Akira Otsuka
Akira Otsuka
Graduate School of Information Security, Institute of Information Security (IISEC)
Verified email at iisec.ac.jp
Title
Cited by
Cited by
Year
New attestation based security architecture for in-vehicle communication
H Oguma, A Yoshioka, M Nishikawa, R Shigetomi, A Otsuka, H Imai
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
672008
Theoretical framework for constructing matching algorithms in biometric authentication systems
M Inuma, A Otsuka, H Imai
International Conference on Biometrics, 806-815, 2009
542009
Outbreak of highly pathogenic avian influenza in Japan and anti-influenza virus activity of povidone-iodine products
H Ito, T Ito, M Hikida, J Yashiro, A Otsuka, H Kida, K Otsuki
Dermatology 212 (Suppl. 1), 115-118, 2006
442006
Wolf attack probability: A new security measure in biometric authentication systems
M Une, A Otsuka, H Imai
International Conference on Biometrics, 396-406, 2007
372007
Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
Y Inatomi, A Minemura, M Yokobori, H Ito, T Fujimatsu, M Inuma, A Otsuka
US Patent 9,049,191, 2015
352015
How to evaluate the security of real-life cryptographic protocols?
S Matsuo, K Miyazaki, A Otsuka, D Basin
International Conference on Financial Cryptography and Data Security, 182-194, 2010
352010
Wolf attack probability: A theoretical security measure in biometric authentication systems
M Une, A Otsuka, H Imai
IEICE transactions on information and systems 91 (5), 1380-1389, 2008
332008
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ...
International Journal of Information Security 14 (1), 73-84, 2015
282015
Cryptography with information theoretic security
H Imai, G Hanaoka, J Shikata, A Otsuka, AC Nascimento
Proceedings of the IEEE Information Theory Workshop, 73, 2002
212002
Traceability in permissioned blockchain
T Mitani, A Otsuka
IEEE Access 8, 21573-21588, 2020
202020
Universally composable and statistically secure verifiable secret sharing scheme based on pre-distributed data
R Dowsley, J MULLER-QUADE, A Otsuka, G Hanaoka, H Imai, ...
IEICE transactions on fundamentals of electronics, communications and …, 2011
192011
LDPC-code generating method, communication apparatus, and code-string generating method
S Uchida, A Otsuka, W Matsumoto
US Patent 7,805,653, 2010
192010
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
M Grassl, W Geiselmann, T Beth
Lecture Notes in Computer Science (Springer, New York, 1999), 231, 1999
16*1999
Information theoretically secure oblivious polynomial evaluation: Model, bounds, and constructions
G Hanaoka, H Imai, J Mueller-Quade, ACA Nascimento, A Otsuka, ...
Australasian Conference on Information Security and Privacy, 62-73, 2004
152004
Formally verifiable features in embedded vehicular security systems
G Lee, H Oguma, A Yoshioka, R Shigetomi, A Otsuka, H Imai
2009 IEEE Vehicular Networking Conference (VNC), 1-7, 2009
132009
Practical searching over encrypted data by private information retrieval
R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
102010
Exploring the dark web for cyber threat intelligence using machine leaning
M Kadoguchi, S Hayashi, M Hashimoto, A Otsuka
2019 IEEE International Conference on Intelligence and Security Informatics …, 2019
92019
Relations among security metrics for template protection algorithms
M Inuma, A Otsuka
2013 IEEE Sixth International Conference on Biometrics: Theory, Applications …, 2013
82013
A provably secure refreshable partially anonymous token and its applications
R Shigetomi, A Otsuka, J Furukawa, K Martin, H Imai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2006
82006
Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model
ACA Nascimento, J Müller-Quade, A Otsuka, G Hanaoka, H Imai
International Conference on Applied Cryptography and Network Security, 355-368, 2004
82004
The system can't perform the operation now. Try again later.
Articles 1–20