|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
BioX |
2018-10-11 15:40 |
Okinawa |
Nobumoto Ohama Memorial Hall |
On Information Gained from Pseudonymized Location Traces Takao Murakami (AIST) BioX2018-22 |
Re-identification attacks for pseudonymized location traces have been widely studied to understand the risk of location ... [more] |
BioX2018-22 pp.19-23 |
BioX |
2017-10-13 09:50 |
Okinawa |
Nobumoto Ohama Memorial Hall |
* Ryo Fujita, Takao Murakami (AIST), Tetsushi Ohki (Shizuoka Univ.), Yosuke Kaga, Masakazu Fujio, Kenta Takahashi (Hitachi) BioX2017-33 |
[more] |
BioX2017-33 pp.45-49 |
BioX |
2017-10-13 10:15 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A measure of biometric information in consideration of individual distributions Kenta Takahashi (Hitachi), Takao Murakami (AIST) BioX2017-34 |
(To be available after the conference date) [more] |
BioX2017-34 pp.51-56 |
PRMU, BioX |
2017-03-20 14:10 |
Aichi |
|
[Invited Talk]
Recent Technology Trends in Location Privacy Takao Murakami (AIST) BioX2016-42 PRMU2016-205 |
With the widespread use of smart phones and in-car navigation systems, people are increasingly using LBS (Location-based... [more] |
BioX2016-42 PRMU2016-205 pp.51-56 |
BioX (2nd) |
2013-08-28 10:00 |
Osaka |
The Institute of Scientific and Industrial Research, Osaka Univ. |
On Optimal Sequential Fusion in Biometric Identification Takao Murakami, Kenta Takahashi (Hitachi), Kanta Matsuura (Univ. Tokyo) |
Biometric identification systems can provide a very convenient way of authentication because they do not require a user ... [more] |
|
BioX (2nd) |
2012-08-28 13:30 |
Tokyo |
Waseda Univ. Nishiwaseda Campus |
Biometric Authentication System Based on Generalized Linear Mixed Model Yosuke Kaga, Kenta Takahashi, Takao Murakami, Osamu Takata, Hisao Sakazaki (Hitachi, Ltd.) |
Some biometric authentication methods based on multiple biometric information are proposed.
In these conventional metho... [more] |
|
BioX (2nd) |
2012-08-28 14:00 |
Tokyo |
Waseda Univ. Nishiwaseda Campus |
A Theoretical Analysis of Optimal Fusion Algorithms with Security against Wolves and Lambs Takao Murakami, Kenta Takahashi (Hitachi), Kanta Matsuura (Univ. Tokyo) |
Claimants and enrollees who have high similarity scores against many others are known as wolves and lambs, respectively.... [more] |
|
ISEC, LOIS |
2010-11-17 15:15 |
Ibaraki |
Tsukuba Univ. |
Similarity Hashing resistant to file modifications Susumu Serita, Yasuhiro Fujii, Satoshi Kai, Takao Murakami, Yoshinori Honda (Hitachi, Ltd.) ISEC2010-54 LOIS2010-33 |
Similar files in PCs and servers need to be identified quickly and accurately, and this can be done by using similarity ... [more] |
ISEC2010-54 LOIS2010-33 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 17:00 |
Hokkaido |
Future University-Hakodate |
A study on information content of biometrics Kenta Takahashi, Hideitsu Hino, Takao Murakami (Hitachi Ltd.) ISEC2007-43 SITE2007-37 |
Due to the high security and convenience, biometric authentication is used at access control, ATM and many kinds of iden... [more] |
ISEC2007-43 SITE2007-37 pp.193-200 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|