Tetsuji Takada

Orcid: 0000-0002-5099-8855

According to our database1, Tetsuji Takada authored at least 18 papers between 1997 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Design Exploration for Better Security of Recognition-Based Image Authentication in Mobile Environment.
Proceedings of the Advances in Mobile Computing and Multimedia Intelligence, 2022

2021
Pict-Place Authentication: Recognition-based Graphical Password using Image Layout for Better Balance of Security and Operation Time.
Proceedings of the 14th Biannual Conference of the Italian SIGCHI Chapter, 2021

2020
Giving Motivation for Using Secure Credentials through User Authentication by Game.
Proceedings of the AVI '20: International Conference on Advanced Visual Interfaces, Island of Ischia, Italy, September 28, 2020

2018
AssociPass: A User Authentication System with Word-Pairs for Security against Guess Attack.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

Emoji-nized log browser: visualization of server-logs by emoji for system administrators.
Proceedings of the 2018 International Conference on Advanced Visual Interfaces, 2018

2017
Exploring alternative security warning dialog for attracting user attention: evaluation of "Kawaii" effect and its additional stimulus combination.
Proceedings of the 19th International Conference on Information Integration and Web-based Applications & Services, 2017

Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2015
A Visual Approach to Detecting Drive-by Download Attacks.
Proceedings of the 8th International Symposium on Visual Information Communication and Interaction, 2015

Anomalous network communication detection system by visual pattern on a client computer.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Client-oriented web alteration detection system using link change state of a web page based on past and current page content.
Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services, 2015

Chameleon dial: repeated camera-recording attack resilient PIN input scheme.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

2014
MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability.
Int. J. Pervasive Comput. Commun., 2014

2013
Extended PIN Authentication Scheme Allowing Multi-Touch Key Input.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

2003
Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images.
Proceedings of the Human-Computer Interaction with Mobile Devices and Services, 2003

2002
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis.
Proceedings of the 16th Conference on Systems Administration (LISA 2002), 2002

Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs.
Proceedings of the International Conference on Information Visualisation, 2002

1999
NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1997
VisuaLinda: A Framework for Visualizing Parallel Linda Programs.
Proceedings of the Proceedings 1997 IEEE Symposium on Visual Languages, 1997


  Loading...