Tetsuji Takada
Title
Cited by
Cited by
Year
Awase-E: Image-based authentication for mobile phones using user’s favorite images
T Takada, H Koike
International Conference on Mobile Human-Computer Interaction, 347-351, 2003
1652003
Tudumi: Information visualization system for monitoring and auditing computer logs
T Takada, H Koike
Proceedings Sixth International Conference on Information Visualisation, 570-576, 2002
972002
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis.
T Takada, H Koike
LISA 2, 133-144, 2002
802002
Security administration server and its host server
T Mukai, A Ishida, M Adachi, H Koike, T Takada, E Tameda
US Patent 7,185,366, 2007
572007
fakePointer: An authentication scheme for improving Security against Peeping attacks using video Cameras
T Takada
2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008
472008
Visualinda: a framework for visualizing parallel linda programs
H Koike, T Takada, T Masui
Proceedings. 1997 IEEE Symposium on Visual Languages (Cat. No. 97TB100180 …, 1997
331997
Awase-e: Recognition-based image authentication scheme using users' personal photographs
T Takada, T Onuki, H Koike
2006 Innovations in Information Technology, 1-5, 2006
252006
Nigelog: Protecting logging information by hiding multiple backups in directories
T Takada, H Koike
Proceedings. Tenth International Workshop on Database and Expert Systems …, 1999
171999
Log file protection system
H Koike, T Takada
US Patent 7,512,979, 2009
142009
Extended pin authentication scheme allowing multi-touch key input
T Takada, Y Kokubun
Proceedings of International Conference on Advances in Mobile Computing …, 2013
122013
MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability
T Takada, Y Kokubun
International Journal of Pervasive Computing and Communications, 2014
62014
CCC: shoulder surfing resistant authentication system by using vibration
M Ishizuka, T Takada
IPSJ Interaction 2014, 501-503, 2014
62014
fakePointer: The authentication technique which has tolerance to video recording attacks
T Takada
IPSJ transaction 49 (9), 3051-3061, 2008
62008
fakePointer: A User Authentication Scheme that Makes Peeping Attack with a Video Camera Hard
T Takada
IPSJ Journal 49 (9), 3051-3061, 2008
62008
逃げログ: 削除まで考慮にいれたログ情報保護手法
高田哲司, 小池英樹
情報処理学会論文誌 41 (3), 823-831, 2000
62000
fakePointer: an authentication scheme for a better security against a peeping attack by a video camera
T Takada
Proc. of the 2nd International Conference on Mobile Ubiquitous Computing …, 2008
52008
fakePointer2: The proposal of the user interface to improve safety to the peep attack about the individual authentication
T Takada
Cryptography and Information Security Symposium, SCIS2007, 2007
52007
MieLog: Log information browser with information visualization and text mining
T Takada, H Koike
IPSJ Journal 41 (12), 3265-3275, 2000
52000
Chameleon dial: repeated camera-recording attack resilient PIN input scheme
T Takada, M Ishizuka
Adjunct Proceedings of the 2015 ACM International Joint Conference on …, 2015
32015
Awase-E: the Method Enables an Imagebased Authentication to be More Secure and Familiar for Users with Providing Image Registration and User Notification
T Takada, H Koike
IPSJ Journal 44 (8), 2002-2012, 2003
32003
The system can't perform the operation now. Try again later.
Articles 1–20