Awase-E: Image-based authentication for mobile phones using user’s favorite images T Takada, H Koike Human-Computer Interaction with Mobile Devices and Services: 5th …, 2003 | 199 | 2003 |
Tudumi: Information visualization system for monitoring and auditing computer logs T Takada, H Koike Proceedings Sixth International Conference on Information Visualisation, 570-576, 2002 | 110 | 2002 |
MieLog: A Highly Interactive Visual Log Browser Using Information Visualization and Statistical Analysis. T Takada, H Koike LISA 2, 133-144, 2002 | 87 | 2002 |
fakepointer: An authentication scheme for improving security against peeping attacks using video cameras T Takada 2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008 | 67 | 2008 |
Security administration server and its host server T Mukai, A Ishida, M Adachi, H Koike, T Takada, E Tameda US Patent 7,185,366, 2007 | 60 | 2007 |
Visualinda: a framework for visualizing parallel linda programs H Koike, T Takada, T Masui Proceedings. 1997 IEEE Symposium on Visual Languages (Cat. No. 97TB100180 …, 1997 | 33 | 1997 |
Awase-e: Recognition-based image authentication scheme using users' personal photographs T Takada, T Onuki, H Koike 2006 Innovations in Information Technology, 1-5, 2006 | 32 | 2006 |
Nigelog: Protecting logging information by hiding multiple backups in directories T Takada, H Koike Proceedings. Tenth International Workshop on Database and Expert Systems …, 1999 | 17 | 1999 |
Log file protection system H Koike, T Takada US Patent 7,512,979, 2009 | 16 | 2009 |
Extended pin authentication scheme allowing multi-touch key input T Takada, Y Kokubun Proceedings of International Conference on Advances in Mobile Computing …, 2013 | 13 | 2013 |
Exploring alternative security warning dialog for attracting user attention: evaluation of" Kawaii" effect and its additional stimulus combination R Minakawa, T Takada Proceedings of the 19th International Conference on Information Integration …, 2017 | 9 | 2017 |
MTAPIN: multi-touch key input enhances security of PIN authentication while keeping usability T Takada, Y Kokubun International Journal of Pervasive Computing and Communications 10 (3), 276-290, 2014 | 8 | 2014 |
fakePointer: a user authentication scheme that makes peeping attack with a video camera hard T Takada IPSJ Journal 49 (9), 3051-3061, 2008 | 7 | 2008 |
CCC: shoulder surfing resistant authentication system by using vibration M Ishizuka, T Takada IPSJ Interaction 2014, 501-503, 2014 | 6 | 2014 |
fakePointer: The authentication technique which has tolerance to video recording attacks T Takada IPSJ transaction 49 (9), 3051-3061, 2008 | 6 | 2008 |
fakePointer: an authentication scheme for a better security against a peeping attack by a video camera T Takada Proc. of the 2nd International Conference on Mobile Ubiquitous Computing …, 2008 | 6 | 2008 |
逃げログ: 削除まで考慮にいれたログ情報保護手法 高田哲司, 小池英樹 情報処理学会論文誌 41 (3), 823-831, 2000 | 6 | 2000 |
Pict-place authentication: recognition-based graphical password using image layout for better balance of security and operation time T Takada, M Yoshida Proceedings of the 14th Biannual Conference of the Italian SIGCHI Chapter, 1-7, 2021 | 5 | 2021 |
Authentication shutter: Alternative countermeasure against password reuse attack by availability control T Takada Proceedings of the 12th International Conference on Availability …, 2017 | 5 | 2017 |
fakePointer2: The proposal of the user interface to improve safety to the peep attack about the individual authentication T Takada Cryptography and Information Security Symposium, SCIS2007, 2007 | 5 | 2007 |