According to our database1, Akira Otsuka authored at least 51 papers between 1998 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy.
Proceedings of the IEEE/SICE International Symposium on System Integration, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Int. J. Inf. Sec., 2015
Electromyographic prosthetic hand using grasping-force-magnification mechanism with five independently driven fingers.
Adv. Robotics, 2015
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014
A Quasi-Optimal Channel Selection Method for Bioelectric Signal Classification Using a Partial Kullback-Leibler Information Measure.
IEEE Trans. Biomed. Engineering, 2013
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack.
IEICE Trans. Inf. Syst., 2013
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013
Proceedings of the 2013 IEEE Biomedical Circuits and Systems Conference (BioCAS), Rotterdam, The Netherlands, October 31, 2013
Advanced wireless cooperation mechanisms for interference mitigation in the 2.4 GHz ISM band.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of IEEE International Conference on Communications, 2011
Theoretical Analysis of Mean Waiting Time for Message Delivery in Lattice Ad Hoc Networks.
Journal of Circuits, Systems, and Computers, 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Electronic Express, 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Global Communications Conference, 2010
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010
Analysis of Mean Waiting Time for Delivery of a Message in Mobile Multi-Hop Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the IEEE Vehicular Networking Conference, 2009
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, Third International Conference, 2009
A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems.
IEICE Trans. Inf. Syst., 2008
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the IEEE International Conference on Systems, 2006
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
IEEE Trans. Robotics Autom., 2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Applied Algebra, 2003
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
Proceedings of the Information Security, 5th International Conference, 2002
A human supporting manipulator using neural network and its clinical application for forearm amputation.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999
Proceedings of the IEEE International Conference on Robotics and Automation, 1998