Shinsaku Kiyomoto
Title
Cited by
Cited by
Year
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
International Conference on Information Security, 455-470, 2008
1082008
A formal model to analyze the permission authorization and enforcement in the android framework
W Shin, S Kiyomoto, K Fukushima, T Tanaka
2010 IEEE Second International Conference on Social Computing, 944-951, 2010
1002010
A small but non-negligible flaw in the android permission scheme
W Shin, S Kwak, S Kiyomoto, K Fukushima, T Tanaka
2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010
772010
Medibchain: A blockchain based privacy preserving platform for healthcare data
A Al Omar, MS Rahman, A Basu, S Kiyomoto
International conference on security, privacy and anonymity in computation …, 2017
732017
Towards formal analysis of the permission-based security model for android
W Shin, S Kiyomoto, K Fukushima, T Tanaka
2009 Fifth International Conference on Wireless and Mobile Communications, 87-92, 2009
712009
Run-time enforcement of information-flow properties on Android
L Jia, J Aljuraidan, E Fragkaki, L Bauer, M Stroucken, K Fukushima, ...
European Symposium on Research in Computer Security, 775-792, 2013
692013
Security vulnerabilities and solutions in mobile WiMAX
A Deininger, S Kiyomoto, J Kurihara, T Tanaka
IJCSNS International Journal of Computer Science and Network Security 7 (11 …, 2007
642007
On a fast (k, n)-threshold secret sharing scheme
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008
532008
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE transactions on fundamentals of electronics, communications and …, 2008
482008
Privacy-friendly platform for healthcare data in cloud based on blockchain environment
A Al Omar, MZA Bhuiyan, A Basu, S Kiyomoto, MS Rahman
Future generation computer systems 95, 511-521, 2019
472019
PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation
WB Tesfay, P Hofmann, T Nakamura, S Kiyomoto, J Serna
Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018
382018
On blockchain-based anonymized dataset distribution platform
S Kiyomoto, MS Rahman, A Basu
2017 IEEE 15th International Conference on Software Engineering Research …, 2017
382017
K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
S Kiyomoto, T Tanaka, K Sakurai
SECRYPT, 204-213, 2007
372007
The rakaposhi Stream Cipher
C Cid, S Kiyomoto, J Kurihara
International Conference on Information and Communications Security, 32-46, 2009
322009
Parallel Gauss sieve algorithm: Solving the SVP challenge over a 128-dimensional ideal lattice
T Ishiguro, S Kiyomoto, Y Miyake, T Takagi
International Workshop on Public Key Cryptography, 411-428, 2014
312014
A fast (k, L, n)-threshold ramp secret sharing scheme
J Kurihara, S Kiyomoto, K Fukushima, T Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2009
292009
Privacy-friendly secure bidding for smart grid demand-response
MS Rahman, A Basu, S Kiyomoto, MZA Bhuiyan
Information Sciences 379, 229-240, 2017
272017
Efficient implementation of the pairing on mobilephones using BREW
M Yoshitomi, T Takagi, S Kiyomoto, T Tanaka
IEICE transactions on information and systems 91 (5), 1330-1337, 2008
262008
An agent-based framework for informed consent in the internet of things
R Neisse, G Baldini, G Steri, Y Miyake, S Kiyomoto, AR Biswas
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 789-794, 2015
252015
PPM: Privacy policy manager for personalized services
S Kiyomoto, T Nakamura, H Takasaki, R Watanabe, Y Miyake
International Conference on Availability, Reliability, and Security, 377-392, 2013
232013
The system can't perform the operation now. Try again later.
Articles 1–20