default search action
Kenta Takahashi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c40]Wataru Nakamura, Kenta Takahashi:
How to Efficiently Determine the Lattice Scale for Fuzzy Extractors and Fuzzy Signatures. CANDAR 2024: 196-202 - [c39]Takuto Akiyoshi, Kota Nieda, Yusaku Takahama, Kenta Takahashi, Kaito Nakamura, Taishi Sawabe:
Egg-Laying Robot to Enhance Mind Perception of Children and Parents. HRI (Companion) 2024: 187-190 - [i8]Yosuke Kaga, Yusei Suzuki, Kenta Takahashi:
IPFed: Identity protected federated learning for user authentication. CoRR abs/2405.03955 (2024) - [i7]Kenta Takahashi, Wataru Nakamura:
A Linear-Time Algorithm for the Closest Vector Problem of Triangular Lattices. CoRR abs/2412.06091 (2024) - 2023
- [c38]Wataru Nakamura, Kenta Takahashi:
A Biometric Signature Scheme with Template Protection and Authenticated Sample Recoverability. APSIPA ASC 2023: 1784-1791 - [c37]Yosuke Kaga, Yusei Suzuki, Kenta Takahashi:
IPFed: Identity protected federated learning for user authentication. APSIPA ASC 2023: 1792-1797 - [c36]Taito Tonosaki, Shokei Kawakami, Koichi Ito, Takafumi Aoki, Yoshiko Yasumura, Masakazu Fujio, Yosuke Kaga, Kenta Takahashi:
Eye Biometrics Combined with Periocular and Iris Recognition Using CNN. APSIPA ASC 2023: 1804-1810 - [c35]Masakazu Fujio, Keiichiro Nakazaki, Naoto Miura, Yosuke Kaga, Kenta Takahashi:
Finger Region Estimation by Boundary Curve Modeling and Bezier Curve Learning. ICPRAM 2023: 371-378 - 2022
- [j15]Koichi Ito, Yusei Suzuki, Hiroya Kawai, Takafumi Aoki, Masakazu Fujio, Yosuke Kaga, Kenta Takahashi:
HandSegNet: Hand segmentation using convolutional neural network for contactless palmprint recognition. IET Biom. 11(2): 109-123 (2022) - 2021
- [j14]Takao Murakami, Kenta Takahashi:
Toward Evaluating Re-identification Risks in the Local Privacy Model. Trans. Data Priv. 14(3): 79-116 (2021) - [c34]Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura, Rie Shigetomi Yamaguchi:
Template Protected Authentication based on Location History and b-Bit MinHash. ARES 2021: 98:1-98:8 - [c33]Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi:
Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics. CCS 2021: 2046-2065 - [c32]Yoshiko Yasumura, Masakazu Fujio, Wataru Nakamura, Yosuke Kaga, Kenta Takahashi:
Template Protected Fingerprint Verification using Set Similarity-based Minutia Cylinder Code and MinHash. CANDAR 2021: 203-209 - [i6]Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi:
Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics. CoRR abs/2112.08658 (2021) - 2020
- [c31]Ken Naganuma, Takayuki Suzuki, Masayuki Yoshino, Kenta Takahashi, Yosuke Kaga, Noboru Kunihiro:
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature. AsiaJCIS 2020: 54-58 - [c30]Koki Mukaihira, Yasuyoshi Jinno, Takashi Tsuchiya, Tetsushi Ohki, Kenta Takahashi, Wakaha Ogata, Masakatsu Nishigaki:
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks. IHSI 2020: 503-509 - [i5]Takao Murakami, Kenta Takahashi:
Toward Evaluating Re-identification Risks in the Local Privacy Model. CoRR abs/2010.08238 (2020)
2010 – 2019
- 2019
- [j13]Takao Murakami, Ryo Fujita, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification. IEEE Access 7: 45563-45582 (2019) - [j12]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature schemes with a fuzzy private key. Int. J. Inf. Sec. 18(5): 581-617 (2019) - [j11]Takao Murakami, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable indexing based on low-rank approximation of correlation-invariant random filtering for fast and secure biometric identification. Pattern Recognit. Lett. 126: 11-20 (2019) - [c29]Yusei Suzuki, Hiroya Kawai, Koichi Ito, Takafumi Aoki, Masakazu Fujio, Yosuke Kaga, Kenta Takahashi:
Hand Segmentation for Contactless Palmprint Recognition. ACPR (1) 2019: 902-912 - [c28]Wataru Nakamura, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Security and Efficiency of Biometric Template Protection for Identification. APSIPA 2019: 210-217 - [c27]Yosuke Kaga, Masakazu Fujio, Kenta Takahashi, Tetsushi Ohki, Masakatsu Nishigaki:
PDH : Probabilistic Deep Hashing Based on Map Estimation of Hamming Distance. ICIP 2019: 2229-2233 - [c26]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. Public Key Cryptography (1) 2019: 549-580 - [i4]Yosuke Kaga, Masakazu Fujio, Kenta Takahashi, Tetsushi Ohki, Masakatsu Nishigaki:
PDH : Probabilistic deep hashing based on MAP estimation of Hamming distance. CoRR abs/1905.08501 (2019) - [i3]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. IACR Cryptol. ePrint Arch. 2019: 50 (2019) - 2018
- [c25]Kenta Takahashi, Takao Murakami:
A Generalization of the Theory of Biometric System Entropy. APSIPA 2018: 1-6 - [c24]Masakazu Fujio, Yosuke Kaga, Takao Murakami, Tetsushi Ohki, Kenta Takahashi:
Face/Fingerphoto Spoof Detection under Noisy Conditions by using Deep Convolutional Neural Network. BIOSIGNALS 2018: 54-62 - [c23]Takahiro Matsuda, Kenta Takahashi, Goichiro Hanaoka:
On the Security of Linear Sketch Schemes against Recovering Attacks. ICETE (2) 2018: 242-253 - [i2]Takao Murakami, Tetsushi Ohki, Yosuke Kaga, Masakazu Fujio, Kenta Takahashi:
Cancelable Indexing Based on Low-rank Approximation of Correlation-invariant Random Filtering for Fast and Secure Biometric Identification. CoRR abs/1804.01670 (2018) - 2017
- [j10]Takao Murakami, Yosuke Kaga, Kenta Takahashi:
Modality Selection Attacks and Modality Restriction in Likelihood-Ratio Based Biometric Score Fusion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 3023-3037 (2017) - [c22]Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki:
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. ISPEC 2017: 877-891 - [i1]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
Signature Schemes with a Fuzzy Private Key. IACR Cryptol. ePrint Arch. 2017: 1188 (2017) - 2016
- [j9]Takao Murakami, Yosuke Kaga, Kenta Takahashi:
Information-Theoretic Performance Evaluation of Multibiometric Fusion under Modality Selection Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(5): 929-942 (2016) - [j8]Takao Murakami, Tetsushi Ohki, Kenta Takahashi:
Optimal sequential fusion for multibiometric cryptosystems. Inf. Fusion 32: 93-108 (2016) - [c21]Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Fuzzy Signatures: Relaxing Requirements and a New Construction. ACNS 2016: 97-116 - [c20]Takashi Tsuchiya, Masahiro Fujita, Kenta Takahashi, Takehisa Kato, Fumihiko Magata, Yoshimi Teshigawara, Ryôichi Sasaki, Masakatsu Nishigaki:
Secure Communication Protocol Between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks. HCI (20) 2016: 77-88 - [c19]Kenta Takahashi, Yusuke Monno, Masayuki Tanaka, Masatoshi Okutomi:
Effective color correction pipeline for a noisy image. ICIP 2016: 4002-4006 - [c18]Takao Murakami, Yosuke Kaga, Kenta Takahashi:
On restricting modalities in likelihood-ratio based biometric score fusion. ICPR 2016: 3036-3042 - [c17]Kenta Takahashi, Takashi Abe, Masayuki Sohgawa, Masanori Okuyama, Haruo Noma:
Evaluation method of fabrics by visual and tactile texture information using MEMS combo sensor. IEEE SENSORS 2016: 1-3 - [c16]Masahiro Fujita, Yuto Mano, Takuya Kaneko, Kenta Takahashi, Masakatsu Nishigaki:
A Micro Biometric Authentication Mechanism Considering Minute Patterns of the Human Body: A Proposal and the First Attempt. NBiS 2016: 159-164 - 2015
- [j7]Kenichi Karatsu, Satoru Mima, Shugo Oguri, Jihoon Choi, R. M. Thushara Damayanthi, Agnes Dominjon, Noboru Furukawa, Hirokazu Ishino, Hikaru Ishitsuka, Atsuko Kibayashi, Yoshiaki Kibe, Hitoshi Kiuchi, Kensuke Koga, Masato Naruse, Tom Nitta, Takashi Noguchi, Takashi Okada, Chiko Otani, Shigeyuki Sekiguchi, Yutaro Sekimoto, Masakazu Sekine, Shibo Shu, Osamu Tajima, Kenta Takahashi, Nozomu Tomita, Hiroki Watanabe, Mitsuhiro Yoshida:
Development of Microwave Kinetic Inductance Detector for Cosmological Observations. IEICE Trans. Electron. 98-C(3): 207-218 (2015) - [c15]Kenta Takahashi, Takahiro Matsuda, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki:
A Signature Scheme with a Fuzzy Private Key. ACNS 2015: 105-126 - [c14]Takao Murakami, Kenta Takahashi:
Information-theoretic performance evaluation of likelihood-ratio based biometric score fusion under modality selection attacks. BTAS 2015: 1-8 - 2014
- [j6]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification. IEICE Trans. Inf. Syst. 97-D(3): 510-523 (2014) - [j5]Kenta Takahashi, Takao Murakami:
A measure of information gained through biometric systems. Image Vis. Comput. 32(12): 1194-1203 (2014) - [j4]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics. IEEE Trans. Inf. Forensics Secur. 9(2): 259-271 (2014) - 2013
- [j3]Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii:
Probabilistic enhancement of approximate indexing in metric spaces. Inf. Syst. 38(7): 1007-1018 (2013) - 2012
- [j2]Kenta Takahashi, Ken Naganuma:
Unconditionally provably secure cancellable biometrics based on a quotient polynomial ring. IET Biom. 1(1): 63-71 (2012) - [c13]Seira Hidano, Tetsushi Ohki, Kenta Takahashi:
Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme. BIOSIG 2012: 1-6 - [c12]Takao Murakami, Kenta Takahashi, Kanta Matsuura:
Towards optimal countermeasures against wolves and lambs in biometrics. BTAS 2012: 69-76 - 2011
- [j1]Kenta Takahashi, Shinji Hirata:
Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 233-244 (2011) - [c11]Kenta Takahashi, Shinji Hirata:
Parameter management schemes for cancelable biometrics. CIBIM 2011: 145-151 - [c10]Takao Murakami, Kenta Takahashi:
Fast and accurate biometric identification using score level indexing and fusion. IJCB 2011: 1-8 - [c9]Kenta Takahashi:
Unconditionally provably secure cancelable biometrics based on a quotient polynomial ring. IJCB 2011: 1-8 - [c8]Takao Murakami, Kenta Takahashi, Susumu Serita, Yasuhiro Fujii:
Versatile probability-based indexing for approximate similarity search. SISAP 2011: 51-58 - 2010
- [c7]Seira Hidano, Tetsushi Ohki, Naohisa Komatsu, Kenta Takahashi:
A metric of identification performance of biometrics based on information content. ICARCV 2010: 1274-1279
2000 – 2009
- 2009
- [c6]Shinji Hirata, Kenta Takahashi:
Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. ICB 2009: 868-878 - [c5]Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki:
A Proposal of Efficient Remote Biometric Authentication Protocol. IWSEC 2009: 212-227 - [c4]Takao Murakami, Kenta Takahashi:
Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test. WIFS 2009: 66-70 - 2007
- [c3]Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:
A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value. Security and Management 2007: 45-51 - 2006
- [c2]Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki:
Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. Security and Management 2006: 468-474 - 2004
- [c1]Atsushi Kara, Takahiro Suzuki, Kenta Takahashi, Masayuki Yoshikaw:
A DoS-Vulnerability Analysis of L2TP-VPN. CIT 2004: 397-402
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 23:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint