Shinsaku Kiyomoto

Orcid: 0000-0003-0268-0532

According to our database1, Shinsaku Kiyomoto authored at least 237 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Linkage Between CVE and ATT&CK with Public Information.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Shrinkable Ring Signatures: It Wasn't Them!
Proceedings of the Information Security Practice and Experience, 2024

Vulnerability Information Sharing Platform for Securing Hardware Supply Chains.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

Threshold Ring Signatures with Accountability.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training.
IEEE Trans. Computers, February, 2023

Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence.
IACR Cryptol. ePrint Arch., 2023

GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation.
IACR Cryptol. ePrint Arch., 2023

Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023

Compact Ring Signatures with Post-Quantum Security in Standard Model.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Compact Accountable Ring Signatures in the Plain Model.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model.
Theor. Comput. Sci., 2022

Chosen-ciphertext lattice-based public key encryption with equality test in standard model.
Theor. Comput. Sci., 2022

Multi-dimensional sub/super-range signatures.
J. Inf. Secur. Appl., 2022

Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234].
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version).
IACR Cryptol. ePrint Arch., 2022

Efficient Unique Ring Signatures From Lattices.
IACR Cryptol. ePrint Arch., 2022

Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices.
Proceedings of the Provable and Practical Security, 2022

Feature-level Approach for the Evaluation of Text Classification Models.
Proceedings of the 17th International Joint Conference on Computer Vision, 2022

Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Effect of Errors on the Evaluation of Machine Learning Systems.
Proceedings of the 17th International Joint Conference on Computer Vision, 2022

Influence of Errors on the Evaluation of Text Classification Systems.
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2022

CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.
IACR Trans. Symmetric Cryptol., 2021

Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data.
IEEE Trans. Big Data, 2021

Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists.
J. Inf. Process., 2021

Privacy Risk of Document Data and a Countermeasure Framework.
J. Inf. Process., 2021

Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics.
Inf., 2021

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform.
IET Inf. Secur., 2021

A Compact Digital Signature Scheme Based on the Module-LWR Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs.
IACR Cryptol. ePrint Arch., 2021

Lattice-based signcryption with equality test in standard model.
Comput. Stand. Interfaces, 2021

Identity-Based Linkable Ring Signatures From Lattices.
IEEE Access, 2021

Automatic Security Inspection Framework for Trustworthy Supply Chain.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021

A Comparison of GKE Protocols based on SIDH.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text.
Proceedings of the 35th Pacific Asia Conference on Language, Information and Computation, 2021

Machine Translated Text Detection Through Text Similarity with Round-Trip Translation.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem.
Proceedings of the Advances in Information and Computer Security, 2021

(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring.
Proceedings of the Advances in Information and Computer Security, 2021

Fast GPU Implementation of Dumer's Algorithm Solving the Syndrome Decoding Problem.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists.
Proceedings of the 27th IEEE International Symposium on On-Line Testing and Robust System Design, 2021

OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Countermeasures Against Backdoor Attacks Towards Malware Detectors.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

Generating Residue Number System Bases.
Proceedings of the 28th IEEE Symposium on Computer Arithmetic, 2021

Efficient Unique Ring Signature for Blockchain Privacy Protection.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption.
IEEE Trans. Engineering Management, 2020

Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020

On the Complexity of the LWR-Solving BKW Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Anonymization Technique Based on SGD Matrix Factorization.
IEICE Trans. Inf. Syst., 2020

Time-Specific Signatures.
IACR Cryptol. ePrint Arch., 2020

Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption.
IACR Cryptol. ePrint Arch., 2020

Lattice-based public key encryption with equality test in standard model, revisited.
CoRR, 2020

A Practical Privacy-Preserving Algorithm for Document Data.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Integerwise Functional Bootstrapping on TFHE.
Proceedings of the Information Security - 23rd International Conference, 2020

Recommender Systems Robust to Data Poisoning using Trim Learning.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Effects of Explanatory Information on Privacy Policy Summarization Tool Perception.
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020

Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Consideration on Data Conformance Toward Building Trust in Supply Chain.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020

Stronger Targeted Poisoning Attacks Against Malware Detection.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

Feasibility study of a camera-based PUF in a realistic scenario.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Introduction.
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020

Secure Data Management Technology.
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020

2019
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability.
J. Inf. Process., 2019

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Evaluation of Code-based Signature Schemes.
IACR Cryptol. ePrint Arch., 2019

Privacy-friendly platform for healthcare data in cloud based on blockchain environment.
Future Gener. Comput. Syst., 2019

Identifying Adversarial Sentences by Analyzing Text Complexity.
CoRR, 2019

Secret Sharing on Evolving Multi-level Access Structure.
Proceedings of the Information Security Applications - 20th International Conference, 2019

On Embedding Backdoor in Malware Detectors Using Machine Learning.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

A Framework for Secure and Trustworthy Data Management in Supply Chain.
Proceedings of the Mobile Web and Intelligent Information Systems, 2019

Evaluation of Software PUF Based on Gyroscope.
Proceedings of the Information Security Practice and Experience, 2019

Detecting Machine-Translated Text using Back Translation.
Proceedings of the 12th International Conference on Natural Language Generation, 2019

A Framework for Blockchain-Based Verification of Integrity and Authenticity.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Experiment on Side-Channel Key-Recovery using a Real LPWA End-device.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

User Study of the Effectiveness of a Privacy Policy Summarization Tool.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Detecting Machine-Translated Paragraphs by Matching Similar Words.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2019

A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.
Secur. Commun. Networks, 2018

PPM: Privacy Policy Manager for Home Energy Management System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018

I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Linear Depth Integer-Wise Homomorphic Division.
Proceedings of the Information Security Theory and Practice, 2018

The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

An Evaluation Framework for Fastest Oblivious RAM.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

BlockStore: A Secure Decentralized Storage Framework on Blockchain.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Active Attack Against Oblivious RAM.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction.
J. Internet Serv. Inf. Secur., 2017

Privacy-friendly secure bidding for smart grid demand-response.
Inf. Sci., 2017

Diversification of Autonomous Vehicle Driving Behavior.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

(p, N)-identifiability: Anonymity under Practical Adversaries.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

On blockchain-based anonymized dataset distribution platform.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Robust ORAM: Enhancing Availability, Confidentiality and Integrity.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Towards Outsourced Privacy-Preserving Multiparty DBSCAN.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Verification of Data Collection Methods for Live Migration Protection Mechanism.
Proceedings of the Advances in Network-Based Information Systems, 2017

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Proceedings of the Advances in Information and Computer Security, 2017

VIGraph - A Framework for Verifiable Information.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

On blockchain-based authorization architecture for beyond-5G mobile services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

White-box Implementation of Stream Cipher.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Hypercubes and Private Information Retrieval.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Control Mechanism for Live Migration with Data Regulations Preservation.
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

On evolutionary computation for moving target defense in software defined networks.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

An Experimental Study of the BDD Approach for the Search LWE Problem.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Portable Implementation of Lattice-based Cryptography using JavaScript.
Int. J. Netw. Comput., 2016

On the Leakage Resilient Cryptography in Game-Theoretic Settings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

PrefRank: Quantification and Aggregation of Subjective User Preferences.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Sensor-based Wearable PUF.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

On Gender Specific Perception of Data Sharing in Japan.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

User-in-a-context: A blueprint for context-aware identification.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Access Control for Cross-Border Transfer of Sensor Data.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

A Model for Personalised Perception of Policies.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Easing the Burden of Setting Privacy Preferences: A Machine Learning Approach.
Proceedings of the Information Systems Security and Privacy, 2016

Personalised Privacy by Default Preferences - Experiment and Analysis.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Data Protection for Cross-Border Live Migration in Multi-cloud Environment.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

Secure Bike Sharing System for Multi-Modal Journey.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
On Partitioning Secret Data Based on Concept of Functional Safety.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

An agent-based framework for Informed Consent in the internet of things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Towards Tracing of k-Anonymized Datasets.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

k-anonymity: Risks and the Reality.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

New Security Challenges in the 5G Network.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Privacy-friendly secure bidding scheme for demand response in smart grid.
Proceedings of the IEEE First International Smart Cities Conference, 2015

Lightweight Practical Private One-Way Anonymous Messaging.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Design of a Security Gateway for iKaaS Platform.
Proceedings of the Cloud Computing - 6th International Conference, 2015

Practical Private One-way Anonymous Message Routing.
Proceedings of the 10th ACM Symposium on Information, 2015

Personal Agent for Services in ITS.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Security issues on IT systems during disasters: a survey.
J. Ambient Intell. Humaniz. Comput., 2014

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014

Fast Implementation of KCipher-2 for Software and Hardware.
IEICE Trans. Inf. Syst., 2014

Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A Pre-processing Composition for Secret Key Recovery on Android Smartphone.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014

PrefRank: fair aggregation of subjective user preferences.
Proceedings of the Symposium on Applied Computing, 2014

Privacy preserving trusted social feedback.
Proceedings of the Symposium on Applied Computing, 2014

Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

How to Find an Appropriate K for K-Anonymization.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

A Privacy Risk Model for Trajectory Data.
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014

Beyond proofs of data possession: Finding defective blocks in outsourced storage.
Proceedings of the IEEE Global Communications Conference, 2014

Key Extraction Attack Using Statistical Analysis of Memory Dump Data.
Proceedings of the Risks and Security of Internet and Systems, 2014

Data Storage on the Cloud under User Control.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

XOR network coding pollution prevention without homomorphic functions.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
A Description of the KCipher-2 Encryption Algorithm.
RFC, August, 2013

Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions.
IACR Cryptol. ePrint Arch., 2013

P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Trust, 2013

LMM - A Common Component for Software License Management on Cloud.
Proceedings of the SECRYPT 2013, 2013

A Key-revocable Attribute-based Encryption for Mobile Cloud Environments.
Proceedings of the SECRYPT 2013, 2013

AVON - A Fast Hash Function for Intel SIMD Architectures.
Proceedings of the SECRYPT 2013, 2013

Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

PPM: Privacy Policy Manager for Personalized Services.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Design of Categorization Mechanism for Disaster-Information-Gathering System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Software Protection Combined with Tamper-Proof Device.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Privacy Preservation of User History Graph.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Memory Access Pattern Protection for Resource-Constrained Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2012

Security-and-Privacy-Related Issues on IT Systems During Disasters.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
AMY: Use your cell phone to create a protected personal network over devices.
IEEE Trans. Consumer Electron., 2011

Model for a Common Notion of Privacy Leakage on Public Database.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism.
J. Internet Serv. Inf. Secur., 2011

Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Automatic security verification for 3-party authentication and key exchange protocols.
Proceedings of the 5th International Conference on Network and System Security, 2011

MASHA - Low Cost Authentication with a New Stream Cipher.
Proceedings of the Information Security, 14th International Conference, 2011

On Data Importance Analysis.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Data Anonymity in Multi-Party Service Model.
Proceedings of the Security Technology, 2011

Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Proceedings of the Applied Cryptography and Network Security, 2011

Privacy Frost: A User-Oriented Data Anonymization Tool.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Improved Subset Difference Method with Ternary Tree.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

On a Construction of Stream-cipher-based Hash Functions.
Proceedings of the SECRYPT 2010, 2010

A Small But Non-negligible Flaw in the Android Permission Scheme.
Proceedings of the POLICY 2010, 2010

Efficient Implementation of Pairing on BREW Mobile Phones.
Proceedings of the Advances in Information and Computer Security, 2010

Stream Cipher-Based Hash Function and Its Security.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

A User-Oriented Anonymization Mechanism for Public Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010

Towards a Common Notion of Privacy Leakage on Public Database.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Security Verification for Authentication and Key Exchange Protocols, Revisited.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Side-Channel Analysis of the K2 Stream Cipher.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
A Fast (<i>k</i>, <i>L</i>, <i>n</i>)-Threshold Ramp Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Design of Anonymous Attribute Authentication Mechanism.
IEICE Trans. Commun., 2009

Privacy-Aware Location Database Service for Granular Queries.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Proceedings of the SECRYPT 2009, 2009

How to Bootstrap Security for Ad-Hoc Network: Revisited.
Proceedings of the Emerging Challenges for Security, 2009

The rakaposhi Stream Cipher.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Offline Peer-to-Peer Broadcast with Anonymity.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Obfuscation Mechanism in Conjunction with Tamper-Proof Module.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism.
J. Inf. Process., 2008

Efficient Implementation of the Pairing on Mobilephones Using BREW.
IEICE Trans. Inf. Syst., 2008

On a Fast (<i>k, n</i>)-Threshold Secret Sharing Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Fast (3, <i>n</i>)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
IACR Cryptol. ePrint Arch., 2008

Ternary Subset Difference Method and Its Quantitative Analysis.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

FPGA-Targeted Hardware Implementations of K2.
Proceedings of the SECRYPT 2008, 2008

Anonymous attribute authentication scheme using self-blindable certificates.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

On-the-Fly Automatic Generation of Security Protocols.
Proceedings of the ICEIS 2008, 2008

2007
Development of security functions for a medical information sharing platform.
Syst. Comput. Jpn., 2007

Universally Composable Client-to-Client General Authenticated Key Exchange.
Inf. Media Technol., 2007

Design of τ-Gradual Key-Management Schemes for Mobile Content Distribution.
Inf. Media Technol., 2007

Universally Composable Hierarchical Hybrid Authenticated Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

On Effectiveness of Clock Control in Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Proceedings of the SECRYPT 2007, 2007

K2 Stream Cipher.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

2006
Design of Self-Delegation for Mobile Terminals.
Inf. Media Technol., 2006

An Obfuscation Scheme Using Affine Transformation and Its Implementation.
Inf. Media Technol., 2006

Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

2005
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2004
Secure Service and Network Framework for Mobile Ethernet.
Wirel. Pers. Commun., 2004

New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004


  Loading...