Shinsaku Kiyomoto
TitleCited byYear
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
International Conference on Information Security, 455-470, 2008
1042008
A formal model to analyze the permission authorization and enforcement in the android framework
W Shin, S Kiyomoto, K Fukushima, T Tanaka
2010 IEEE Second International Conference on Social Computing, 944-951, 2010
982010
A small but non-negligible flaw in the android permission scheme
W Shin, S Kwak, S Kiyomoto, K Fukushima, T Tanaka
2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010
722010
Towards formal analysis of the permission-based security model for android
W Shin, S Kiyomoto, K Fukushima, T Tanaka
2009 Fifth International Conference on Wireless and Mobile Communications, 87-92, 2009
662009
Run-time enforcement of information-flow properties on Android
L Jia, J Aljuraidan, E Fragkaki, L Bauer, M Stroucken, K Fukushima, ...
European Symposium on Research in Computer Security, 775-792, 2013
642013
Security vulnerabilities and solutions in mobile WiMAX
A Deininger, S Kiyomoto, J Kurihara, T Tanaka
IJCSNS International Journal of Computer Science and Network Security 7 (11 …, 2007
642007
On a fast (k, n)-threshold secret sharing scheme
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
492008
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE transactions on fundamentals of electronics, communications and …, 2008
462008
Medibchain: A blockchain based privacy preserving platform for healthcare data
A Al Omar, MS Rahman, A Basu, S Kiyomoto
International conference on security, privacy and anonymity in computation …, 2017
412017
K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
S Kiyomoto, T Tanaka, K Sakurai
SECRYPT, 204-213, 2007
352007
The rakaposhi Stream Cipher
C Cid, S Kiyomoto, J Kurihara
International Conference on Information and Communications Security, 32-46, 2009
302009
Parallel Gauss sieve algorithm: Solving the SVP challenge over a 128-dimensional ideal lattice
T Ishiguro, S Kiyomoto, Y Miyake, T Takagi
International Workshop on Public Key Cryptography, 411-428, 2014
292014
A fast (k, L, n)-threshold ramp secret sharing scheme
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2009
282009
On blockchain-based anonymized dataset distribution platform
S Kiyomoto, MS Rahman, A Basu
2017 IEEE 15th International Conference on Software Engineering Research …, 2017
262017
Efficient implementation of the pairing on mobilephones using BREW
M Yoshitomi, T Takagi, S Kiyomoto, T Tanaka
IEICE transactions on information and systems 91 (5), 1330-1337, 2008
262008
Privacy-friendly secure bidding for smart grid demand-response
MS Rahman, A Basu, S Kiyomoto, MZA Bhuiyan
Information Sciences 379, 229-240, 2017
242017
PPM: Privacy policy manager for personalized services
S Kiyomoto, T Nakamura, H Takasaki, R Watanabe, Y Miyake
International Conference on Availability, Reliability, and Security, 377-392, 2013
242013
PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation
WB Tesfay, P Hofmann, T Nakamura, S Kiyomoto, J Serna
Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018
212018
Towards Secure Cloud Computing Architecture-A Solution Based on Software Protection Mechanism.
K Fukushima, S Kiyomoto, Y Miyake
J. Internet Serv. Inf. Secur. 1 (1), 4-17, 2011
202011
SuperTopcolor
H Fukushima, R Kitano, M Yamaguchi
Journal of High Energy Physics 2011 (1), 111, 2011
202011
The system can't perform the operation now. Try again later.
Articles 1–20