A New (k,n)-Threshold Secret Sharing Scheme and Its Extension J Kurihara, S Kiyomoto, K Fukushima, T Tanaka International Conference on Information Security, 455-470, 2008 | 104 | 2008 |
A formal model to analyze the permission authorization and enforcement in the android framework W Shin, S Kiyomoto, K Fukushima, T Tanaka 2010 IEEE Second International Conference on Social Computing, 944-951, 2010 | 98 | 2010 |
A small but non-negligible flaw in the android permission scheme W Shin, S Kwak, S Kiyomoto, K Fukushima, T Tanaka 2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 72 | 2010 |
Towards formal analysis of the permission-based security model for android W Shin, S Kiyomoto, K Fukushima, T Tanaka 2009 Fifth International Conference on Wireless and Mobile Communications, 87-92, 2009 | 66 | 2009 |
Run-time enforcement of information-flow properties on Android L Jia, J Aljuraidan, E Fragkaki, L Bauer, M Stroucken, K Fukushima, ... European Symposium on Research in Computer Security, 775-792, 2013 | 64 | 2013 |
Security vulnerabilities and solutions in mobile WiMAX A Deininger, S Kiyomoto, J Kurihara, T Tanaka IJCSNS International Journal of Computer Science and Network Security 7 (11 …, 2007 | 64 | 2007 |
On a fast (k, n)-threshold secret sharing scheme J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008 | 49 | 2008 |
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE transactions on fundamentals of electronics, communications and …, 2008 | 46 | 2008 |
Medibchain: A blockchain based privacy preserving platform for healthcare data A Al Omar, MS Rahman, A Basu, S Kiyomoto International conference on security, privacy and anonymity in computation …, 2017 | 41 | 2017 |
K2: A Stream Cipher Algorithm using Dynamic Feedback Control. S Kiyomoto, T Tanaka, K Sakurai SECRYPT, 204-213, 2007 | 35 | 2007 |
The rakaposhi Stream Cipher C Cid, S Kiyomoto, J Kurihara International Conference on Information and Communications Security, 32-46, 2009 | 30 | 2009 |
Parallel Gauss sieve algorithm: Solving the SVP challenge over a 128-dimensional ideal lattice T Ishiguro, S Kiyomoto, Y Miyake, T Takagi International Workshop on Public Key Cryptography, 411-428, 2014 | 29 | 2014 |
A fast (k, L, n)-threshold ramp secret sharing scheme J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2009 | 28 | 2009 |
On blockchain-based anonymized dataset distribution platform S Kiyomoto, MS Rahman, A Basu 2017 IEEE 15th International Conference on Software Engineering Research …, 2017 | 26 | 2017 |
Efficient implementation of the pairing on mobilephones using BREW M Yoshitomi, T Takagi, S Kiyomoto, T Tanaka IEICE transactions on information and systems 91 (5), 1330-1337, 2008 | 26 | 2008 |
Privacy-friendly secure bidding for smart grid demand-response MS Rahman, A Basu, S Kiyomoto, MZA Bhuiyan Information Sciences 379, 229-240, 2017 | 24 | 2017 |
PPM: Privacy policy manager for personalized services S Kiyomoto, T Nakamura, H Takasaki, R Watanabe, Y Miyake International Conference on Availability, Reliability, and Security, 377-392, 2013 | 24 | 2013 |
PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation WB Tesfay, P Hofmann, T Nakamura, S Kiyomoto, J Serna Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018 | 21 | 2018 |
Towards Secure Cloud Computing Architecture-A Solution Based on Software Protection Mechanism. K Fukushima, S Kiyomoto, Y Miyake J. Internet Serv. Inf. Secur. 1 (1), 4-17, 2011 | 20 | 2011 |
SuperTopcolor H Fukushima, R Kitano, M Yamaguchi Journal of High Energy Physics 2011 (1), 111, 2011 | 20 | 2011 |