Shinsaku Kiyomoto

According to our database1, Shinsaku Kiyomoto authored at least 158 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Evaluation of Code-based Signature Schemes.
IACR Cryptology ePrint Archive, 2019

Privacy-friendly platform for healthcare data in cloud based on blockchain environment.
Future Generation Comp. Syst., 2019

Detecting Machine-Translated Paragraphs by Matching Similar Words.
CoRR, 2019

A Framework for Secure and Trustworthy Data Management in Supply Chain.
Proceedings of the Mobile Web and Intelligent Information Systems, 2019

Experiment on Side-Channel Key-Recovery using a Real LPWA End-device.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.
Security and Communication Networks, 2018

PPM: Privacy Policy Manager for Home Energy Management System.
JoWUA, 2018

Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Transactions, 2018

Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform.
IACR Cryptology ePrint Archive, 2018

I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Linear Depth Integer-Wise Homomorphic Division.
Proceedings of the Information Security Theory and Practice, 2018

The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

An Evaluation Framework for Fastest Oblivious RAM.
Proceedings of the 3rd International Conference on Internet of Things, 2018

On the Complexity of the LWR-Solving BKW Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

BlockStore: A Secure Decentralized Storage Framework on Blockchain.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Active Attack Against Oblivious RAM.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction.
J. Internet Serv. Inf. Secur., 2017

Privacy-friendly secure bidding for smart grid demand-response.
Inf. Sci., 2017

Diversification of Autonomous Vehicle Driving Behavior.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

(p, N)-identifiability: Anonymity under Practical Adversaries.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

On blockchain-based anonymized dataset distribution platform.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Robust ORAM: Enhancing Availability, Confidentiality and Integrity.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Towards Outsourced Privacy-Preserving Multiparty DBSCAN.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Verification of Data Collection Methods for Live Migration Protection Mechanism.
Proceedings of the Advances in Network-Based Information Systems, 2017

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Proceedings of the Advances in Information and Computer Security, 2017

VIGraph - A Framework for Verifiable Information.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

On blockchain-based authorization architecture for beyond-5G mobile services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

White-box Implementation of Stream Cipher.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Hypercubes and Private Information Retrieval.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Control Mechanism for Live Migration with Data Regulations Preservation.
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

On evolutionary computation for moving target defense in software defined networks.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

An Experimental Study of the BDD Approach for the Search LWE Problem.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Portable Implementation of Lattice-based Cryptography using JavaScript.
IJNC, 2016

On the Leakage Resilient Cryptography in Game-Theoretic Settings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

PrefRank: Quantification and Aggregation of Subjective User Preferences.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Sensor-based Wearable PUF.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

On Gender Specific Perception of Data Sharing in Japan.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

User-in-a-context: A blueprint for context-aware identification.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Access Control for Cross-Border Transfer of Sensor Data.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

A Model for Personalised Perception of Policies.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Easing the Burden of Setting Privacy Preferences: A Machine Learning Approach.
Proceedings of the Information Systems Security and Privacy, 2016

Personalised Privacy by Default Preferences - Experiment and Analysis.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Data Protection for Cross-Border Live Migration in Multi-cloud Environment.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

Secure Bike Sharing System for Multi-Modal Journey.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
On Partitioning Secret Data Based on Concept of Functional Safety.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

An agent-based framework for Informed Consent in the internet of things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Towards Tracing of k-Anonymized Datasets.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

k-anonymity: Risks and the Reality.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

New Security Challenges in the 5G Network.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Privacy-friendly secure bidding scheme for demand response in smart grid.
Proceedings of the IEEE First International Smart Cities Conference, 2015

Lightweight Practical Private One-Way Anonymous Messaging.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Portable Implementation of Lattice-Based Cryptography Using JavaScript.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Design of a Security Gateway for iKaaS Platform.
Proceedings of the Cloud Computing - 6th International Conference, 2015

Practical Private One-way Anonymous Message Routing.
Proceedings of the 10th ACM Symposium on Information, 2015

Personal Agent for Services in ITS.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Security issues on IT systems during disasters: a survey.
J. Ambient Intelligence and Humanized Computing, 2014

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Transactions, 2014

Fast Implementation of KCipher-2 for Software and Hardware.
IEICE Transactions, 2014

Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Transactions, 2014

A Pre-processing Composition for Secret Key Recovery on Android Smartphone.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014

PrefRank: fair aggregation of subjective user preferences.
Proceedings of the Symposium on Applied Computing, 2014

Privacy preserving trusted social feedback.
Proceedings of the Symposium on Applied Computing, 2014

Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

How to Find an Appropriate K for K-Anonymization.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Privacy Risk Model for Trajectory Data.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Beyond proofs of data possession: Finding defective blocks in outsourced storage.
Proceedings of the IEEE Global Communications Conference, 2014

Key Extraction Attack Using Statistical Analysis of Memory Dump Data.
Proceedings of the Risks and Security of Internet and Systems, 2014

Data Storage on the Cloud under User Control.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

XOR network coding pollution prevention without homomorphic functions.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
A Description of the KCipher-2 Encryption Algorithm.
RFC, August, 2013

Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions.
IACR Cryptology ePrint Archive, 2013

P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Trust, 2013

LMM - A Common Component for Software License Management on Cloud.
Proceedings of the SECRYPT 2013, 2013

A Key-revocable Attribute-based Encryption for Mobile Cloud Environments.
Proceedings of the SECRYPT 2013, 2013

AVON - A Fast Hash Function for Intel SIMD Architectures.
Proceedings of the SECRYPT 2013, 2013

Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

PPM: Privacy Policy Manager for Personalized Services.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Design of Categorization Mechanism for Disaster-Information-Gathering System.
JoWUA, 2012

Software Protection Combined with Tamper-Proof Device.
IEICE Transactions, 2012

Privacy Preservation of User History Graph.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Memory Access Pattern Protection for Resource-Constrained Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Security-and-Privacy-Related Issues on IT Systems During Disasters.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
AMY: Use your cell phone to create a protected personal network over devices.
IEEE Trans. Consumer Electronics, 2011

Model for a Common Notion of Privacy Leakage on Public Database.
JoWUA, 2011

Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism.
J. Internet Serv. Inf. Secur., 2011

Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Automatic security verification for 3-party authentication and key exchange protocols.
Proceedings of the 5th International Conference on Network and System Security, 2011

MASHA - Low Cost Authentication with a New Stream Cipher.
Proceedings of the Information Security, 14th International Conference, 2011

On Data Importance Analysis.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Data Anonymity in Multi-Party Service Model.
Proceedings of the Security Technology, 2011

Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Proceedings of the Applied Cryptography and Network Security, 2011

Privacy Frost: A User-Oriented Data Anonymization Tool.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Improved Subset Difference Method with Ternary Tree.
IEICE Transactions, 2010

A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

On a Construction of Stream-cipher-based Hash Functions.
Proceedings of the SECRYPT 2010, 2010

A Small But Non-negligible Flaw in the Android Permission Scheme.
Proceedings of the POLICY 2010, 2010

Efficient Implementation of Pairing on BREW Mobile Phones.
Proceedings of the Advances in Information and Computer Security, 2010

Stream Cipher-Based Hash Function and Its Security.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

A User-Oriented Anonymization Mechanism for Public Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010

Towards a Common Notion of Privacy Leakage on Public Database.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Security Verification for Authentication and Key Exchange Protocols, Revisited.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Side-Channel Analysis of the K2 Stream Cipher.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme.
IEICE Transactions, 2009

Design of Anonymous Attribute Authentication Mechanism.
IEICE Transactions, 2009

Privacy-Aware Location Database Service for Granular Queries.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Proceedings of the SECRYPT 2009, 2009

How to Bootstrap Security for Ad-Hoc Network: Revisited.
Proceedings of the Emerging Challenges for Security, 2009

The rakaposhi Stream Cipher.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Offline Peer-to-Peer Broadcast with Anonymity.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Obfuscation Mechanism in Conjunction with Tamper-Proof Module.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism.
JIP, 2008

Efficient Implementation of the Pairing on Mobilephones Using BREW.
IEICE Transactions, 2008

On a Fast (k, n)-Threshold Secret Sharing Scheme.
IEICE Transactions, 2008

A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Transactions, 2008

Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Transactions, 2008

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
IACR Cryptology ePrint Archive, 2008

Ternary Subset Difference Method and Its Quantitative Analysis.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

FPGA-Targeted Hardware Implementations of K2.
Proceedings of the SECRYPT 2008, 2008

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
Proceedings of the Information Security, 11th International Conference, 2008

Anonymous attribute authentication scheme using self-blindable certificates.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

On-the-Fly Automatic Generation of Security Protocols.
Proceedings of the ICEIS 2008, 2008

2007
Development of security functions for a medical information sharing platform.
Systems and Computers in Japan, 2007

Universally Composable Hierarchical Hybrid Authenticated Key Exchange.
IEICE Transactions, 2007

On Effectiveness of Clock Control in Stream Ciphers.
IEICE Transactions, 2007

Efficient Implementation of the Pairing on Mobilephones using BREW.
IACR Cryptology ePrint Archive, 2007

Efficient Implementation of the Pairing on Mobilephones Using BREW.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Proceedings of the SECRYPT 2007, 2007

K2 Stream Cipher.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

2006
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques.
IEICE Transactions, 2006

Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

2005
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification.
IEICE Transactions, 2005

Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Transactions, 2005

2004
Secure Service and Network Framework for Mobile Ethernet.
Wireless Personal Communications, 2004

New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.
IEICE Transactions, 2004


  Loading...