Kensuke Baba

Learn More
Tissue inhibitor of metalloproteinase (TIMP) has been reported to inhibit tumour invasion through an inactivation of matrix metalloproteinase (MMP) both in vitro and in vivo. Among the TIMP family, TIMP-1 possesses not only proteinase inhibitory activity but also a growth-promoting function. However, the significance of the expression of TIMP-1 in human(More)
As pervasive computing environments become popular, RFID devices, such as contactless smart cards and RFID tags, are introduced into our daily life. However, there exists a privacy problem that a third party can trace user's behavior by linking device's ID.The concept of unlinkability, that a third party cannot recognize whether some outputs are from the(More)
The typed λμ-calculus is known to be strongly normalizing and weakly Church-Rosser, and hence becomes confluent. In fact, Parigot formulated a parallel reduction to prove confluence of the typed λμ-calculus by “Tait-and-Martin-Löf” method. However, the diamond property does not hold for his parallel reduction. The confluence for type-free λμ-calculus cannot(More)
This paper focuses on authentication with three types of entities: a user who sends an authentication request, an authentication-server who receives and verifies the request, and a database who supplies the authentication-server with information for verifying the request. This paper presents novel authentication protocols that satisfy the following(More)
Abstract. Atallah et al. [ACD01] introduced a randomized algorithm for string matching with mismatches, which utilized fast Fourier transformation (FFT) to compute convolution. It estimates the score vector of matches between text string and a pattern string, i.e. the vector obtained when the pattern is slid along the text, and the number of matches is(More)
In fingerprint identification, the short identification time is a crucial need. The identification time can be estimated according to the number of conducted matching processes multiplied by the consumed time by a single matching process. The Matching Score Matrix is an existing identification algorithm that reduces the number of matching processes. This(More)
This paper introduces a synergy of a researcher database and an institutional repository. We consider a problem to create hyperlinks from metadata of scholarly works in the researcher database to digital contents in the institutional repository. Normally, matching the metadata of the databases in the backend would facilitate creation of these hyperlinks.(More)
This paper proposes a door access control system with mobile phones which allows off-line delegations of an access. A model of door access control with mobile phones is introduced, and then the delegation is formalized as a copy of a door-key. On the previous model, secure copy by off-line is realized using the essential idea of the proxy signature.(More)