Shinsaku Kiyomoto
According to our database1,
Shinsaku Kiyomoto
authored at least 186 papers
between 2004 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2021
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists.
J. Inf. Process., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Comput. Stand. Interfaces, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
2020
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption.
IEEE Trans. Engineering Management, 2020
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Inf. Syst., 2020
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption.
IACR Cryptol. ePrint Arch., 2020
Lattice-based public key encryption with equality test supporting flexible authorization in standard model.
CoRR, 2020
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the 2020 European Conference on Networks and Communications, 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
2019
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability.
J. Inf. Process., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Privacy-friendly platform for healthcare data in cloud based on blockchain environment.
Future Gener. Comput. Syst., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the Mobile Web and Intelligent Information Systems, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the 12th International Conference on Natural Language Generation, 2019
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.
Secur. Commun. Networks, 2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform.
IACR Cryptol. ePrint Arch., 2018
I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the Information Security Theory and Practice, 2018
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the 3rd International Conference on Internet of Things, 2018
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction.
J. Internet Serv. Inf. Secur., 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Int. J. Netw. Comput., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Mobile Internet Security - First International Symposium, 2016
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Proceedings of the Information Systems Security and Privacy, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the IEEE First International Smart Cities Conference, 2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the Cloud Computing - 6th International Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
J. Ambient Intell. Humaniz. Comput., 2014
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Symposium on Applied Computing, 2014
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
IEEE Trans. Consumer Electron., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism.
J. Internet Serv. Inf. Secur., 2011
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Automatic security verification for 3-party authentication and key exchange protocols.
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Proceedings of the Security Technology, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
On a Construction of Stream-cipher-based Hash Functions.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
J. Inf. Process., 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
FPGA-Targeted Hardware Implementations of K2.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
On-the-Fly Automatic Generation of Security Protocols.
Proceedings of the ICEIS 2008, 2008
2007
Systems and Computers in Japan, 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
2006
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004