default search action
Akira Otsuka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yuhei Otsubo, Akira Otsuka, Mamoru Mimura:
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism. IEEE Access 12: 34477-34488 (2024) - [j22]Koichi Moriyama, Akira Otsuka:
Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors. IEICE Trans. Inf. Syst. 107(9): 1112-1122 (2024) - [i10]Hiroaki Maeshima, Akira Otsuka:
Robustness Bounds on the Successful Adversarial Examples: Theory and Practice. CoRR abs/2403.01896 (2024) - 2023
- [j21]Norimitsu Ito, Masaki Hashimoto, Akira Otsuka:
Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models. IEEE Access 11: 102796-102805 (2023) - [c40]Taishi Higuchi, Akira Otsuka:
Electronic Cash with Open-Source Observers. FC Workshops 2023: 286-302 - 2022
- [j20]Taisei Takahashi, Taishi Higuchi, Akira Otsuka:
VeloCash: Anonymous Decentralized Probabilistic Micropayments With Transferability. IEEE Access 10: 93701-93730 (2022) - [j19]Yuma Masubuchi, Masaki Hashimoto, Akira Otsuka:
SIBYL: A Method for Detecting Similar Binary Functions Using Machine Learning. IEICE Trans. Inf. Syst. 105-D(4): 755-765 (2022) - [c39]Koichi Moriyama, Akira Otsuka:
Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors. Blockchain 2022: 1-10 - [i9]Yuhei Otsubo, Akira Otsuka, Mamoru Mimura:
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism. CoRR abs/2211.13110 (2022) - 2021
- [j18]Ryotaro Nakata, Akira Otsuka:
CyExec*: A High-Performance Container-Based Cyber Range With Scenario Randomization. IEEE Access 9: 109095-109114 (2021) - [c38]Taisei Takahashi, Akira Otsuka:
Probabilistic Micropayments with Transferability. ESORICS (1) 2021: 390-406 - [c37]Ryotaro Nakata, Akira Otsuka:
CyExec*: Automatic Generation of Randomized Cyber Range Scenarios. ICISSP 2021: 226-236 - [c36]Ryotaro Nakata, Akira Otsuka:
Evaluation of Vulnerability Reproducibility in Container-based Cyber Range. ICISSP 2021: 635-642 - [i8]Taisei Takahashi, Akira Otsuka:
Probabilistic micropayments with transferability. IACR Cryptol. ePrint Arch. 2021: 1306 (2021) - 2020
- [j17]Tatsuo Mitani, Akira Otsuka:
Traceability in Permissioned Blockchain. IEEE Access 8: 21573-21588 (2020) - [j16]Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki:
o-glasses: Visualizing X86 Code From Binary Using a 1D-CNN. IEEE Access 8: 31753-31763 (2020) - [c35]Tatsuo Mitani, Akira Otsuka:
Confidential and Auditable Payments. Financial Cryptography Workshops 2020: 466-480 - [c34]Masashi Kadoguchi, Hanae Kobayashi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto:
Deep Self-Supervised Clustering of the Dark Web for Cyber Threat Intelligence. ISI 2020: 1-6 - [c33]Hanae Kobayashi, Masashi Kadoguchi, Shota Hayashi, Akira Otsuka, Masaki Hashimoto:
An Expert System for Classifying Harmful Content on the Dark Web. ISI 2020: 1-6 - [i7]Ryotaro Nakata, Akira Otsuka:
Evaluation of vulnerability reproducibility in container-based Cyber Range. CoRR abs/2010.16024 (2020) - [i6]Tatsuo Mitani, Akira Otsuka:
Anonymous probabilistic payment in payment hub. IACR Cryptol. ePrint Arch. 2020: 748 (2020)
2010 – 2019
- 2019
- [c32]Tatsuo Mitani, Akira Otsuka:
Traceability in Permissioned Blockchain. Blockchain 2019: 286-293 - [c31]Taisei Takahashi, Akira Otsuka:
Short Paper: Secure Offline Payments in Bitcoin. Financial Cryptography Workshops 2019: 12-20 - [c30]Masashi Kadoguchi, Shota Hayashi, Masaki Hashimoto, Akira Otsuka:
Exploring the Dark Web for Cyber Threat Intelligence using Machine Leaning. ISI 2019: 200-202 - 2018
- [j15]Yasutaka Umayahara, Zu Soh, Kiyokazu Sekikawa, Toshihiro Kawae, Akira Otsuka, Toshio Tsuji:
Estimation of Cough Peak Flow Using Cough Sounds. Sensors 18(7): 2381 (2018) - [j14]Yasutaka Umayahara, Zu Soh, Kiyokazu Sekikawa, Toshihiro Kawae, Akira Otsuka, Toshio Tsuji:
A Mobile Cough Strength Evaluation Device Using Cough Sounds. Sensors 18(11): 3810 (2018) - [i5]Yuhei Otsubo, Akira Otsuka, Mamoru Mimura, Takeshi Sakaki, Atsuhiro Goto:
o-glasses: Visualizing x86 Code from Binary Using a 1d-CNN. CoRR abs/1806.05328 (2018) - 2017
- [c29]Tetsushi Ohki, Akira Otsuka:
A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures. MPS@CCS 2017: 13-18 - [c28]Tetsushi Ohki, Akira Otsuka:
Theoretical vulnerabilities in map speaker adaptation. ICASSP 2017: 2042-2046 - [c27]Yasutaka Umayahara, Zu Soh, T. Ozaki, T. Murakami, Akira Otsuka, Toshio Tsuji:
Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy. SII 2017: 936-941 - 2015
- [j13]Takeshi Takaki, Keisuke Shima, Naohisa Mukaidani, Toshio Tsuji, Akira Otsuka, Takaaki Chin:
Electromyographic prosthetic hand using grasping-force-magnification mechanism with five independently driven fingers. Adv. Robotics 29(24): 1586-1598 (2015) - [j12]Rafael Tonicelli, Anderson C. A. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, Akira Otsuka:
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model. Int. J. Inf. Sec. 14(1): 73-84 (2015) - 2014
- [c26]Tetsushi Ohki, Akira Otsuka:
Theoretical vulnerability in likelihood-ratio-based biometric verification. IJCB 2014: 1-8 - 2013
- [j11]Manabu Inuma, Akira Otsuka, Hideki Imai:
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack. IEICE Trans. Inf. Syst. 96-D(2): 357-364 (2013) - [j10]Taro Shibanoki, Keisuke Shima, Toshio Tsuji, Akira Otsuka, Takaaki Chin:
A Quasi-Optimal Channel Selection Method for Bioelectric Signal Classification Using a Partial Kullback-Leibler Information Measure. IEEE Trans. Biomed. Eng. 60(3): 853-861 (2013) - [c25]Go Nakamura, Taro Shibanoki, Keisuke Shima, Yuichi Kurita, Masaki Hasegawa, Akira Otsuka, Yuichiro Honda, Takaaki Chin, Toshio Tsuji:
A training system for the MyoBock hand in a virtual reality environment. BioCAS 2013: 61-64 - [c24]Manabu Inuma, Akira Otsuka:
Relations among security metrics for template protection algorithms. BTAS 2013: 1-8 - 2012
- [c23]Yukimasa Nagai, Toshinori Hori, Yosuke Yokoyama, Naoki Shimizu, Akira Otsuka, Tetsuya Yokotani:
Advanced wireless cooperation mechanisms for interference mitigation in the 2.4 GHz ISM band. CCNC 2012: 364-365 - [i4]Manabu Inuma, Akira Otsuka:
Relations among Security Metrics for Template Protection Algorithms. CoRR abs/1212.4195 (2012) - 2011
- [j9]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 725-734 (2011) - [c22]Manabu Inuma, Akira Otsuka, Yasushi Inatomi, Atsushi Minemura, Tatsuya Takehisa:
RFID Tag Filtering Protocol. ICC 2011: 1-6 - [r1]Jon Callas, Daniel Nagy, Akira Otsuka:
Practical E-Cash. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 951-952 - 2010
- [j8]Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai:
Wolf fingerprints against minutiae count matching systems. IEICE Electron. Express 7(10): 738-744 (2010) - [j7]Daigo Muramatsu, Manabu Inuma, Junji Shikata, Akira Otsuka:
Enhanced Cancelable Biometrics for Online Signature Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1254-1259 (2010) - [j6]Akira Otsuka, Keisuke Nakano, Kazuyuki Miyakita:
Theoretical Analysis of Mean Waiting Time for Message Delivery in Lattice Ad Hoc Networks. J. Circuits Syst. Comput. 19(8): 1711-1741 (2010) - [c21]Shin'ichiro Matsuo, Kunihiko Miyazaki, Akira Otsuka, David A. Basin:
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. Financial Cryptography Workshops 2010: 182-194 - [c20]Rei Yoshida, Yang Cui, Tomohiro Sekino, Rie Shigetomi, Akira Otsuka, Hideki Imai:
Practical Searching over Encrypted Data by Private Information Retrieval. GLOBECOM 2010: 1-5 - [c19]Akira Otsuka, Hideki Imai:
Unconditionally Secure Electronic Voting. Towards Trustworthy Elections 2010: 107-123 - [e2]Marc Joye, Atsuko Miyaji, Akira Otsuka:
Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings. Lecture Notes in Computer Science 6487, Springer 2010, ISBN 978-3-642-17454-4 [contents]
2000 – 2009
- 2009
- [j5]Keisuke Nakano, Kazuyuki Miyakita, Akira Otsuka, Masakazu Sengoku, Shoji Shinoda:
Analysis of Mean Waiting Time for Delivery of a Message in Mobile Multi-Hop Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(9): 2236-2247 (2009) - [c18]Yoshihiro Kojima, Rie Shigetomi, Manabu Inuma, Akira Otsuka, Hideki Imai:
A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems. COST 2101/2102 Conference 2009: 293-300 - [c17]Manabu Inuma, Akira Otsuka, Hideki Imai:
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. ICB 2009: 806-815 - [c16]Gyesik Lee, Hisashi Oguma, Akira Yoshioka, Rie Shigetomi, Akira Otsuka, Hideki Imai:
Formally verifiable features in embedded vehicular security systems. VNC 2009: 1-7 - [e1]Juan A. Garay, Atsuko Miyaji, Akira Otsuka:
Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings. Lecture Notes in Computer Science 5888, Springer 2009, ISBN 978-3-642-10432-9 [contents] - [i3]Manabu Inuma, Akira Otsuka, Hideki Imai:
Theoretical framework for constructing matching algorithms in biometric authentication systems. CoRR abs/0904.1284 (2009) - [i2]Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento:
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. IACR Cryptol. ePrint Arch. 2009: 270 (2009) - [i1]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IACR Cryptol. ePrint Arch. 2009: 273 (2009) - 2008
- [j4]Masashi Une, Akira Otsuka, Hideki Imai:
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems. IEICE Trans. Inf. Syst. 91-D(5): 1380-1389 (2008) - [c15]Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung:
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). Financial Cryptography 2008: 307-313 - [c14]Hisashi Oguma, Akira Yoshioka, Makoto Nishikawa, Rie Shigetomi, Akira Otsuka, Hideki Imai:
New Attestation Based Security Architecture for In-Vehicle Communication. GLOBECOM 2008: 1909-1914 - [c13]Erhan Akdogan, Keisuke Shima, Hitoshi Kataoka, Masaki Hasegawa, Akira Otsuka, Toshio Tsuji:
The Cybernetic Rehabilitation Aid: A novel concept for direct rehabilitation. ROBIO 2008: 852-858 - 2007
- [c12]Masashi Une, Akira Otsuka, Hideki Imai:
Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. ICB 2007: 396-406 - [c11]Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai:
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. WEWoRC 2007: 1-12 - 2006
- [j3]Rie Shigetomi, Akira Otsuka, Jun Furukawa, Keith Martin, Hideki Imai:
A Provably Secure Refreshable Partially Anonymous Token and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1396-1406 (2006) - [c10]Akira Otsuka, Rie Shigetomi, Hideki Imai:
Lightweight Privacy for Ubiquitous Devices. SMC 2006: 1233-1237 - 2004
- [c9]Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas J. Winter:
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. ACISP 2004: 62-73 - [c8]Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. ACNS 2004: 355-368 - 2003
- [j2]Osamu Fukuda, Toshio Tsuji, Makoto Kaneko, Akira Otsuka:
A human-assisting manipulator teleoperated by EMG signals and arm motions. IEEE Trans. Robotics Autom. 19(2): 210-222 (2003) - [c7]Anderson C. A. Nascimento, Akira Otsuka, Hideki Imai, Jörn Müller-Quade:
Unconditionally Secure Homomorphic Pre-distributed Commitments. AAECC 2003: 87-97 - [c6]Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. ISC 2003: 151-164 - [c5]Rie Shigetomi, Akira Otsuka, Hideki Imai:
Anonymous authentication scheme for XML security standard with Refreshable Tokens. XML Security 2003: 86-93 - 2002
- [j1]Akira Otsuka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 140-148 (2002) - [c4]Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai:
An Anonymous Loan System Based on Group Signature Scheme. ISC 2002: 244-256 - [c3]Hideki Imai, Goichiro Hanaoka, Junji Shikata, Akira Otsuka, Anderson C. A. Nascimento:
Cryptography with information theoretic security. ITW 2002: 73
1990 – 1999
- 1999
- [c2]Osamu Fukuda, Toshio Tsuji, Akira Otsuka, Makoto Kaneko:
A human supporting manipulator using neural network and its clinical application for forearm amputation. KES 1999: 129-134 - 1998
- [c1]Osamu Fukuda, Toshio Tsuji, Akira Otsuka, Makoto Kaneko:
EMG-based Human-Robot Interface for Rehabilitation Aid. ICRA 1998: 3492-3497
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint