著書論文等- 青木 孝文 -
表示方法: 表示形式: 表示順:
[]:著書 []:論文 []:総説・解説記事
件数:470件
[2013]
81.[] Yet another fault-based leakage in non-uniform faulty ciphertexts.[Lecture Notes in Computer Science (The 6th International Symposium on Foundations & Practice of Security),8352,(2013),272-290]Yang Li, Yu-Ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta and Kazuo Sakiyama
82.[] 画像処理技術とオープンイノベーションの展開.[電子情報通信学会誌,96(10), (2013), 776-779]青木孝文, 伊藤康一
83.[] Stereo one-shot six-band camera system for accurate color reproduction.[Journal of Electronic Imaging,23(3),(2013),033025-1-033025-12]Masaru Tsuchida, Shuji Sakai, Mamoru Miura, Koichi Ito, Takahito Kawanishi, Kunio Kashino, Junji Yamato and Takafumi Aoki
84.[] A multi-finger knuckle recognition system for door handle.[Proceedings of the IEEE 6th International Conference on Biometrics: Theory, Applications and Systems,(2013)]Shoichiro Aoyama, Koichi Ito and Takafumi Aoki
85.[] 3D reconstruction of urban environments using in-vehicle fisheye camera.[Proceedings of International Conference on Image Processing,(2013),2145-2148]Jumpei Ishii, Shuji Sakai, Koichi Ito, Takafumi Aoki, Takura Yanagi and Toshiyuki Ando
86.[] A hierarchical graph-based approach to generating formally-proofed Galois-field multipliers.[Proceedings of 2013 PROOFS (Security Proofs for Embedded Systems) Workshop,(2013),98-109]Kotaro Okamoto, Naofumi Homma and Takafumi Aoki
87.[] Performance evaluation of phase-based correspondence matching on GPUs.[Proceedings of SPIE Applications of Digital Image Processing XXXVI,(2013),98-109]Mamoru Miura, Kinya Fudano, Koichi Ito, Takafumi Aoki, Hiroyuki Takizawa and Hiroaki Kobayashi
88.[] Map-based analysis of IEMI fault injection into cryptographic devices.[IEEE International Symposium on Electromagnetic Compatibility,(2013),829-833]Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki and Hideaki Sone
89.[] Disaster victim identification using dental records --- Experience of the Grate East Japan Earthquake ---.[Proceedings of IEEE Region 10 Humanitarian Technology Conference 2013,(2013),63-68]Takafumi Aoki, Koichi Ito, Shoichiro Aoyama and Eiko Kosuge
90.[] プロジェクタ・カメラシステムを用いた環境適応型ディスプレイ.[光アライアンス,24(7), (2013), 21-25]伊藤康一, 青木孝文
91.[] Analysis of electromagnetic information leakage from cryptographic devices with different physical structures.[IEEE Transactions on Electromagnetic Compatibility,55(3),(2013),571-580]Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage and Jean-Luc Danger
92.[] Efficient evaluation of EM radiation associated with information leakage from cryptographic devices,.[IEEE Transactions on Electromagnetic Compatibility,55(3),(2013),555-563]Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Haruki Shimada, Takafumi Aoki, Hideaki Sone, Laurent Sauvage and Jean-Luc Danger
93.[] 携帯電話向け非接触掌紋認証アルゴリズム.[電子情報通信学会論文誌A,J96-A(5),(2013),250-263]青山章一郎, 伊藤康一, 青木孝文, 太田陽基
94.[] 選択したデータセットを用いた暗号デバイスの電磁情報漏えいの効率的な安全性評価.[電子情報通信学会論文誌B,J96-B(4),(2013),467-475]嶋田晴貴, 林優一, 本間尚文, 水木敬明, 青木孝文, 曽根秀昭
95.[] Fast and robust correspondence matching and its application to volume registration.[IEICE Transactions on Information and systems,E96-D(4),(2013),826-835]Yuichiro Tajima, Kinya Fudano, Koichi Ito and Takafumi Aoki
96.[] Implementation and evaluation of a remote authentication system using touchless palmprint recognition.[Multimedia Systems,19(2),(2013),117-129]Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito, Yutaka Miyake and Takafumi Aoki
97.[] Transient IEMI threats for cryptographic devices.[IEEE Transactions on Electromagnetic Compatibility,55(1),(2013),140-148]Yuichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki and Hideaki Sone
98.[] 組込みマルチコアハンドブック技術・応用編(改訂版).[一般社団法人電子情報技術産業協会(JEITA),(2013)]青木孝文, 伊藤康一
[2012]
99.[] A stereo six-band video camera system for accurate color reproduction.[Proceedings of 20th Color and Imaging Conference,(2012),117-122]Masaru Tsuchida, Shuji Sakai, Mamoru Miura, Koichi Ito, Takahito Kawanishi, Kunio Kashino, Junji Yamato and Takafumi Aoki
100.[] Security evaluation of cryptographic modules against profiling attacks.[Lecture Notes in Computer Science (International Conference on Information Security and Cryptology),7839,(2012),383-394]Yongdae Kim, Naofumi Homma, Takafumi Aoki and Heebong Choi
Page: [prev] [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [next]
戻るこのページのトップへ
copyright(c)2005 Tohoku University