Awase-E: Image-based authentication for mobile phones using user’s favorite images T Takada, H Koike International conference on mobile human-computer interaction, 347-351, 2003 | 171 | 2003 |
Tudumi: Information visualization system for monitoring and auditing computer logs T Takada, H Koike Proceedings Sixth International Conference on Information Visualisation, 570-576, 2002 | 103 | 2002 |
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis. T Takada, H Koike LISA 2, 133-144, 2002 | 85 | 2002 |
Security administration server and its host server T Mukai, A Ishida, M Adachi, H Koike, T Takada, E Tameda US Patent 7,185,366, 2007 | 57 | 2007 |
fakePointer: An authentication scheme for improving Security against Peeping attacks using video Cameras T Takada 2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008 | 51 | 2008 |
Visualinda: a framework for visualizing parallel linda programs H Koike, T Takada, T Masui Proceedings. 1997 IEEE Symposium on Visual Languages (Cat. No. 97TB100180 …, 1997 | 31 | 1997 |
Awase-e: Recognition-based image authentication scheme using users' personal photographs T Takada, T Onuki, H Koike 2006 Innovations in Information Technology, 1-5, 2006 | 25 | 2006 |
Nigelog: Protecting logging information by hiding multiple backups in directories T Takada, H Koike Proceedings. Tenth International Workshop on Database and Expert Systems …, 1999 | 18 | 1999 |
Log file protection system H Koike, T Takada US Patent 7,512,979, 2009 | 14 | 2009 |
Extended pin authentication scheme allowing multi-touch key input T Takada, Y Kokubun Proceedings of International Conference on Advances in Mobile Computing …, 2013 | 12 | 2013 |
MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability T Takada, Y Kokubun International Journal of Pervasive Computing and Communications, 2014 | 7 | 2014 |
CCC: shoulder surfing resistant authentication system by using vibration M Ishizuka, T Takada IPSJ Interaction 2014, 501-503, 2014 | 6 | 2014 |
fakePointer: The authentication technique which has tolerance to video recording attacks T Takada IPSJ transaction 49 (9), 3051-3061, 2008 | 6 | 2008 |
fakePointer: a user authentication scheme that makes peeping attack with a video camera hard T Takada IPSJ Journal 49 (9), 3051-3061, 2008 | 6 | 2008 |
逃げログ: 削除まで考慮にいれたログ情報保護手法 高田哲司, 小池英樹 情報処理学会論文誌 41 (3), 823-831, 2000 | 6 | 2000 |
fakePointer: an authentication scheme for a better security against a peeping attack by a video camera T Takada Proc. of the 2nd International Conference on Mobile Ubiquitous Computing …, 2008 | 5 | 2008 |
fakePointer2: The proposal of the user interface to improve safety to the peep attack about the individual authentication T Takada Cryptography and Information Security Symposium, SCIS2007, 2007 | 5 | 2007 |
MieLog: Log information browser with information visualization and text mining T Takeda, H Koike IPSJ Journal 41 (12), 3265-3275, 2000 | 5 | 2000 |
Chameleon dial: repeated camera-recording attack resilient pin input scheme T Takada, M Ishizuka Adjunct Proceedings of the 2015 ACM International Joint Conference on …, 2015 | 3 | 2015 |
Awase-E: the Method Enables an Imagebased Authentication to be More Secure and Familiar for Users with Providing Image Registration and User Notification T Takada, H Koike IPSJ Journal 44 (8), 2002-2012, 2003 | 3 | 2003 |