Traceability in permissioned blockchain T Mitani, A Otsuka IEEE Access 8, 21573-21588, 2020 | 99 | 2020 |
New attestation based security architecture for in-vehicle communication H Oguma, A Yoshioka, M Nishikawa, R Shigetomi, A Otsuka, H Imai IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-6, 2008 | 86 | 2008 |
Exploring the dark web for cyber threat intelligence using machine leaning M Kadoguchi, S Hayashi, M Hashimoto, A Otsuka 2019 IEEE International Conference on Intelligence and Security Informatics …, 2019 | 64 | 2019 |
Theoretical framework for constructing matching algorithms in biometric authentication systems M Inuma, A Otsuka, H Imai Advances in Biometrics: Third International Conference, ICB 2009, Alghero …, 2009 | 61 | 2009 |
Wolf attack probability: A new security measure in biometric authentication systems M Une, A Otsuka, H Imai Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007 | 60 | 2007 |
Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method Y Inatomi, A Minemura, M Yokobori, H Ito, T Fujimatsu, M Inuma, A Otsuka US Patent 9,049,191, 2015 | 48 | 2015 |
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC S Matsuo, K Miyazaki, A Otsuka, D Basin Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010 | 39 | 2010 |
Wolf attack probability: A theoretical security measure in biometric authentication systems M Une, A Otsuka, H Imai IEICE transactions on information and systems 91 (5), 1380-1389, 2008 | 36 | 2008 |
Cryptography with information theoretic security H Imai, G Hanaoka, J Shikata, A Otsuka, AC Nascimento Proceedings of the IEEE Information Theory Workshop, 73, 2002 | 34 | 2002 |
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model R Tonicelli, ACA Nascimento, R Dowsley, J Müller-Quade, H Imai, ... International Journal of Information Security 14, 73-84, 2015 | 33 | 2015 |
Cyexec*: A high-performance container-based cyber range with scenario randomization R Nakata, A Otsuka IEEE Access 9, 109095-109114, 2021 | 24 | 2021 |
Universally composable and statistically secure verifiable secret sharing scheme based on pre-distributed data R Dowsley, J MULLER-QUADE, A Otsuka, G Hanaoka, H Imai, ... IEICE transactions on fundamentals of electronics, communications and …, 2011 | 24 | 2011 |
LDPC-code generating method, communication apparatus, and code-string generating method S Uchida, A Otsuka, W Matsumoto US Patent 7,805,653, 2010 | 23 | 2010 |
Information theoretically secure oblivious polynomial evaluation: model, bounds, and constructions G Hanaoka, H Imai, J Mueller-Quade, ACA Nascimento, A Otsuka, ... Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004 | 23 | 2004 |
o-glassesX: Compiler provenance recovery with attention mechanism from a short code fragment Y Otsubo, A Otsuka, M Mimura, T Sakaki, H Ukegawa Proc. Workshop Binary Anal. Res, 1-12, 2020 | 18 | 2020 |
Deep self-supervised clustering of the dark web for cyber threat intelligence M Kadoguchi, H Kobayashi, S Hayashi, A Otsuka, M Hashimoto 2020 IEEE International Conference on Intelligence and Security Informatics …, 2020 | 17 | 2020 |
Formally verifiable features in embedded vehicular security systems G Lee, H Oguma, A Yoshioka, R Shigetomi, A Otsuka, H Imai 2009 IEEE Vehicular Networking Conference (VNC), 1-7, 2009 | 17 | 2009 |
Unconditionally secure electronic voting A Otsuka, H Imai Towards Trustworthy Elections: New Directions in Electronic Voting, 107-123, 2010 | 12 | 2010 |
Practical searching over encrypted data by private information retrieval R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 11 | 2010 |
Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model ACA Nascimento, J Müller-Quade, A Otsuka, G Hanaoka, H Imai Applied Cryptography and Network Security: Second International Conference …, 2004 | 11 | 2004 |