Akira Otsuka
Orcid: 0000-0001-6862-2576
According to our database1,
Akira Otsuka
authored at least 66 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
2025
0
1
2
3
4
5
6
7
1
1
3
1
2
2
3
3
1
2
1
3
2
1
1
1
1
1
2
3
2
3
1
2
1
1
3
3
3
2
1
2
3
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs.
IEEE Access, 2025
2024
Permissionless Blockchain-Based Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors.
IEICE Trans. Inf. Syst., 2024
CoRR, 2024
Compiler Provenance Recovery for Multi-CPU Architectures Using a Centrifuge Mechanism.
IEEE Access, 2024
2023
Feature Extraction Methods for Binary Code Similarity Detection Using Neural Machine Translation Models.
IEEE Access, 2023
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023
2022
IEICE Trans. Inf. Syst., 2022
IEEE Access, 2022
2021
IEEE Access, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
2018
2017
Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy.
Proceedings of the IEEE/SICE International Symposium on System Integration, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
A Study on Autoencoder-based Reconstruction Method for Wi-Fi Location Data with Erasures.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017
2015
Electromyographic prosthetic hand using grasping-force-magnification mechanism with five independently driven fingers.
Adv. Robotics, 2015
2014
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014
2013
A Quasi-Optimal Channel Selection Method for Bioelectric Signal Classification Using a Partial Kullback-Leibler Information Measure.
IEEE Trans. Biomed. Eng., 2013
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack.
IEICE Trans. Inf. Syst., 2013
Proceedings of the IEEE Sixth International Conference on Biometrics: Theory, 2013
Proceedings of the 2013 IEEE Biomedical Circuits and Systems Conference (BioCAS), Rotterdam, The Netherlands, October 31, 2013
2012
Advanced wireless cooperation mechanisms for interference mitigation in the 2.4 GHz ISM band.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Theoretical Analysis of Mean Waiting Time for Message Delivery in Lattice Ad Hoc Networks.
J. Circuits Syst. Comput., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Electron. Express, 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Global Communications Conference, 2010
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC.
Proceedings of the Financial Cryptography and Data Security, 2010
2009
Analysis of Mean Waiting Time for Delivery of a Message in Mobile Multi-Hop Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the IEEE Vehicular Networking Conference, 2009
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, Third International Conference, 2009
A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009
2008
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems.
IEICE Trans. Inf. Syst., 2008
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007
Proceedings of the Advances in Biometrics, International Conference, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the IEEE International Conference on Systems, 2006
2004
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IEEE Trans. Robotics Autom., 2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Applied Algebra, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
Proceedings of the Information Security, 5th International Conference, 2002
1999
A human supporting manipulator using neural network and its clinical application for forearm amputation.
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999
1998
Proceedings of the IEEE International Conference on Robotics and Automation, 1998