Follow
Tetsuji Takada
Title
Cited by
Cited by
Year
Awase-E: Image-based authentication for mobile phones using user’s favorite images
T Takada, H Koike
Human-Computer Interaction with Mobile Devices and Services: 5th …, 2003
1992003
Tudumi: Information visualization system for monitoring and auditing computer logs
T Takada, H Koike
Proceedings Sixth International Conference on Information Visualisation, 570-576, 2002
1082002
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis.
T Takada, H Koike
LISA 2, 133-144, 2002
872002
fakepointer: An authentication scheme for improving security against peeping attacks using video cameras
T Takada
2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008
652008
Security administration server and its host server
T Mukai, A Ishida, M Adachi, H Koike, T Takada, E Tameda
US Patent 7,185,366, 2007
602007
Awase-e: Recognition-based image authentication scheme using users' personal photographs
T Takada, T Onuki, H Koike
2006 Innovations in Information Technology, 1-5, 2006
332006
Visualinda: a framework for visualizing parallel linda programs
H Koike, T Takada, T Masui
Proceedings. 1997 IEEE Symposium on Visual Languages (Cat. No. 97TB100180 …, 1997
321997
Nigelog: Protecting logging information by hiding multiple backups in directories
T Takada, H Koike
Proceedings. Tenth International Workshop on Database and Expert Systems …, 1999
181999
Log file protection system
H Koike, T Takada
US Patent 7,512,979, 2009
152009
Extended pin authentication scheme allowing multi-touch key input
T Takada, Y Kokubun
Proceedings of International Conference on Advances in Mobile Computing …, 2013
132013
Exploring alternative security warning dialog for attracting user attention: evaluation of" Kawaii" effect and its additional stimulus combination
R Minakawa, T Takada
Proceedings of the 19th International Conference on Information Integration …, 2017
82017
MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability
T Takada, Y Kokubun
International Journal of Pervasive Computing and Communications 10 (3), 276-290, 2014
82014
fakePointer: a user authentication scheme that makes peeping attack with a video camera hard
T Takada
IPSJ Journal 49 (9), 3051-3061, 2008
72008
CCC: shoulder surfing resistant authentication system by using vibration
M Ishizuka, T Takada
IPSJ Interaction 2014, 501-503, 2014
62014
fakePointer: The authentication technique which has tolerance to video recording attacks
T Takada
IPSJ transaction 49 (9), 3051-3061, 2008
62008
fakePointer: an authentication scheme for a better security against a peeping attack by a video camera
T Takada
Proc. of the 2nd International Conference on Mobile Ubiquitous Computing …, 2008
62008
逃げログ: 削除まで考慮にいれたログ情報保護手法
高田哲司, 小池英樹
情報処理学会論文誌 41 (3), 823-831, 2000
62000
Authentication shutter: Alternative countermeasure against password reuse attack by availability control
T Takada
Proceedings of the 12th International Conference on Availability …, 2017
52017
fakePointer2: The proposal of the user interface to improve safety to the peep attack about the individual authentication
T Takada
Cryptography and Information Security Symposium, SCIS2007, 2007
52007
MieLog: Log information browser with information visualization and text mining
T Takeda, H Koike
IPSJ Journal 41 (12), 3265-3275, 2000
52000
The system can't perform the operation now. Try again later.
Articles 1–20