Tetsuji Takada
Cited by
Cited by
Awase-E: Image-based authentication for mobile phones using user’s favorite images
T Takada, H Koike
International conference on mobile human-computer interaction, 347-351, 2003
Tudumi: Information visualization system for monitoring and auditing computer logs
T Takada, H Koike
Proceedings Sixth International Conference on Information Visualisation, 570-576, 2002
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis.
T Takada, H Koike
LISA 2, 133-144, 2002
fakePointer: An authentication scheme for improving Security against Peeping attacks using video Cameras
T Takada
2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008
Security administration server and its host server
T Mukai, A Ishida, M Adachi, H Koike, T Takada, E Tameda
US Patent 7,185,366, 2007
Visualinda: a framework for visualizing parallel linda programs
H Koike, T Takada, T Masui
Proceedings. 1997 IEEE Symposium on Visual Languages (Cat. No. 97TB100180 …, 1997
Awase-e: Recognition-based image authentication scheme using users' personal photographs
T Takada, T Onuki, H Koike
2006 Innovations in Information Technology, 1-5, 2006
Nigelog: Protecting logging information by hiding multiple backups in directories
T Takada, H Koike
Proceedings. Tenth International Workshop on Database and Expert Systems …, 1999
Log file protection system
H Koike, T Takada
US Patent 7,512,979, 2009
Extended pin authentication scheme allowing multi-touch key input
T Takada, Y Kokubun
Proceedings of International Conference on Advances in Mobile Computing …, 2013
MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability
T Takada, Y Kokubun
International Journal of Pervasive Computing and Communications, 2014
Exploring alternative security warning dialog for attracting user attention: evaluation of" Kawaii" effect and its additional stimulus combination
R Minakawa, T Takada
Proceedings of the 19th International Conference on Information Integration …, 2017
CCC: shoulder surfing resistant authentication system by using vibration
M Ishizuka, T Takada
IPSJ Interaction 2014, 501-503, 2014
fakePointer: The authentication technique which has tolerance to video recording attacks
T Takada
IPSJ transaction 49 (9), 3051-3061, 2008
fakePointer: a user authentication scheme that makes peeping attack with a video camera hard
T Takada
IPSJ Journal 49 (9), 3051-3061, 2008
逃げログ: 削除まで考慮にいれたログ情報保護手法
高田哲司, 小池英樹
情報処理学会論文誌 41 (3), 823-831, 2000
fakePointer: an authentication scheme for a better security against a peeping attack by a video camera
T Takada
Proc. of the 2nd International Conference on Mobile Ubiquitous Computing …, 2008
fakePointer2: The proposal of the user interface to improve safety to the peep attack about the individual authentication
T Takada
Cryptography and Information Security Symposium, SCIS2007, 2007
MieLog: Log information browser with information visualization and text mining
T Takeda, H Koike
IPSJ Journal 41 (12), 3265-3275, 2000
Authentication shutter: Alternative countermeasure against password reuse attack by availability control
T Takada
Proceedings of the 12th International Conference on Availability …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20