![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Masakatsu Nishigaki
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Ren Takeuchi, Rikima Mitsuhashi
, Masakatsu Nishigaki, Tetsushi Ohki:
Ensemble Malware Classifier Considering PE Section Information. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 306-318 (2024) - [j13]Jun Narita, Takao Murakami, Hideitsu Hino, Masakatsu Nishigaki, Tetsushi Ohki
:
Synthesizing differentially private location traces including co-locations. Int. J. Inf. Sec. 23(1): 389-410 (2024) - [c84]Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki:
Messages and Incentives to Promote Updating of Software on Smartphones. AINA (4) 2024: 187-200 - [c83]Kota Numada, Shinnosuke Nozaki, Takumi Takaiwa, Tetsushi Ohki, Masakatsu Nishigaki:
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering. EIDWT 2024: 152-162 - [c82]Toi Kojima, Tomoya Aiba, Soshi Maeda, Hiromi Arai, Masakatsu Nishigaki
, Tetsushi Ohki
:
Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction. HCI (37) 2024: 66-78 - [c81]Takumi Takaiwa, Shinnosuke Nozaki, Kota Numada, Tsubasa Shibata, Sana Okumura, Soichi Takigawa, Tetsushi Ohki
, Masakatsu Nishigaki
:
Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data. HCI (46) 2024: 234-249 - [c80]Tetsushi Ohki, Yuya Sato, Masakatsu Nishigaki, Koichi Ito:
LabellessFace: Fair Metric Learning for Face Recognition without Attribute Labels. IJCB 2024: 1-8 - [c79]Tomoya Aiba
, Takahiko Arakawa
, Masakatsu Nishigaki
, Tatsuya Mori
, Tetsushi Ohki
:
MagSerea: Fingerprinting Magnetic Field of Specified Area with Wearable Sensors. MobileHCI (Companion) 2024: 6:1-6:6 - [c78]Soshi Maeda
, Masora Okano
, Masakatsu Nishigaki
, Tetsushi Ohki
:
DAP PLXENT#x1D107; : Develop pair-Authentication Protocol with DAP. MobileHCI (Companion) 2024: 11:1-11:6 - [c77]Tussoun Jitpanyoyos, Yuya Sato, Soshi Maeda, Masakatsu Nishigaki, Tetsushi Ohki:
ExpressionAuth: Utilizing Avatar Expression Blendshapes for Behavioral Biometrics in VR. VR Workshops 2024: 679-680 - [i5]Tetsushi Ohki, Yuya Sato, Masakatsu Nishigaki, Koichi Ito:
LabellessFace: Fair Metric Learning for Face Recognition without Attribute Labels. CoRR abs/2409.09274 (2024) - [i4]Koichi Ito, Taito Tonosaki, Takafumi Aoki, Tetsushi Ohki, Masakatsu Nishigaki:
Multibiometrics Using a Single Face Image. CoRR abs/2409.20003 (2024) - [i3]Masora Okano, Koichi Ito, Masakatsu Nishigaki, Tetsushi Ohki:
Enhancing Remote Adversarial Patch Attacks on Face Detectors with Tiling and Scaling. CoRR abs/2412.07996 (2024) - 2023
- [j12]Hiroshi Horikawa
, Hisamichi Ohtani, Yuji Takahashi, Takehisa Kato, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
Enhancement of a Company-Wide Information Security Management System Through Incident Learning. SN Comput. Sci. 4(3): 211 (2023) - [c76]Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki:
Human Factors Impacting the Security Actions of Help Recipients. BWCCA 2023: 81-93 - [c75]Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki:
Proposal for Approaches to Updating Software on Android Smartphone. BWCCA 2023: 94-108 - [c74]Sana Okumura, Tomoya Amagasa, Tsubasa Shibata, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki:
Scheme for Selection of Deceptions as a Countermeasure for Insider Threats. BWCCA 2023: 109-121 - 2022
- [c73]Takamichi Terada, Vo Ngoc Khoi Nguyen, Masakatsu Nishigaki, Tetsushi Ohki:
Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation. AINA (2) 2022: 586-597 - [c72]Muku Akasaka, Soshi Maeda, Yuya Sato, Masakatsu Nishigaki, Tetsushi Ohki:
Model-Free Template Reconstruction Attack with Feature Converter. BIOSIG 2022: 14-22 - [c71]Kohei Yagyu, Ren Takeuchi, Masakatsu Nishigaki, Tetsushi Ohki:
Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption. BWCCA 2022: 102-113 - [c70]Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Mizuho Yoshihira, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition. BWCCA 2022: 125-136 - [c69]Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki
:
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. HCI (32) 2022: 78-93 - [c68]Shinnosuke Nozaki, Ayumi Serizawa, Mizuho Yoshihira, Masahiro Fujita, Yoichi Shibata, Tadakazu Yamanaka, Nori Matsuda, Tetsushi Ohki, Masakatsu Nishigaki:
Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential. NBiS 2022: 201-211 - 2021
- [c67]Vo Ngoc Khoi Nguyen, Takamichi Terada, Masakatsu Nishigaki, Tetsushi Ohki:
Examining of Shallow Autoencoder on Black-box Attack against Face Recognition. APSIPA ASC 2021: 1775-1780 - [c66]Jun Narita, Yayoi Suganuma, Masakatsu Nishigaki, Takao Murakami, Tetsushi Ohki:
Synthesizing Privacy-Preserving Location Traces Including Co-locations. DPM/CBT@ESORICS 2021: 20-36 - [c65]Takumi Kitagawa, Tetsushi Ohki, Yuki Koizumi, Yoshinobu Kawabe, Toru Hasegawa, Masakatsu Nishigaki:
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers. NBiS 2021: 188-201 - 2020
- [j11]Nori Matsuda, Takato Hirano, Yutaka Kawai, Takashi Ito, Mitsuhiro Hattori, Tadakazu Yamanaka, Masakatsu Nishigaki:
Public-key Searchable Encryption with Index Generation for Shared Database. J. Inf. Process. 28: 520-536 (2020) - [c64]Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of the Relationship Between Psychological Manipulation Techniques and Both Personality Factors and Behavioral Characteristics in Targeted Email. AINA 2020: 1278-1290 - [c63]Yuya Shiomi, Genki Sugimoto, Ayaka Sugimoto, Kota Uehara, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki:
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use. AINA 2020: 1330-1340 - [c62]Yumo Ouchi, Ryosuke Okudera, Yuya Shiomi, Kota Uehara, Ayaka Sugimoto, Tetsushi Ohki, Masakatsu Nishigaki:
Study on Possibility of Estimating Smartphone Inputs from Tap Sounds. APSIPA 2020: 1425-1429 - [c61]Hiroki Nishikawa, Takumi Yamamoto, Bret A. Harsham, Ye Wang, Kota Uehara, Chiori Hori, Aiko Iwasaki, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of Malicious Email Detection using Cialdini's Principles. AsiaJCIS 2020: 137-142 - [c60]Kotomi Kuroki, Yo Kanemoto, Kazufumi Aoki, Yasuhiro Noguchi, Masakatsu Nishigaki:
Attack Intention Estimation Based on Syntax Analysis and Dynamic Analysis for SQL Injection. COMPSAC 2020: 1510-1515 - [c59]Yayoi Suganuma, Jun Narita, Masakatsu Nishigaki, Tetsushi Ohki
:
Understanding the Impact of Service Trials on Privacy Disclosure. HCI (40) 2020: 605-612 - [c58]Ayaka Sugimoto, Yuya Shiomi, Akira Baba, Norihiro Okui
, Tetsushi Ohki, Yutaka Miyake, Masakatsu Nishigaki:
A Liveness Detection Method for Palmprint Authentication. IHSI 2020: 385-391 - [c57]Koki Mukaihira, Yasuyoshi Jinno, Takashi Tsuchiya, Tetsushi Ohki, Kenta Takahashi, Wakaha Ogata, Masakatsu Nishigaki:
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks. IHSI 2020: 503-509
2010 – 2019
- 2019
- [j10]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature schemes with a fuzzy private key. Int. J. Inf. Sec. 18(5): 581-617 (2019) - [c56]Kota Uehara, Kohei Mukaiyama, Masahiro Fujita, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Basic Study on Targeted E-mail Attack Method Using OSINT. AINA 2019: 1329-1341 - [c55]Tetsushi Ohki, Vishu Gupta, Masakatsu Nishigaki:
Efficient Spoofing Attack Detection against Unknown Sample using End-to-End Anomaly Detection. APSIPA 2019: 224-230 - [c54]Kota Uehara, Hiroki Nishikawa, Takumi Yamamoto, Kiyoto Kawauchi, Masakatsu Nishigaki:
Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted Emails. BWCCA 2019: 338-351 - [c53]Yosuke Kaga, Masakazu Fujio, Kenta Takahashi, Tetsushi Ohki, Masakatsu Nishigaki:
PDH : Probabilistic Deep Hashing Based on Map Estimation of Hamming Distance. ICIP 2019: 2229-2233 - [c52]Mohammad Jahanian, Toru Hasegawa, Yoshinobu Kawabe, Yuki Koizumi, Amr Magdy, Masakatsu Nishigaki, Tetsushi Ohki, K. K. Ramakrishnan:
DiReCT: Disaster Response Coordination with Trusted Volunteers. ICT-DM 2019: 1-8 - [c51]Yoshinobu Kawabe, Yuki Koizumi, Tetsushi Ohki, Masakatsu Nishigaki, Toru Hasegawa, Tetsuhisa Oda:
On Trust Confusional, Trust Ignorant, and Trust Transitions. IFIPTM 2019: 178-195 - [i2]Yosuke Kaga, Masakazu Fujio, Kenta Takahashi, Tetsushi Ohki, Masakatsu Nishigaki:
PDH : Probabilistic deep hashing based on MAP estimation of Hamming distance. CoRR abs/1905.08501 (2019) - 2018
- [j9]Masakatsu Nishigaki
:
Humanics information security. Concurr. Comput. Pract. Exp. 30(2) (2018) - [c50]Toshiki Honda, Kohei Mukaiyama, Takeharu Shirai, Tetsushi Ohki, Masakatsu Nishigaki:
Ransomware Detection Considering User's Document Editing. AINA 2018: 907-914 - [c49]Keisuke Inoue, Toshiki Honda, Kohei Mukaiyama, Tetsushi Ohki, Masakatsu Nishigaki:
Automatic Examination-Based Whitelist Generation for XSS Attack Detection. BWCCA 2018: 326-338 - [c48]Genki Sugimoto, Masahiro Fujita, Yuto Mano, Tetsushi Ohki, Masakatsu Nishigaki:
Micro Disposable Biometric Authentication: An Application Using Fingernail Minute Textures for Nonsensitive Services. ICBSP 2018: 68-73 - [c47]Yosuke Takahashi, Masashi Endo, Hiroaki Matsuno, Hiroaki Muramatsu, Tetsushi Ohki, Masakatsu Nishigaki:
A Study on Human Reflex-Based Biometric Authentication Using Eye-Head Coordination. NBiS 2018: 419-429 - [c46]Nobuhiro Kobayashi, Koichi Shimizu, Tsunato Nakai, Teruyoshi Yamaguchi, Masakatsu Nishigaki:
Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS. NBiS 2018: 430-444 - 2017
- [j8]Masakatsu Nishigaki:
Editor's Message to Special Issue on "Towards Secure Society Considering Things and Human Aspects". J. Inf. Process. 25: 1 (2017) - [c45]Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki:
Directcha-maze: A Study of CAPTCHA Configuration with Machine Learning and Brute-Force Attack Defensibility Along with User Convenience Consideration. BWCCA 2017: 489-501 - [c44]Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki:
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. ISPEC 2017: 877-891 - [c43]Kohei Mukaiyama, Masahiro Fujita, Takeharu Shirai, Shinya Kobayashi, Masakatsu Nishigaki:
Slyware Prevention: Threat of Websites Inducing Accidental Taps and Countermeasures. NBiS 2017: 539-552 - [c42]Ogawa Tetsuji, Yuhashi Hiroyasu, Masakatsu Nishigaki:
Social Innovation Based on the Business Process Perspective: A Case Study of an Unattended Movable Store. PACIS 2017: 252 - [i1]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature Schemes with a Fuzzy Private Key. IACR Cryptol. ePrint Arch. 2017: 1188 (2017) - 2016
- [c41]Takashi Tsuchiya, Masahiro Fujita, Kenta Takahashi, Takehisa Kato, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks. HCI (20) 2016: 77-88 - [c40]Masahiro Fujita, Mako Yamada, Masakatsu Nishigaki:
Implementation and Initial Evaluation of Game in Which Password Enhancement Factor is Embedded. HCI (26) 2016: 476-481 - [c39]Masahiro Fujita, Yuto Mano, Takuya Kaneko, Kenta Takahashi, Masakatsu Nishigaki:
A Micro Biometric Authentication Mechanism Considering Minute Patterns of the Human Body: A Proposal and the First Attempt. NBiS 2016: 159-164 - [c38]Takeharu Shirai, Masahiro Fujita, Daisuke Arai, Tomohiko Ogishi, Masakatsu Nishigaki:
Study on relationship between user awareness and QoE in communication delay on smartphones. PST 2016: 573-580 - [c37]Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki:
Directcha: A proposal of spatiometric mental rotation CAPTCHA. PST 2016: 585-592 - 2015
- [c36]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
A Signature Scheme with a Fuzzy Private Key. ACNS 2015: 105-126 - [c35]Masahiro Fujita, Yuki Ikeya, Junya Kani, Masakatsu Nishigaki:
Chimera CAPTCHA: A Proposal of CAPTCHA Using Strangeness in Merged Objects. HCI (22) 2015: 48-58 - [c34]Daisuke Arai, Tomohiko Ogishi, Masafumi Watari, Shigehiro Ano, Masakatsu Nishigaki, Hiroshi Mineno:
UE-based network access timing control scheme for avoiding signaling spikes. ICC 2015: 3604-3609 - [c33]Masahiro Fujita, Mako Yamada, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki:
An Attempt to Memorize Strong Passwords while Playing Games. NBiS 2015: 264-268 - [c32]Masahiro Fujita, Christian Damsgaard Jensen
, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki:
Physical trust-based persistent authentication. PST 2015: 186-190 - 2014
- [c31]Yuki Ikeya, Masahiro Fujita, Junya Kani, Yuta Yoneyama, Masakatsu Nishigaki:
An Image-Based CAPTCHA Using Sophisticated Mental Rotation. HCI (24) 2014: 57-68 - [c30]Shiori Arimura, Masahiro Fujita, Shinya Kobayashi, Junya Kani, Masakatsu Nishigaki, Akira Shiba:
i/k-Contact: A context-aware user authentication using physical social trust. PST 2014: 407-413 - 2013
- [c29]Junya Kani, Masakatsu Nishigaki:
Gamified CAPTCHA. HCI (27) 2013: 39-48 - [c28]Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Junya Kani, Harunobu Agematsu, Masakatsu Nishigaki:
SanAdBox: Sandboxing third party advertising libraries in a mobile application. ICC 2013: 2150-2154 - [c27]Takuya Kaneko, Takumi Nagaya, Keisuke Takemori, Yutaka Miyake, Masakatsu Nishigaki:
A Proposal for the Deterrence of Information Leakage Using Anti-virus Software. NBiS 2013: 90-96 - 2012
- [c26]Noriyuki Komine, Masakatsu Nishigaki, Tadanori Mizuno, Kunihiro Yamada:
A Design Method of Derivative State Constrained H 2 Integral Servo Controller for Suppressing under Damping of Oscillatory System. AsiaSim (1) 2012: 151-162 - [c25]Harunobu Agematsu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Masakatsu Nishigaki:
A Proposal to Realize the Provision of Secure Android Applications - ADMS: An Application Development and Management System. IMIS 2012: 677-682 - 2011
- [j7]Keisuke Takemori, Takahiro Sakai, Masakatsu Nishigaki, Yutaka Miyake:
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists. Inf. Media Technol. 6(2): 649-659 (2011) - [j6]Keisuke Takemori, Takahiro Sakai, Masakatsu Nishigaki, Yutaka Miyake:
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists. J. Inf. Process. 19: 169-179 (2011) - [c24]Masaki Fujikawa, Masakatsu Nishigaki:
A Study of Prevention for Social Engineering Attacks Using Real/Fake Organization's Uniforms: Application of Radio and Intra-Body Communication Technologies. ARES 2011: 597-602 - [c23]Takumi Yamamoto, Tokuichiro Suzuki, Masakatsu Nishigaki:
A Proposal of Four-Panel Cartoon CAPTCHA. AINA 2011: 159-166 - [c22]Kohei Nasaka, Tomohiro Takami, Takumi Yamamoto, Masakatsu Nishigaki:
A Keystroke Logger Detection Using Keyboard-Input-Related API Monitoring. NBiS 2011: 651-656 - [c21]Takehisa Kato, Kohei Nasaka, Takumi Yamamoto, Masakatsu Nishigaki:
A Study on a Practical Measure against Billing Frauds. NBiS 2011: 667-672 - [e2]Tetsu Iwata, Masakatsu Nishigaki:
Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings. Lecture Notes in Computer Science 7038, Springer 2011, ISBN 978-3-642-25140-5 [contents] - 2010
- [j5]Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki:
Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput. 14(5): 529-536 (2010) - [c20]Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigaki:
CAPTCHA Using Strangeness in Machine Translation. AINA 2010: 430-437 - [c19]Takumi Yamamoto, Yuma Usui, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
A Security Measure Selection Scheme with Consideration of Potential Lawsuits. Security and Management 2010: 104-110 - [c18]Masaki Fujikawa, Kenji Furusawa, Hiroyuki Aoki, Masakatsu Nishigaki, Masasumi Yoshizawa:
Study of Garment-Wearing Detecting System Using Intra-Body Communication Technology. ICWN 2010: 302-308 - [c17]Takumi Yamamoto, Tokuichiro Suzuki, Masakatsu Nishigaki:
A Proposal of Four-Panel Cartoon CAPTCHA: The Concept. NBiS 2010: 575-578 - [e1]Masakatsu Nishigaki, Audun Jøsang
, Yuko Murayama, Stephen Marsh:
Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings. IFIP Advances in Information and Communication Technology 321, Springer 2010, ISBN 978-3-642-13445-6 [contents]
2000 – 2009
- 2009
- [j4]Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki:
IP Traceback Using DNS Logs against Bots. Inf. Media Technol. 4(4): 1076-1085 (2009) - [j3]Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki:
IP Traceback Using DNS Logs against Bots. J. Inf. Process. 17: 232-241 (2009) - [c16]Masakatsu Nishigaki, Takumi Yamamoto:
Making Use of Human Visual Capability to Improve Information Security. ARES 2009: 990-994 - [c15]Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Advantages of User Authentication Using Unclear Images. AINA 2009: 668-674 - [c14]Takumi Yamamoto, Yuko Kojima, Masakatsu Nishigaki:
A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection. Security and Management 2009: 188-194 - [c13]Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki:
Host-based traceback; tracking bot and C&C server. ICUIMC 2009: 400-405 - [c12]Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata
, Hiroaki Kikuchi, Masakatsu Nishigaki:
A Proposal of Efficient Remote Biometric Authentication Protocol. IWSEC 2009: 212-227 - 2008
- [j2]Masakatsu Nishigaki, Daisuke Arai:
A user authentication based on human reflexes using blind spot and saccade response. Int. J. Biom. 1(2): 173-190 (2008) - [c11]Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story". AINA 2008: 40-47 - [c10]Masakatsu Nishigaki, Yoichi Shibata:
Physical Access Control with Biometric Keys. Security and Management 2008: 213-219 - [c9]Keisuke Takemori, Masakatsu Nishigaki, Tomohiro Takami, Yutaka Miyake:
Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term. GLOBECOM 2008: 2072-2077 - [c8]Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata
, Masakatsu Nishigaki:
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication. MDAI 2008: 3-14 - 2007
- [c7]Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata
, Masakatsu Nishigaki:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. ARES 2007: 1155-1159 - [c6]Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:
A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value. Security and Management 2007: 45-51 - [c5]Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki:
Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue. Security and Management 2007: 58-64 - 2006
- [c4]Atsushi Harada, Takeo Isarida, Tadanori Mizuno, Masakatsu Nishigaki:
A User Authentication System Using Schema of Visual Memory. BioADIT 2006: 338-345 - [c3]Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. Security and Management 2006: 468-474 - 2003
- [j1]Masakatsu Nishigaki, Makoto Nakano, Masakazu Soga:
A fault-tolerant combinational circuit with fault diagnosis capability - To mask and detect the loss of any one connection between gate circuits. Syst. Comput. Jpn. 34(11): 67-80 (2003)
1990 – 1999
- 1994
- [c2]Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai:
Mixed Mode Circuit Simulator SPLIT2.1 using Dynamic Network Separation and Selective Trace. ISCAS 1994: 9-12 - [c1]Masaki Ishida, Koichi Hayashi, Masakatsu Nishigaki, Hideki Asai:
Iterated Timing Analysis with Dynamic Partitioning Technique for Bipolar Transistor Circuits. ISCAS 1994: 411-414
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 21:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint