Shinsaku Kiyomoto
Title
Cited by
Cited by
Year
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
International Conference on Information Security, 455-470, 2008
1132008
A formal model to analyze the permission authorization and enforcement in the android framework
W Shin, S Kiyomoto, K Fukushima, T Tanaka
2010 IEEE Second International Conference on Social Computing, 944-951, 2010
1072010
Medibchain: A blockchain based privacy preserving platform for healthcare data
A Al Omar, MS Rahman, A Basu, S Kiyomoto
International conference on security, privacy and anonymity in computation …, 2017
1052017
Privacy-friendly platform for healthcare data in cloud based on blockchain environment
A Al Omar, MZA Bhuiyan, A Basu, S Kiyomoto, MS Rahman
Future generation computer systems 95, 511-521, 2019
802019
A small but non-negligible flaw in the android permission scheme
W Shin, S Kwak, S Kiyomoto, K Fukushima, T Tanaka
2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010
792010
Run-time enforcement of information-flow properties on Android
L Jia, J Aljuraidan, E Fragkaki, L Bauer, M Stroucken, K Fukushima, ...
European Symposium on Research in Computer Security, 775-792, 2013
722013
Towards formal analysis of the permission-based security model for android
W Shin, S Kiyomoto, K Fukushima, T Tanaka
2009 Fifth International Conference on Wireless and Mobile Communications, 87-92, 2009
722009
Security vulnerabilities and solutions in mobile WiMAX
A Deininger, S Kiyomoto, J Kurihara, T Tanaka
IJCSNS International Journal of Computer Science and Network Security 7 (11 …, 2007
642007
PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation
WB Tesfay, P Hofmann, T Nakamura, S Kiyomoto, J Serna
Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018
582018
On a fast (k, n)-threshold secret sharing scheme
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
552008
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE transactions on fundamentals of electronics, communications and …, 2008
492008
On blockchain-based anonymized dataset distribution platform
S Kiyomoto, MS Rahman, A Basu
2017 IEEE 15th International Conference on Software Engineering Research …, 2017
442017
K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
S Kiyomoto, T Tanaka, K Sakurai
SECRYPT, 204-213, 2007
402007
Parallel Gauss sieve algorithm: Solving the SVP challenge over a 128-dimensional ideal lattice
T Ishiguro, S Kiyomoto, Y Miyake, T Takagi
International Workshop on Public Key Cryptography, 411-428, 2014
372014
An agent-based framework for informed consent in the internet of things
R Neisse, G Baldini, G Steri, Y Miyake, S Kiyomoto, AR Biswas
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 789-794, 2015
322015
The rakaposhi Stream Cipher
C Cid, S Kiyomoto, J Kurihara
International Conference on Information and Communications Security, 32-46, 2009
322009
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction.
MS Rahman, A Basu, S Kiyomoto
J. Internet Serv. Inf. Secur. 7 (3), 1-16, 2017
31*2017
A fast (k, L, n)-threshold ramp secret sharing scheme
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2009
292009
I read but don't agree: Privacy policy benchmarking using machine learning and the eu gdpr
WB Tesfay, P Hofmann, T Nakamura, S Kiyomoto, J Serna
Companion Proceedings of the The Web Conference 2018, 163-166, 2018
282018
Privacy-friendly secure bidding for smart grid demand-response
MS Rahman, A Basu, S Kiyomoto, MZA Bhuiyan
Information Sciences 379, 229-240, 2017
272017
The system can't perform the operation now. Try again later.
Articles 1–20