Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Otsuka, Akira
add a person with the name Otsuka, Akira
 

Other publications of authors with the same name

New Attestation Based Security Architecture for In-Vehicle Communication., , , , , and . GLOBECOM, page 1909-1914. IEEE, (2008)Wolf fingerprints against minutiae count matching systems., , , , and . IEICE Electronic Express, 7 (10): 738-744 (2010)Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data., , , , , and . IEICE Transactions, 94-A (2): 725-734 (2011)A human-assisting manipulator teleoperated by EMG signals and arm motions., , , and . IEEE Trans. Robotics and Automation, 19 (2): 210-222 (2003)Relations among Security Metrics for Template Protection Algorithms, and . CoRR, (2012)Unconditionally Secure Electronic Voting., and . Towards Trustworthy Elections, volume 6000 of Lecture Notes in Computer Science, page 107-123. Springer, (2010)A training system for the MyoBock hand in a virtual reality environment., , , , , , , , and . BioCAS, page 61-64. IEEE, (2013)Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions., , , , , and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 62-73. Springer, (2004)Ability to cough can be evaluated through cough sounds: An experimental investigation of effects of microphone type on accuracy., , , , , and . SII, page 936-941. IEEE, (2017)Information-theoretically secure oblivious polynomial evaluation in the commodity-based model., , , , , , and . Int. J. Inf. Sec., 14 (1): 73-84 (2015)