Akira Otsuka

According to our database1, Akira Otsuka authored at least 50 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

2018
A Mobile Cough Strength Evaluation Device Using Cough Sounds.
Sensors, 2018

Estimation of Cough Peak Flow Using Cough Sounds.
Sensors, 2018

o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN.
CoRR, 2018

2017
Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy.
Proceedings of the IEEE/SICE International Symposium on System Integration, 2017

Theoretical vulnerabilities in map speaker adaptation.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

2015
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Int. J. Inf. Sec., 2015

Electromyographic prosthetic hand using grasping-force-magnification mechanism with five independently driven fingers.
Advanced Robotics, 2015

2014
Theoretical vulnerability in likelihood-ratio-based biometric verification.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

2013
A Quasi-Optimal Channel Selection Method for Bioelectric Signal Classification Using a Partial Kullback-Leibler Information Measure.
IEEE Trans. Biomed. Engineering, 2013

A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack.
IEICE Transactions, 2013

Relations among security metrics for template protection algorithms.
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013

A training system for the MyoBock hand in a virtual reality environment.
Proceedings of the 2013 IEEE Biomedical Circuits and Systems Conference (BioCAS), Rotterdam, The Netherlands, October 31, 2013

2012
Relations among Security Metrics for Template Protection Algorithms
CoRR, 2012

Advanced wireless cooperation mechanisms for interference mitigation in the 2.4 GHz ISM band.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Practical E-Cash.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Transactions, 2011

RFID Tag Filtering Protocol.
Proceedings of IEEE International Conference on Communications, 2011

2010
Theoretical Analysis of Mean Waiting Time for Message Delivery in Lattice Ad Hoc Networks.
Journal of Circuits, Systems, and Computers, 2010

Enhanced Cancelable Biometrics for Online Signature Verification.
IEICE Transactions, 2010

Wolf fingerprints against minutiae count matching systems.
IEICE Electronic Express, 2010

Unconditionally Secure Electronic Voting.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Practical Searching over Encrypted Data by Private Information Retrieval.
Proceedings of the Global Communications Conference, 2010

How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Analysis of Mean Waiting Time for Delivery of a Message in Mobile Multi-Hop Networks.
IEICE Transactions, 2009

Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptology ePrint Archive, 2009

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IACR Cryptology ePrint Archive, 2009

Theoretical framework for constructing matching algorithms in biometric authentication systems
CoRR, 2009

Formally verifiable features in embedded vehicular security systems.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

2008
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems.
IEICE Transactions, 2008

The Cybernetic Rehabilitation Aid: A novel concept for direct rehabilitation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008

New Attestation Based Security Architecture for In-Vehicle Communication.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2007
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007

Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, International Conference, 2007

2006
A Provably Secure Refreshable Partially Anonymous Token and Its Applications.
IEICE Transactions, 2006

Lightweight Privacy for Ubiquitous Devices.
Proceedings of the IEEE International Conference on Systems, 2006

2004
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004

Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A human-assisting manipulator teleoperated by EMG signals and arm motions.
IEEE Trans. Robotics and Automation, 2003

Anonymous authentication scheme for XML security standard with Refreshable Tokens.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003

Unconditionally Secure Homomorphic Pre-distributed Commitments.
Proceedings of the Applied Algebra, 2003

2002
Cryptography with information theoretic security.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

An Anonymous Loan System Based on Group Signature Scheme.
Proceedings of the Information Security, 5th International Conference, 2002

1999
A human supporting manipulator using neural network and its clinical application for forearm amputation.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999

1998
EMG-based Human-Robot Interface for Rehabilitation Aid.
Proceedings of the IEEE International Conference on Robotics and Automation, 1998


  Loading...