Author of the publication

Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report).

, , , , , and . Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, page 307-313. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Otsuka, Akira
add a person with the name Otsuka, Akira
 

Other publications of authors with the same name

Wolf fingerprints against minutiae count matching systems., , , , and . IEICE Electronic Express, 7 (10): 738-744 (2010)New Attestation Based Security Architecture for In-Vehicle Communication., , , , , and . GLOBECOM, page 1909-1914. IEEE, (2008)Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data., , , , , and . IEICE Transactions, 94-A (2): 725-734 (2011)A human-assisting manipulator teleoperated by EMG signals and arm motions., , , and . IEEE Trans. Robotics and Automation, 19 (2): 210-222 (2003)Relations among Security Metrics for Template Protection Algorithms, and . CoRR, (2012)Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy., , , , , and . SII, page 936-941. IEEE, (2017)Unconditionally Secure Electronic Voting., and . Towards Trustworthy Elections, volume 6000 of Lecture Notes in Computer Science, page 107-123. Springer, (2010)A training system for the MyoBock hand in a virtual reality environment., , , , , , , , and . BioCAS, page 61-64. IEEE, (2013)Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions., , , , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 62-73. Springer, (2004)Information-theoretically secure oblivious polynomial evaluation in the commodity-based model., , , , , , and . Int. J. Inf. Sec., 14 (1): 73-84 (2015)