Follow
Akira Otsuka
Akira Otsuka
Graduate School of Information Security, Institute of Information Security (IISEC)
Verified email at iisec.ac.jp
Title
Cited by
Cited by
Year
New attestation based security architecture for in-vehicle communication
H Oguma, A Yoshioka, M Nishikawa, R Shigetomi, A Otsuka, H Imai
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008
802008
Traceability in permissioned blockchain
T Mitani, A Otsuka
IEEE Access 8, 21573-21588, 2020
752020
Theoretical framework for constructing matching algorithms in biometric authentication systems
M Inuma, A Otsuka, H Imai
Advances in Biometrics: Third International Conference, ICB 2009, Alghero …, 2009
602009
Wolf attack probability: A new security measure in biometric authentication systems
M Une, A Otsuka, H Imai
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
542007
Exploring the dark web for cyber threat intelligence using machine leaning
M Kadoguchi, S Hayashi, M Hashimoto, A Otsuka
2019 IEEE International Conference on Intelligence and Security Informatics …, 2019
522019
Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
Y Inatomi, A Minemura, M Yokobori, H Ito, T Fujimatsu, M Inuma, A Otsuka
US Patent 9,049,191, 2015
472015
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC
S Matsuo, K Miyazaki, A Otsuka, D Basin
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010
382010
Wolf attack probability: A theoretical security measure in biometric authentication systems
M Une, A Otsuka, H Imai
IEICE transactions on information and systems 91 (5), 1380-1389, 2008
362008
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ...
International Journal of Information Security 14, 73-84, 2015
322015
Cryptography with information theoretic security
H Imai, G Hanaoka, J Shikata, A Otsuka, AC Nascimento
Proceedings of the IEEE Information Theory Workshop, 73, 2002
302002
LDPC-code generating method, communication apparatus, and code-string generating method
S Uchida, A Otsuka, W Matsumoto
US Patent 7,805,653, 2010
232010
Information theoretically secure oblivious polynomial evaluation: model, bounds, and constructions
G Hanaoka, H Imai, J Mueller-Quade, ACA Nascimento, A Otsuka, ...
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
232004
Universally composable and statistically secure verifiable secret sharing scheme based on pre-distributed data
R Dowsley, J MULLER-QUADE, A Otsuka, G Hanaoka, H Imai, ...
IEICE transactions on fundamentals of electronics, communications and …, 2011
222011
Cyexec*: A high-performance container-based cyber range with scenario randomization
R Nakata, A Otsuka
IEEE Access 9, 109095-109114, 2021
192021
Formally verifiable features in embedded vehicular security systems
G Lee, H Oguma, A Yoshioka, R Shigetomi, A Otsuka, H Imai
2009 IEEE Vehicular Networking Conference (VNC), 1-7, 2009
162009
Deep self-supervised clustering of the dark web for cyber threat intelligence
M Kadoguchi, H Kobayashi, S Hayashi, A Otsuka, M Hashimoto
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
142020
o-glassesX: Compiler provenance recovery with attention mechanism from a short code fragment
Y Otsubo, A Otsuka, M Mimura, T Sakaki, H Ukegawa
Proceedings of the 3nd Workshop on Binary Analysis Research, 2020
132020
Unconditionally secure electronic voting
A Otsuka, H Imai
Towards Trustworthy Elections: New Directions in Electronic Voting, 107-123, 2010
122010
Practical searching over encrypted data by private information retrieval
R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
102010
Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model
ACA Nascimento, J Müller-Quade, A Otsuka, G Hanaoka, H Imai
Applied Cryptography and Network Security: Second International Conference …, 2004
102004
The system can't perform the operation now. Try again later.
Articles 1–20