Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Examination of iatrogenic FDG accumulation after COVID-19 vaccination

    This study aimed to investigate the frequency of COVID-19 vaccine-induced reactive change and potential factors including blood type correlated with increased FDG uptake on positron emission tomography (PET)/c...

    Keiko Takahashi, Osamu Manabe, Kazuya Shizukuishi in Annals of Nuclear Medicine (2024)

  2. No Access

    Living Reference Work Entry In depth

    Practical E-Cash

    Jon Callas, Daniel Nagy, Akira Otsuka in Encyclopedia of Cryptography, Security and Privacy

  3. No Access

    Chapter and Conference Paper

    Electronic Cash with Open-Source Observers

    Electronic cash (e-cash) systems need to satisfy the property of anonymity, unforgeability, and transparency which prevent criminal activities from abuse of anonymity. Observers proposed by Chaum et al. and Br...

    Taishi Higuchi, Akira Otsuka in Financial Cryptography and Data Security. … (2024)

  4. Article

    Open Access

    Cough sound-based estimation of vital capacity via cough peak flow using artificial neural network analysis

    This study presents a novel approach for estimating vital capacity using cough sounds and proposes a neural network-based model that utilizes the reference vital capacity computed using the lambda-mu-sigma met...

    Yasutaka Umayahara, Zu Soh, Akira Furui, Kiyokazu Sekikawa in Scientific Reports (2023)

  5. No Access

    Chapter and Conference Paper

    Probabilistic Micropayments with Transferability

    Micropayments are one of the challenges in cryptocurrencies. The problems in realizing micropayments in the blockchain are the low throughput and the high blockchain transaction fee. As a solution, decentraliz...

    Taisei Takahashi, Akira Otsuka in Computer Security – ESORICS 2021 (2021)

  6. No Access

    Chapter and Conference Paper

    Short Paper: Secure Offline Payments in Bitcoin

    Double-spending attacks on fast payments are one of the fatal architectural problems in Cryptocurrencies. Dmitrienko et al. proposed an offline fast payment scheme that relies on tamper-proof wallets produced ...

    Taisei Takahashi, Akira Otsuka in Financial Cryptography and Data Security (2020)

  7. No Access

    Chapter and Conference Paper

    Confidential and Auditable Payments

    In this paper, we construct the Confidential and Auditable Payments (CAP) scheme. We keep the transaction confidential by writing ciphertexts of transactions in a ledger. We realize the soundness of the CAP sc...

    Tatsuo Mitani, Akira Otsuka in Financial Cryptography and Data Security (2020)

  8. No Access

    Article

    Information-theoretically secure oblivious polynomial evaluation in the commodity-based model

    Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polynomial \(p(x)\) ...

    Rafael Tonicelli, Anderson C. A. Nascimento in International Journal of Information Secur… (2015)

  9. No Access

    Reference Work Entry In depth

    Practical E-Cash

    Jon Callas, Daniel Nagy Dr., Akira Otsuka in Encyclopedia of Cryptography and Security (2011)

  10. No Access

    Book and Conference Proceedings

    Pairing-Based Cryptography - Pairing 2010

    4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings

    Marc Joye, Atsuko Miyaji, Akira Otsuka in Lecture Notes in Computer Science (2010)

  11. No Access

    Chapter and Conference Paper

    How to Evaluate the Security of Real-Life Cryptographic Protocols?

    Governments and international standards bodies have established certification procedures for security-critical technologies, such as cryptographic algorithms. Such standards have not yet been established for c...

    Shin’ichiro Matsuo, Kunihiko Miyazaki in Financial Cryptography and Data Security (2010)

  12. No Access

    Chapter

    Unconditionally Secure Electronic Voting

    In this chapter, we will show how to achieve unconditional or information-theoretic security in electronic voting with the following property:

    1. ...

    Akira Otsuka, Hideki Imai in Towards Trustworthy Elections (2010)

  13. No Access

    Book and Conference Proceedings

    Cryptology and Network Security

    8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings

    Juan A. Garay, Atsuko Miyaji, Akira Otsuka in Lecture Notes in Computer Science (2009)

  14. No Access

    Chapter and Conference Paper

    A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems

    We propose a matching algorithm secure against the wolf attack in one-to-one biometric authentications. Our proposed algorithm embeds a wolf-judgement function in a traditional matching algorithm. We show that...

    Yoshihiro Kojima, Rie Shigetomi in Biometric ID Management and Multimodal Com… (2009)

  15. Chapter and Conference Paper

    Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems

    In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intention...

    Manabu Inuma, Akira Otsuka, Hideki Imai in Advances in Biometrics (2009)

  16. No Access

    Chapter and Conference Paper

    Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)

    Most electronic cash systems being deployed look very different from what academics have been envisioning over the last 3 decades. Experts on the panel gave different definitions for electronic cash, surveyed ...

    Jon Callas, Yvo Desmedt, Daniel Nagy in Financial Cryptography and Data Security (2008)

  17. No Access

    Chapter and Conference Paper

    A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services

    Provision of context-dependent services is triggered when the context satisfies an execution condition. To deliver these services, users’ contexts have to be determined by terminals such as GPS. However, GPS h...

    Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka in Research in Cryptology (2008)

  18. Chapter and Conference Paper

    Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into...

    Masashi Une, Akira Otsuka, Hideki Imai in Advances in Biometrics (2007)

  19. No Access

    Chapter and Conference Paper

    Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions

    We introduce an information theoretical model for oblivious polynomial evaluation relying on predistributed data, and prove very general lower bounds on the size of the predistributed data, as well as the size...

    Goichiro Hanaoka, Hideki Imai, Joern Mueller-Quade in Information Security and Privacy (2004)

  20. Chapter and Conference Paper

    Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model

    This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data predistributed by a trusted authority. As an application of this VSS scheme we present...

    Anderson C. A. Nascimento, Joern Mueller-Quade in Applied Cryptography and Network Security (2004)

previous disabled Page of 2