The SCEAS System
Navigation Menu

Search the dblp DataBase


Masakatsu Nishigaki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Atsushi Harada, Takeo Isarida, Tadanori Mizuno, Masakatsu Nishigaki
    A User Authentication System Using Schema of Visual Memory. [Citation Graph (0, 0)][DBLP]
    BioADIT, 2006, pp:338-345 [Conf]
  2. Yoichi Shibata, Masahiro Mimura, Kenta Takahashi, Masakatsu Nishigaki
    Mechanism-Based PKI - A Real-Time Key Generation from Fingerprints. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:468-474 [Conf]
  3. Masaki Ishida, Koichi Hayashi, Masakatsu Nishigaki, Hideki Asai
    Iterated Timing Analysis with Dynamic Partitioning Technique for Bipolar Transistor Circuits. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:411-414 [Conf]
  4. Masakatsu Nishigaki, Nobuyuki Tanaka, Hideki Asai
    Mixed Mode Circuit Simulator SPLIT2.1 using Dynamic Network Separation and Selective Trace. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:9-12 [Conf]
  5. Masakatsu Nishigaki, Makoto Nakano, Masakazu Soga
    A fault-tolerant combinational circuit with fault diagnosis capability - To mask and detect the loss of any one connection between gate circuits. [Citation Graph (0, 0)][DBLP]
    Systems and Computers in Japan, 2003, v:34, n:11, pp:67-80 [Journal]

  6. ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. [Citation Graph (, )][DBLP]

  7. Making Use of Human Visual Capability to Improve Information Security. [Citation Graph (, )][DBLP]

  8. Improvement of User Authentication Using Schema of Visual Memory: Exploitation of "Schema of Story". [Citation Graph (, )][DBLP]

  9. Advantages of User Authentication Using Unclear Images. [Citation Graph (, )][DBLP]

  10. CAPTCHA Using Strangeness in Machine Translation. [Citation Graph (, )][DBLP]

  11. Physical Access Control with Biometric Keys. [Citation Graph (, )][DBLP]

  12. Improvement of User Authentication Using Schema of Visual Memory: Guidance by Verbal Cue. [Citation Graph (, )][DBLP]

  13. A study on biometric key generation from fingerprints: Fingerprint-key generation from stable feature value. [Citation Graph (, )][DBLP]

  14. A Shoulder-Surfing-Resistant Image-Based Authentication System with Temporal Indirect Image Selection. [Citation Graph (, )][DBLP]

  15. A Proposal of Efficient Remote Biometric Authentication Protocol. [Citation Graph (, )][DBLP]

  16. Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication. [Citation Graph (, )][DBLP]

  17. Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term. [Citation Graph (, )][DBLP]

  18. Host-based traceback; tracking bot and C&C server. [Citation Graph (, )][DBLP]

Search in 0.037secs, Finished in 0.038secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002