Toshiyuki Isshiki
According to our database1,
Toshiyuki Isshiki
authored at least 20 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Biometrically-independent fuzzy signatures: signing with biometrics without embedding them.
EURASIP J. Image Video Process., December, 2025
Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency, 2025
2024
Proceedings of the Selected Areas in Cryptography - SAC 2024, 2024
2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the 22nd International Conference of the Biometrics Special Interest Group, 2023
2022
Research on the TRM Kaizen Method for Governmental Organizations to Apply Technology Roadmapping as a Methodology to Achieve the Goals of Industrial Technology Policy.
IEEE Trans. Engineering Management, 2022
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
2021
Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021
2019
Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems.
Proceedings of the 2013 BIOSIG, 2013
2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
2011
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology.
Proceedings of the HOST 2011, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2008
Proceedings of the Public Key Cryptography, 2008
2006
Proceedings of the 2006 Workshop on Digital Identity Management, 2006
2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005