Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection., , and . Security and Management, page 188-194. CSREA Press, (2009)A robotic system for images on carpet surface., and . Graph. Vis. Comput., (2022)Masktrap: Designing and Identifying Gestures to Transform Mask Strap into an Input Interface., , , and . IUI, page 762-775. ACM, (2023)PAM4 48-Gbit/s wireless communication using a resonant tunneling diode in the 300-GHz band., , , , , , and . IEICE Electron. Express, 19 (2): 20210494 (2022)Analysis of the Relationship Between Psychological Manipulation Techniques and Personality Factors in Targeted Emails., , , , and . BWCCA, volume 97 of Lecture Notes in Networks and Systems, page 338-351. Springer, (2019)A Proposal of Four-Panel Cartoon CAPTCHA: The Concept., , and . NBiS, page 575-578. IEEE Computer Society, (2010)A Proposal of Four-Panel Cartoon CAPTCHA., , and . AINA, page 159-166. IEEE Computer Society, (2011)A Security Measure Selection Scheme with Consideration of Potential Lawsuits., , , , , and . Security and Management, page 104-110. CSREA Press, (2010)Basic Study on Targeted E-mail Attack Method Using OSINT., , , , , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 1329-1341. Springer, (2019)A Study on Enhancing Anomaly Detection Technology with Synthetic-Log Generation., , , , and . AINA (2), volume 450 of Lecture Notes in Networks and Systems, page 528-538. Springer, (2022)