-
Article
Open AccessSynthesizing differentially private location traces including co-locations
Privacy-preserving location synthesizers have been widely studied to perform private geo-data analysis. They have also been used for generating datasets for research or competitions. However, existing location...
-
Chapter and Conference Paper
Are Dark Patterns Self-destructive for Service Providers?: Revealing Their Impacts on Usability and User Satisfaction
“Dark patterns,” which are known as deceptive designs that intentionally induce users to take actions that benefit the company, have been widely adopted, especially in the field of digital marketing. In recent...
-
Chapter and Conference Paper
Perceiving Human Psychological Consistency: Attack Detection Against Advanced Persistent Social Engineering
Social engineering involves manipulating a target to make it act to achieve the attacker's objectives. Currently, direct and short-term attacks are common in the mainstream. However, with the development of sc...
-
Chapter and Conference Paper
Scheme for Selection of Deceptions as a Countermeasure for Insider Threats
The number of insider threats and the expense of handling them increase every year, rendering it imperative to adopt measures against insider threats. In particular, insiders must adopt a psychological approac...
-
Chapter and Conference Paper
Electrical Muscle Stimulation System for Automatic Reproduction of Secret Information Without Exposing Biometric Data
Biometric data is personal information, which leads to the psychological resistance of the user. Using biometric-based FIDO authentication eliminates the risk of biometric data leakage outside the local device...
-
Chapter and Conference Paper
Improving Classification Accuracy by Optimizing Activation Function for Convolutional Neural Network on Homomorphic Encryption
A secure machine learning technology that performs prediction while encrypting data using homomorphic encryption is being developed. However, Convolutional Neural Networks (CNN) on homomorphic encryption canno...
-
Chapter and Conference Paper
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition
ID-less palmprint recognition is a biometric identification method using the pattern of the palm. It is highly available because it can obtain biometric information in a contactless manner using only a smartph...
-
Chapter and Conference Paper
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing
Biometric information can have high similarity among different people but high variability within the same person. Therefore, it is difficult to identify a person or distinguish between two people based on bio...
-
Chapter and Conference Paper
Improving Robustness and Visibility of Adversarial CAPTCHA Using Low-Frequency Perturbation
CAPTCHA is a type of Turing test used to distinguish between humans and computing machine. However, image-based CAPTCHAs are losing their function as Turing tests owing to the improvement of image recognition ...
-
Chapter and Conference Paper
Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
Nowadays, it is no longer uncommon for a PC to be infected with malware.
-
Chapter and Conference Paper
Synthesizing Privacy-Preserving Location Traces Including Co-locations
Location traces are useful for various types of geo-data analysis tasks, and synthesizing location traces is a promising approach to geo-data analysis while protecting user privacy. However, existing location ...
-
Chapter and Conference Paper
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers
There is increasing recognition of the importance of social media in information transmission during disasters. However, it is difficult to distinguish between credible information and non-credible information...
-
Chapter and Conference Paper
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks
In recent years, illegal money transfer using man-in-the-browser (MITB) attacks with malware in internet banking has become a social problem. This study focuses on transaction-tampering MITB attacks and consi...
-
Chapter and Conference Paper
Micro Biometric Authentication Using Fingernail Surfaces: A Study of Practical Use
Micro nail authentication is an authentication mechanism that uses a minute part of the fingernail surface. Using a fingernail that grows over time, the right to be forgotten is satisfied because the biometric...
-
Chapter and Conference Paper
Understanding the Impact of Service Trials on Privacy Disclosure
We have many opportunities to disclose privacy information in exchange for convenient services. In the context of privacy calculus, numerous research studies have been conducted to date on the relation between...
-
Chapter and Conference Paper
A Study on Human Reflex-Based Biometric Authentication Using Eye-Head Coordination
Biometric information can be easily leaked and/or copied. Therefore, the biometric information used for biometric authentication should be kept secure. To cope with this issue, we have proposed a user authenti...
-
Chapter and Conference Paper
Automatic Examination-Based Whitelist Generation for XSS Attack Detection
When faced with cross-site scripting (XSS) attacks, it is difficult to counter all malicious inputs such that they are rendered completely harmless. In such situations, the introduction of a whitelist-based XS...
-
Chapter and Conference Paper
On Trust Confusional, Trust Ignorant, and Trust Transitions
This paper introduces a two-dimensional representation for trust values that uses two metrics: “trust” and “distrust.” With this representation, we can deal with such contradictory arguments as “The message i...
-
Chapter and Conference Paper
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics
In a blockchain system, a blockchain transaction is protected against forgery by adding a digital signature. By digital signature verification, we can confirm that a creator of a transaction has a correct priv...