default search action
Tetsuji Takada
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c17]Tetsuji Takada, Daniel Schwarz:
Design Exploration for Better Security of Recognition-Based Image Authentication in Mobile Environment. MoMM 2022: 71-77 - 2021
- [c16]Tetsuji Takada, Mitsuhiro Yoshida:
Pict-Place Authentication: Recognition-based Graphical Password using Image Layout for Better Balance of Security and Operation Time. CHItaly 2021: 8:1-8:7 - 2020
- [c15]Tetsuji Takada, Yumeji Hattori:
Giving Motivation for Using Secure Credentials through User Authentication by Game. AVI 2020: 85:1-85:3
2010 – 2019
- 2018
- [c14]Tetsuji Takada, Takaaki Abe:
Emoji-nized log browser: visualization of server-logs by emoji for system administrators. AVI 2018: 86:1-86:3 - [c13]Rei Yamagishi, Tetsuji Takada:
AssociPass: A User Authentication System with Word-Pairs for Security against Guess Attack. CHI Extended Abstracts 2018 - 2017
- [c12]Tetsuji Takada:
Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control. ARES 2017: 41:1-41:9 - [c11]Ryo Minakawa, Tetsuji Takada:
Exploring alternative security warning dialog for attracting user attention: evaluation of "Kawaii" effect and its additional stimulus combination. iiWAS 2017: 582-586 - 2015
- [c10]Tetsuji Takada, Masaya Ishizuka:
Chameleon dial: repeated camera-recording attack resilient PIN input scheme. UbiComp/ISWC Adjunct 2015: 365-368 - [c9]Shouta Mochizuki, Tetsuji Takada:
Client-oriented web alteration detection system using link change state of a web page based on past and current page content. iiWAS 2015: 84:1-84:5 - [c8]Hayate Goto, Tetsuji Takada:
Anomalous network communication detection system by visual pattern on a client computer. SAC 2015: 1263-1269 - [c7]Tetsuji Takada, Katsuhiro Amako:
A Visual Approach to Detecting Drive-by Download Attacks. VINCI 2015: 162-163 - 2014
- [j1]Tetsuji Takada, Yuki Kokubun:
MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability. Int. J. Pervasive Comput. Commun. 10(3): 276-290 (2014) - 2013
- [c6]Tetsuji Takada, Yuki Kokubun:
Extended PIN Authentication Scheme Allowing Multi-Touch Key Input. MoMM 2013: 307
2000 – 2009
- 2003
- [c5]Tetsuji Takada, Hideki Koike:
Awase-E: Image-Based Authentication for Mobile Phones Using User's Favorite Images. Mobile HCI 2003: 347-351 - 2002
- [c4]Tetsuji Takada, Hideki Koike:
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs. IV 2002: 570-576 - [c3]Tetsuji Takada, Hideki Koike:
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis. LISA 2002: 133-144
1990 – 1999
- 1999
- [c2]Tetsuji Takada, Hideki Koike:
NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories. DEXA Workshop 1999: 874-878 - 1997
- [c1]Hideki Koike, Tetsuji Takada, Toshiyuki Masui:
VisuaLinda: A Framework for Visualizing Parallel Linda Programs. VL 1997: 176-182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint