A New (k,n)-Threshold Secret Sharing Scheme and Its Extension J Kurihara, S Kiyomoto, K Fukushima, T Tanaka International Conference on Information Security, 455-470, 2008 | 116 | 2008 |
A formal model to analyze the permission authorization and enforcement in the android framework W Shin, S Kiyomoto, K Fukushima, T Tanaka 2010 IEEE Second International Conference on Social Computing, 944-951, 2010 | 111 | 2010 |
Medibchain: A blockchain based privacy preserving platform for healthcare data A Al Omar, MS Rahman, A Basu, S Kiyomoto International conference on security, privacy and anonymity in computation …, 2017 | 105 | 2017 |
A small but non-negligible flaw in the android permission scheme W Shin, S Kwak, S Kiyomoto, K Fukushima, T Tanaka 2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 84 | 2010 |
Privacy-friendly platform for healthcare data in cloud based on blockchain environment A Al Omar, MZA Bhuiyan, A Basu, S Kiyomoto, MS Rahman Future generation computer systems 95, 511-521, 2019 | 81 | 2019 |
Run-time enforcement of information-flow properties on Android L Jia, J Aljuraidan, E Fragkaki, L Bauer, M Stroucken, K Fukushima, ... European Symposium on Research in Computer Security, 775-792, 2013 | 75 | 2013 |
Towards formal analysis of the permission-based security model for android W Shin, S Kiyomoto, K Fukushima, T Tanaka 2009 Fifth International Conference on Wireless and Mobile Communications, 87-92, 2009 | 74 | 2009 |
Security vulnerabilities and solutions in mobile WiMAX A Deininger, S Kiyomoto, J Kurihara, T Tanaka IJCSNS International Journal of Computer Science and Network Security 7 (11 …, 2007 | 66 | 2007 |
On a fast (k, n)-threshold secret sharing scheme J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008 | 59 | 2008 |
PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation WB Tesfay, P Hofmann, T Nakamura, S Kiyomoto, J Serna Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018 | 58 | 2018 |
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE transactions on fundamentals of electronics, communications and …, 2008 | 48 | 2008 |
On blockchain-based anonymized dataset distribution platform S Kiyomoto, MS Rahman, A Basu 2017 IEEE 15th International Conference on Software Engineering Research …, 2017 | 44 | 2017 |
K2: a stream cipher algorithm using dynamic feedback control. S Kiyomoto, T Tanaka, K Sakurai SECRYPT, 204-213, 2007 | 42 | 2007 |
Parallel Gauss sieve algorithm: Solving the SVP challenge over a 128-dimensional ideal lattice T Ishiguro, S Kiyomoto, Y Miyake, T Takagi International Workshop on Public Key Cryptography, 411-428, 2014 | 36 | 2014 |
The rakaposhi Stream Cipher C Cid, S Kiyomoto, J Kurihara International Conference on Information and Communications Security, 32-46, 2009 | 34 | 2009 |
A fast (k, L, n)-threshold ramp secret sharing scheme J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2009 | 34 | 2009 |
An agent-based framework for informed consent in the internet of things R Neisse, G Baldini, G Steri, Y Miyake, S Kiyomoto, AR Biswas 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 789-794, 2015 | 32 | 2015 |
I read but don't agree: Privacy policy benchmarking using machine learning and the eu gdpr WB Tesfay, P Hofmann, T Nakamura, S Kiyomoto, J Serna Companion Proceedings of the The Web Conference 2018, 163-166, 2018 | 29 | 2018 |
Privacy-friendly secure bidding for smart grid demand-response MS Rahman, A Basu, S Kiyomoto, MZA Bhuiyan Information Sciences 379, 229-240, 2017 | 27 | 2017 |
Efficient implementation of the pairing on mobilephones using BREW M Yoshitomi, T Takagi, S Kiyomoto, T Tanaka IEICE transactions on information and systems 91 (5), 1330-1337, 2008 | 27 | 2008 |