Tetsuji Takada
タイトル引用先
Awase-E: Image-based authentication for mobile phones using user’s favorite images
T Takada, H Koike
International Conference on Mobile Human-Computer Interaction, 347-351, 2003
1422003
Tudumi: Information visualization system for monitoring and auditing computer logs
T Takada, H Koike
Proceedings Sixth International Conference on Information Visualisation, 570-576, 2002
902002
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis.
T Takada, H Koike
LISA 2, 133-144, 2002
742002
Security administration server and its host server
T Mukai, A Ishida, M Adachi, H Koike, T Takada, E Tameda
US Patent 7,185,366, 2007
552007
fakePointer: An authentication scheme for improving Security against Peeping attacks using video Cameras
T Takada
2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008
392008
Visualinda: a framework for visualizing parallel linda programs
H Koike, T Takada, T Masui
Proceedings. 1997 IEEE Symposium on Visual Languages (Cat. No. 97TB100180 …, 1997
291997
Awase-e: Recognition-based image authentication scheme using users' personal photographs
T Takada, T Onuki, H Koike
2006 Innovations in Information Technology, 1-5, 2006
262006
Nigelog: Protecting logging information by hiding multiple backups in directories
T Takada, H Koike
Proceedings. Tenth International Workshop on Database and Expert Systems …, 1999
171999
Log file protection system
H Koike, T Takada
US Patent 7,512,979, 2009
132009
Extended pin authentication scheme allowing multi-touch key input
T Takada, Y Kokubun
Proceedings of International Conference on Advances in Mobile Computing …, 2013
102013
fakePointer: The authentication technique which has tolerance to video recording attacks
T Takada
IPSJ transaction 49 (9), 3051-3061, 2008
62008
逃げログ: 削除まで考慮にいれたログ情報保護手法
高田哲司, 小池英樹
情報処理学会論文誌 41 (3), 823-831, 2000
62000
MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability
T Takada, Y Kokubun
International Journal of Pervasive Computing and Communications 10 (3), 276-290, 2014
52014
CCC: shoulder surfing resistant authentication system by using vibration
M Ishizuka, T Takada
IPSJ Interaction 2014, 501-503, 2014
52014
fakePointer: an authentication scheme for a better security against a peeping attack by a video camera
T Takada
Proc. of the 2nd International Conference on Mobile Ubiquitous Computing …, 2008
52008
fakePointer2: The proposal of the user interface to improve safety to the peep attack about the individual authentication
T Takada
Cryptography and Information Security Symposium, SCIS2007, 2007
52007
MieLog: Log information browser with information visualization and text mining
T Takeda, H Koike
IPSJ Journal 41 (12), 3265-3275, 2000
42000
fakePointer: A User Authentication Scheme that Makes Peeping Attack with a Video Camera Hard
T Takada
IPSJ Journal 49 (9), 3051-3061, 2008
32008
Chameleon dial: repeated camera-recording attack resilient PIN input scheme
T Takada, M Ishizuka
Adjunct Proceedings of the 2015 ACM International Joint Conference on …, 2015
22015
Anomalous network communication detection system by visual pattern on a client computer
H Goto, T Takada
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 1263-1269, 2015
22015
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20