {18}, number = {7}, pages = {2381}, year = {2018}, url = {https://doi.org/10.3390/s18072381}, doi = {10.3390/S18072381}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/UmayaharaSSKOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/UmayaharaSSKOT18a, author = {Yasutaka Umayahara and Zu Soh and Kiyokazu Sekikawa and Toshihiro Kawae and Akira Otsuka and Toshio Tsuji}, title = {A Mobile Cough Strength Evaluation Device Using Cough Sounds}, journal = {Sensors}, volume = {18}, number = {11}, pages = {3810}, year = {2018}, url = {https://doi.org/10.3390/s18113810}, doi = {10.3390/S18113810}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/UmayaharaSSKOT18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-05328, author = {Yuhei Otsubo and Akira Otsuka and Mamoru Mimura and Takeshi Sakaki and Atsuhiro Goto}, title = {o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN}, journal = {CoRR}, volume = {abs/1806.05328}, year = {2018}, url = {http://arxiv.org/abs/1806.05328}, eprinttype = {arXiv}, eprint = {1806.05328}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-05328.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OhkiO17, author = {Tetsushi Ohki and Akira Otsuka}, editor = {Roger A. Hallman and Kurt Rohloff and Victor I. Chang}, title = {A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures}, booktitle = {Proceedings of the 2017 on Multimedia Privacy and Security, MPS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {13--18}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3137616.3137620}, doi = {10.1145/3137616.3137620}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OhkiO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/OhkiO17, author = {Tetsushi Ohki and Akira Otsuka}, title = {Theoretical vulnerabilities in map speaker adaptation}, booktitle = {2017 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2017, New Orleans, LA, USA, March 5-9, 2017}, pages = {2042--2046}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICASSP.2017.7952515}, doi = {10.1109/ICASSP.2017.7952515}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icassp/OhkiO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sii/UmayaharaSOMOT17, author = {Yasutaka Umayahara and Zu Soh and T. Ozaki and T. Murakami and Akira Otsuka and Toshio Tsuji}, title = {Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy}, booktitle = {{IEEE/SICE} International Symposium on System Integration, {SII} 2017, Taipei, Taiwan, December 11-14, 2017}, pages = {936--941}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SII.2017.8279343}, doi = {10.1109/SII.2017.8279343}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sii/UmayaharaSOMOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ar/TakakiSMTOC15, author = {Takeshi Takaki and Keisuke Shima and Naohisa Mukaidani and Toshio Tsuji and Akira Otsuka and Takaaki Chin}, title = {Electromyographic prosthetic hand using grasping-force-magnification mechanism with five independently driven fingers}, journal = {Adv. Robotics}, volume = {29}, number = {24}, pages = {1586--1598}, year = {2015}, url = {https://doi.org/10.1080/01691864.2015.1079502}, doi = {10.1080/01691864.2015.1079502}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ar/TakakiSMTOC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TonicelliNDMIHO15, author = {Rafael Tonicelli and Anderson C. A. Nascimento and Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Hideki Imai and Goichiro Hanaoka and Akira Otsuka}, title = {Information-theoretically secure oblivious polynomial evaluation in the commodity-based model}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {73--84}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0247-8}, doi = {10.1007/S10207-014-0247-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TonicelliNDMIHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/OhkiO14, author = {Tetsushi Ohki and Akira Otsuka}, title = {Theoretical vulnerability in likelihood-ratio-based biometric verification}, booktitle = {{IEEE} International Joint Conference on Biometrics, Clearwater, {IJCB} 2014, FL, USA, September 29 - October 2, 2014}, pages = {1--8}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/BTAS.2014.6996247}, doi = {10.1109/BTAS.2014.6996247}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icb/OhkiO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/InumaOI13, author = {Manabu Inuma and Akira Otsuka and Hideki Imai}, title = {A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {96-D}, number = {2}, pages = {357--364}, year = {2013}, url = {https://doi.org/10.1587/transinf.E96.D.357}, doi = {10.1587/TRANSINF.E96.D.357}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/InumaOI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbe/ShibanokiSTOC13, author = {Taro Shibanoki and Keisuke Shima and Toshio Tsuji and Akira Otsuka and Takaaki Chin}, title = {A Quasi-Optimal Channel Selection Method for Bioelectric Signal Classification Using a Partial Kullback-Leibler Information Measure}, journal = {{IEEE} Trans. Biomed. Eng.}, volume = {60}, number = {3}, pages = {853--861}, year = {2013}, url = {https://doi.org/10.1109/TBME.2012.2205990}, doi = {10.1109/TBME.2012.2205990}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbe/ShibanokiSTOC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biocas/NakamuraSSKHOHC13, author = {Go Nakamura and Taro Shibanoki and Keisuke Shima and Yuichi Kurita and Masaki Hasegawa and Akira Otsuka and Yuichiro Honda and Takaaki Chin and Toshio Tsuji}, title = {A training system for the MyoBock hand in a virtual reality environment}, booktitle = {2013 {IEEE} Biomedical Circuits and Systems Conference (BioCAS), Rotterdam, The Netherlands, October 31 - Nov. 2, 2013}, pages = {61--64}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/BioCAS.2013.6679640}, doi = {10.1109/BIOCAS.2013.6679640}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biocas/NakamuraSSKHOHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/btas/InumaO13, author = {Manabu Inuma and Akira Otsuka}, title = {Relations among security metrics for template protection algorithms}, booktitle = {{IEEE} Sixth International Conference on Biometrics: Theory, Applications and Systems, {BTAS} 2013, Arlington, VA, USA, September 29 - October 2, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/BTAS.2013.6712714}, doi = {10.1109/BTAS.2013.6712714}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/btas/InumaO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/NagaiHYSOY12, author = {Yukimasa Nagai and Toshinori Hori and Yosuke Yokoyama and Naoki Shimizu and Akira Otsuka and Tetsuya Yokotani}, title = {Advanced wireless cooperation mechanisms for interference mitigation in the 2.4 GHz {ISM} band}, booktitle = {2012 {IEEE} Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, January 14-17, 2012}, pages = {364--365}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCNC.2012.6181124}, doi = {10.1109/CCNC.2012.6181124}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/NagaiHYSOY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1212-4195, author = {Manabu Inuma and Akira Otsuka}, title = {Relations among Security Metrics for Template Protection Algorithms}, journal = {CoRR}, volume = {abs/1212.4195}, year = {2012}, url = {http://arxiv.org/abs/1212.4195}, eprinttype = {arXiv}, eprint = {1212.4195}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1212-4195.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DowsleyMOHIN11, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, title = {Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {2}, pages = {725--734}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.725}, doi = {10.1587/TRANSFUN.E94.A.725}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DowsleyMOHIN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/InumaOIMT11, author = {Manabu Inuma and Akira Otsuka and Yasushi Inatomi and Atsushi Minemura and Tatsuya Takehisa}, title = {{RFID} Tag Filtering Protocol}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2011, Kyoto, Japan, 5-9 June, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/icc.2011.5963182}, doi = {10.1109/ICC.2011.5963182}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/InumaOIMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/CallasNO11, author = {Jon Callas and Daniel Nagy and Akira Otsuka}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Practical E-Cash}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {951--952}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_322}, doi = {10.1007/978-1-4419-5906-5\_322}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/CallasNO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceee/KangYIOI10, author = {Hyunho Kang and Shoko Yonezawa and Manabu Inuma and Akira Otsuka and Hideki Imai}, title = {Wolf fingerprints against minutiae count matching systems}, journal = {{IEICE} Electron. Express}, volume = {7}, number = {10}, pages = {738--744}, year = {2010}, url = {https://doi.org/10.1587/elex.7.738}, doi = {10.1587/ELEX.7.738}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceee/KangYIOI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MuramatsuISO10, author = {Daigo Muramatsu and Manabu Inuma and Junji Shikata and Akira Otsuka}, title = {Enhanced Cancelable Biometrics for Online Signature Verification}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {6}, pages = {1254--1259}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1254}, doi = {10.1587/TRANSFUN.E93.A.1254}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MuramatsuISO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/OtsukaNM10, author = {Akira Otsuka and Keisuke Nakano and Kazuyuki Miyakita}, title = {Theoretical Analysis of Mean Waiting Time for Message Delivery in Lattice Ad Hoc Networks}, journal = {J. Circuits Syst. Comput.}, volume = {19}, number = {8}, pages = {1711--1741}, year = {2010}, url = {https://doi.org/10.1142/S0218126610007006}, doi = {10.1142/S0218126610007006}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsc/OtsukaNM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MatsuoMOB10, author = {Shin'ichiro Matsuo and Kunihiko Miyazaki and Akira Otsuka and David A. Basin}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of {ISO/IEC} 29128 and {CRYPTREC}}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {182--194}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_16}, doi = {10.1007/978-3-642-14992-4\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MatsuoMOB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YoshidaCSSOI10, author = {Rei Yoshida and Yang Cui and Tomohiro Sekino and Rie Shigetomi and Akira Otsuka and Hideki Imai}, title = {Practical Searching over Encrypted Data by Private Information Retrieval}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5683316}, doi = {10.1109/GLOCOM.2010.5683316}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YoshidaCSSOI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/OtsukaI10, author = {Akira Otsuka and Hideki Imai}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Unconditionally Secure Electronic Voting}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {107--123}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_6}, doi = {10.1007/978-3-642-12980-3\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/OtsukaI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2010, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1}, doi = {10.1007/978-3-642-17455-1}, isbn = {978-3-642-17454-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakanoMOSS09, author = {Keisuke Nakano and Kazuyuki Miyakita and Akira Otsuka and Masakazu Sengoku and Shoji Shinoda}, title = {Analysis of Mean Waiting Time for Delivery of a Message in Mobile Multi-Hop Networks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {9}, pages = {2236--2247}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.2236}, doi = {10.1587/TRANSFUN.E92.A.2236}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoMOSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cost/KojimaSIOI09, author = {Yoshihiro Kojima and Rie Shigetomi and Manabu Inuma and Akira Otsuka and Hideki Imai}, editor = {Julian Fi{\'{e}}rrez{-}Aguilar and Javier Ortega{-}Garcia and Anna Esposito and Andrzej Drygajlo and Marcos Fa{\'{u}}ndez{-}Zanuy}, title = {A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems}, booktitle = {Biometric {ID} Management and Multimodal Communication, Joint {COST} 2101 and 2102 International Conference, BioID{\_}MultiComm 2009, Madrid, Spain, September 16-18, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5707}, pages = {293--300}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04391-8\_38}, doi = {10.1007/978-3-642-04391-8\_38}, timestamp = {Sat, 09 Apr 2022 12:41:06 +0200}, biburl = {https://dblp.org/rec/conf/cost/KojimaSIOI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/InumaOI09, author = {Manabu Inuma and Akira Otsuka and Hideki Imai}, editor = {Massimo Tistarelli and Mark S. Nixon}, title = {Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems}, booktitle = {Advances in Biometrics, Third International Conference, {ICB} 2009, Alghero, Italy, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5558}, pages = {806--815}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01793-3\_82}, doi = {10.1007/978-3-642-01793-3\_82}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/icb/InumaOI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vnc/LeeOYSOI09, author = {Gyesik Lee and Hisashi Oguma and Akira Yoshioka and Rie Shigetomi and Akira Otsuka and Hideki Imai}, title = {Formally verifiable features in embedded vehicular security systems}, booktitle = {{IEEE} Vehicular Networking Conference, {VNC} 2009, Tokyo, Japan, October 28-30, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/VNC.2009.5416378}, doi = {10.1109/VNC.2009.5416378}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/vnc/LeeOYSOI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2009, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6}, doi = {10.1007/978-3-642-10433-6}, isbn = {978-3-642-10432-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0904-1284, author = {Manabu Inuma and Akira Otsuka and Hideki Imai}, title = {Theoretical framework for constructing matching algorithms in biometric authentication systems}, journal = {CoRR}, volume = {abs/0904.1284}, year = {2009}, url = {http://arxiv.org/abs/0904.1284}, eprinttype = {arXiv}, eprint = {0904.1284}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0904-1284.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TonicelliDHIMON09, author = {Rafael Tonicelli and Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Anderson C. A. Nascimento}, title = {Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2009}, url = {http://eprint.iacr.org/2009/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TonicelliDHIMON09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DowsleyMOHIN09, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, title = {Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2009}, url = {http://eprint.iacr.org/2009/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyMOHIN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/UneOI08, author = {Masashi Une and Akira Otsuka and Hideki Imai}, title = {Wolf Attack Probability: {A} Theoretical Security Measure in Biometric Authentication Systems}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {5}, pages = {1380--1389}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.5.1380}, doi = {10.1093/IETISY/E91-D.5.1380}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/UneOI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CallasDNOQY08, author = {Jon Callas and Yvo Desmedt and Daniel Nagy and Akira Otsuka and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Gene Tsudik}, title = {Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {307--313}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_28}, doi = {10.1007/978-3-540-85230-8\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/CallasDNOQY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/OgumaYNSOI08, author = {Hisashi Oguma and Akira Yoshioka and Makoto Nishikawa and Rie Shigetomi and Akira Otsuka and Hideki Imai}, title = {New Attestation Based Security Architecture for In-Vehicle Communication}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {1909--1914}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.369}, doi = {10.1109/GLOCOM.2008.ECP.369}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/OgumaYNSOI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/robio/AkdoganSKHOT08, author = {Erhan Akdogan and Keisuke Shima and Hitoshi Kataoka and Masaki Hasegawa and Akira Otsuka and Toshio Tsuji}, title = {The Cybernetic Rehabilitation Aid: {A} novel concept for direct rehabilitation}, booktitle = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO} 2008, February 22-25, 2009, Bangkok, Thailand}, pages = {852--858}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ROBIO.2009.4913111}, doi = {10.1109/ROBIO.2009.4913111}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/robio/AkdoganSKHOT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/UneOI07, author = {Masashi Une and Akira Otsuka and Hideki Imai}, editor = {Seong{-}Whan Lee and Stan Z. Li}, title = {Wolf Attack Probability: {A} New Security Measure in Biometric Authentication Systems}, booktitle = {Advances in Biometrics, International Conference, {ICB} 2007, Seoul, Korea, August 27-29, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4642}, pages = {396--406}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74549-5\_42}, doi = {10.1007/978-3-540-74549-5\_42}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/icb/UneOI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/YoshidaSYOI07, author = {Rei Yoshida and Rie Shigetomi and Kazuki Yoshizoe and Akira Otsuka and Hideki Imai}, editor = {Stefan Lucks and Ahmad{-}Reza Sadeghi and Christopher Wolf}, title = {A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services}, booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4945}, pages = {1--12}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88353-1\_1}, doi = {10.1007/978-3-540-88353-1\_1}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/weworc/YoshidaSYOI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShigetomiOFMI06, author = {Rie Shigetomi and Akira Otsuka and Jun Furukawa and Keith Martin and Hideki Imai}, title = {A Provably Secure Refreshable Partially Anonymous Token and Its Applications}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {5}, pages = {1396--1406}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.5.1396}, doi = {10.1093/IETFEC/E89-A.5.1396}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShigetomiOFMI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/OtsukaSI06, author = {Akira Otsuka and Rie Shigetomi and Hideki Imai}, title = {Lightweight Privacy for Ubiquitous Devices}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Taipei, Taiwan, October 8-11, 2006}, pages = {1233--1237}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICSMC.2006.384883}, doi = {10.1109/ICSMC.2006.384883}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/OtsukaSI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanaokaIMNOW04, author = {Goichiro Hanaoka and Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento and Akira Otsuka and Andreas J. Winter}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {62--73}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_6}, doi = {10.1007/978-3-540-27800-9\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanaokaIMNOW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NascimentoMOHI04, author = {Anderson C. A. Nascimento and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {355--368}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_26}, doi = {10.1007/978-3-540-24852-1\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NascimentoMOHI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/trob/FukudaTKO03, author = {Osamu Fukuda and Toshio Tsuji and Makoto Kaneko and Akira Otsuka}, title = {A human-assisting manipulator teleoperated by {EMG} signals and arm motions}, journal = {{IEEE} Trans. Robotics Autom.}, volume = {19}, number = {2}, pages = {210--222}, year = {2003}, url = {https://doi.org/10.1109/TRA.2003.808873}, doi = {10.1109/TRA.2003.808873}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/trob/FukudaTKO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/NascimentoOIM03, author = {Anderson C. A. Nascimento and Akira Otsuka and Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Marc P. C. Fossorier and Tom H{\o}holdt and Alain Poli}, title = {Unconditionally Secure Homomorphic Pre-distributed Commitments}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 15th International Symposium, AAECC-15, Toulouse, France, May 12-16, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2643}, pages = {87--97}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44828-4\_11}, doi = {10.1007/3-540-44828-4\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/NascimentoOIM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/NascimentoMOHI03, author = {Anderson C. A. Nascimento and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai}, editor = {Colin Boyd and Wenbo Mao}, title = {Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {151--164}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_12}, doi = {10.1007/10958513\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/NascimentoMOHI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xmlsec/ShigetomiOI03, author = {Rie Shigetomi and Akira Otsuka and Hideki Imai}, editor = {Sushil Jajodia and Michiharu Kudo}, title = {Anonymous authentication scheme for {XML} security standard with Refreshable Tokens}, booktitle = {Proceedings of the 2003 {ACM} Workshop on {XML} Security, Fairfax, VA, USA, October 31, 2003}, pages = {86--93}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/968559.968573}, doi = {10.1145/968559.968573}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/xmlsec/ShigetomiOI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OtsukaHSI02, author = {Akira Otsuka and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, title = {An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {85-A}, number = {1}, pages = {140--148}, year = {2002}, url = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_140}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OtsukaHSI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ShigetomiOOI02, author = {Rie Shigetomi and Akira Otsuka and Takahide Ogawa and Hideki Imai}, editor = {Agnes Hui Chan and Virgil D. Gligor}, title = {An Anonymous Loan System Based on Group Signature Scheme}, booktitle = {Information Security, 5th International Conference, {ISC} 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2433}, pages = {244--256}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45811-5\_19}, doi = {10.1007/3-540-45811-5\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/ShigetomiOOI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/ImaiHSON02, author = {Hideki Imai and Goichiro Hanaoka and Junji Shikata and Akira Otsuka and Anderson C. A. Nascimento}, title = {Cryptography with information theoretic security}, booktitle = {Proceedings of the 2002 {IEEE} Information Theory Workshop, {ITW} 2002, 20-25 October 2002, Bangalore, India}, pages = {73}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ITW.2002.1115419}, doi = {10.1109/ITW.2002.1115419}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/ImaiHSON02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/FukudaTOK99, author = {Osamu Fukuda and Toshio Tsuji and Akira Otsuka and Makoto Kaneko}, editor = {Lakhmi C. Jain}, title = {A human supporting manipulator using neural network and its clinical application for forearm amputation}, booktitle = {Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, {KES} 1999, Adelaide, South Australia, 31 August - 1 September 1999, Proceedings}, pages = {129--134}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/KES.1999.820137}, doi = {10.1109/KES.1999.820137}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kes/FukudaTOK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/FukudaTOK98, author = {Osamu Fukuda and Toshio Tsuji and Akira Otsuka and Makoto Kaneko}, title = {EMG-based Human-Robot Interface for Rehabilitation Aid}, booktitle = {Proceedings of the {IEEE} International Conference on Robotics and Automation, ICRA-98, Leuven, Belgium, May 16-20, 1998}, pages = {3492--3497}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ROBOT.1998.680978}, doi = {10.1109/ROBOT.1998.680978}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icra/FukudaTOK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.