BibTeX records: Shinsaku Kiyomoto

download as .bib file

@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24,
  author       = {Kento Hasegawa and
                  Katsutoshi Hanahara and
                  Hiroshi Sugisaki and
                  Minoru Kozu and
                  Kazuhide Fukushima and
                  Yosuke Murakami and
                  Shinsaku Kiyomoto},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Vulnerability Information Sharing Platform for Securing Hardware Supply
                  Chains},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {403--410},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012351800003648},
  doi          = {10.5220/0012351800003648},
  timestamp    = {Tue, 02 Apr 2024 14:37:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HasegawaHSKFMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/NarisadaFK23,
  author       = {Shintaro Narisada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Multiparallel {MMT:} Faster {ISD} Algorithm Solving High-Dimensional
                  Syndrome Decoding Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {241--252},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022cip0023},
  doi          = {10.1587/TRANSFUN.2022CIP0023},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/NarisadaFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HasegawaHNKT23,
  author       = {Kento Hasegawa and
                  Seira Hidano and
                  Kohei Nozawa and
                  Shinsaku Kiyomoto and
                  Nozomu Togawa},
  title        = {R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial
                  Training},
  journal      = {{IEEE} Trans. Computers},
  volume       = {72},
  number       = {2},
  pages        = {333--345},
  year         = {2023},
  url          = {https://doi.org/10.1109/TC.2022.3222090},
  doi          = {10.1109/TC.2022.3222090},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/HasegawaHNKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/Nguyen-SonHFKE23,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Isao Echizen},
  editor       = {Anna Rogers and
                  Jordan L. Boyd{-}Graber and
                  Naoaki Okazaki},
  title        = {VoteTRANS: Detecting Adversarial Text without Training by Voting on
                  Hard Labels of Transformations},
  booktitle    = {Findings of the Association for Computational Linguistics: {ACL} 2023,
                  Toronto, Canada, July 9-14, 2023},
  pages        = {5090--5104},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.findings-acl.315},
  doi          = {10.18653/V1/2023.FINDINGS-ACL.315},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/Nguyen-SonHFKE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/OkadaFKT23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {695--724},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_26},
  doi          = {10.1007/978-3-031-33488-7\_26},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/OkadaFKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KhucSDGFK23,
  author       = {Thanh Xuan Khuc and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Compact Accountable Ring Signatures in the Plain Model},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_2},
  doi          = {10.1007/978-981-97-0942-7\_2},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KhucSDGFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/NguyenSDGFK23,
  author       = {Tuong Ngoc Nguyen and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Compact Ring Signatures with Post-Quantum Security in Standard Model},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_4},
  doi          = {10.1007/978-981-97-0942-7\_4},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/NguyenSDGFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AnandBCFIKLNST23,
  author       = {Ravi Anand and
                  Subhadeep Banik and
                  Andrea Caforio and
                  Kazuhide Fukushima and
                  Takanori Isobe and
                  Shinsaku Kiyomoto and
                  Fukang Liu and
                  Yuto Nakano and
                  Kosei Sakamoto and
                  Nobuyuki Takeuchi},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {An Ultra-High Throughput AES-Based Authenticated Encryption Scheme
                  for 6G: Design and Implementation},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {229--248},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_12},
  doi          = {10.1007/978-3-031-50594-2\_12},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AnandBCFIKLNST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NarisadaBFK23,
  author       = {Shintaro Narisada and
                  Shohei Beppu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a
                  Quantum Machine},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {329--338},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011618000003405},
  doi          = {10.5220/0011618000003405},
  timestamp    = {Thu, 11 May 2023 10:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NarisadaBFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/KhucTSDGFK23,
  author       = {Thanh Xuan Khuc and
                  Anh The Ta and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Francesco Regazzoni and
                  Bodhisatwa Mazumdar and
                  Sri Parameswaran},
  title        = {Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism
                  Problems},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 13th International
                  Conference, {SPACE} 2023, Roorkee, India, December 14-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14412},
  pages        = {214--241},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51583-5\_13},
  doi          = {10.1007/978-3-031-51583-5\_13},
  timestamp    = {Tue, 07 May 2024 20:12:09 +0200},
  biburl       = {https://dblp.org/rec/conf/space/KhucTSDGFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wahc/Narisada0FKN23,
  author       = {Shintaro Narisada and
                  Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Takashi Nishide},
  editor       = {Michael Brenner and
                  Anamaria Costache and
                  Kurt Rohloff},
  title        = {{GPU} Acceleration of High-Precision Homomorphic Computation Utilizing
                  Redundant Representation},
  booktitle    = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605759.3625256},
  doi          = {10.1145/3605759.3625256},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wahc/Narisada0FKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-01273,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Isao Echizen},
  title        = {VoteTRANS: Detecting Adversarial Text without Training by Voting on
                  Hard Labels of Transformations},
  journal      = {CoRR},
  volume       = {abs/2306.01273},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.01273},
  doi          = {10.48550/ARXIV.2306.01273},
  eprinttype    = {arXiv},
  eprint       = {2306.01273},
  timestamp    = {Mon, 12 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-01273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkadaFKT23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/479},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkadaFKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NarisadaOFKN23,
  author       = {Shintaro Narisada and
                  Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Takashi Nishide},
  title        = {{GPU} Acceleration of High-Precision Homomorphic Computation Utilizing
                  Redundant Representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1467},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1467},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NarisadaOFKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OkadaTFKT22,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Erratum: {A} Compact Digital Signature Scheme Based on the Module-LWR
                  Problem {[IEICE} Transactions on Fundamentals of Electronics, Communications
                  and Computer Sciences Vol. {E104.A} (2021), No. 9 pp.1219-1234]},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {2},
  pages        = {130},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2022eae0001},
  doi          = {10.1587/TRANSFUN.2022EAE0001},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IshizakaK22,
  author       = {Masahito Ishizaka and
                  Shinsaku Kiyomoto},
  title        = {Multi-dimensional sub/super-range signatures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103084},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2021.103084},
  doi          = {10.1016/J.JISA.2021.103084},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/IshizakaK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/DuongRSFKS22,
  author       = {Dung Hoang Duong and
                  Partha Sarathi Roy and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Arnaud Sipasseuth},
  title        = {Chosen-ciphertext lattice-based public key encryption with equality
                  test in standard model},
  journal      = {Theor. Comput. Sci.},
  volume       = {905},
  pages        = {31--53},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.tcs.2021.12.013},
  doi          = {10.1016/J.TCS.2021.12.013},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/DuongRSFKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/RoyDSSFK22,
  author       = {Partha Sarathi Roy and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Arnaud Sipasseuth and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Lattice-based public-key encryption with equality test supporting
                  flexible authorization in standard model},
  journal      = {Theor. Comput. Sci.},
  volume       = {929},
  pages        = {124--139},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.tcs.2022.06.034},
  doi          = {10.1016/J.TCS.2022.06.034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/RoyDSSFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/0001JDSFK22,
  author       = {Priyanka Dutta and
                  Mei Jiang and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Hierarchical Identity-based Puncturable Encryption from Lattices with
                  Application to Forward Security},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {408--422},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517400},
  doi          = {10.1145/3488932.3517400},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/0001JDSFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/Nguyen-SonUHFK22,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Huy Quang Ung and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Yoav Goldberg and
                  Zornitsa Kozareva and
                  Yue Zhang},
  title        = {CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction
                  Correction, and Perturbed Word Suggestion},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022},
  pages        = {2903--2913},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.findings-emnlp.210},
  doi          = {10.18653/V1/2022.FINDINGS-EMNLP.210},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/Nguyen-SonUHFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NguyenTLDSGFK22,
  author       = {Tuong Ngoc Nguyen and
                  Anh The Ta and
                  Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Efficient Unique Ring Signatures from Lattices},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {447--466},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_22},
  doi          = {10.1007/978-3-031-17146-8\_22},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NguyenTLDSGFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grapp/BracamonteHK22,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {A. Augusto de Sousa and
                  Kurt Debattista and
                  Alexis Paljic and
                  Mounia Ziat and
                  Christophe Hurter and
                  Helen C. Purchase and
                  Giovanni Maria Farinella and
                  Petia Radeva and
                  Kadi Bouatouch},
  title        = {Influence of Errors on the Evaluation of Text Classification Systems},
  booktitle    = {Computer Vision, Imaging and Computer Graphics Theory and Applications
                  - 17th International Joint Conference, {VISIGRAPP} 2022, Virtual Event,
                  February 6-8, 2022, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1815},
  pages        = {161--181},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45725-8\_8},
  doi          = {10.1007/978-3-031-45725-8\_8},
  timestamp    = {Fri, 26 Apr 2024 12:34:25 +0200},
  biburl       = {https://dblp.org/rec/conf/grapp/BracamonteHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hucapp/BracamonteHK22,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Alexis Paljic and
                  Mounia Ziat and
                  Kadi Bouatouch},
  title        = {Effect of Errors on the Evaluation of Machine Learning Systems},
  booktitle    = {Proceedings of the 17th International Joint Conference on Computer
                  Vision, Imaging and Computer Graphics Theory and Applications, {VISIGRAPP}
                  2022, Volume 2: HUCAPP, Online Streaming, February 6-8, 2022},
  pages        = {48--57},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010839300003124},
  doi          = {10.5220/0010839300003124},
  timestamp    = {Tue, 06 Jun 2023 14:58:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hucapp/BracamonteHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IshizakaFK22,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Trapdoor Sanitizable and Redactable Signatures with Unlinkability,
                  Invisibility and Strong Context-Hiding},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {337--362},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_17},
  doi          = {10.1007/978-3-031-29371-9\_17},
  timestamp    = {Thu, 06 Apr 2023 10:01:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IshizakaFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivapp/BracamonteHNK22,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Toru Nakamura and
                  Shinsaku Kiyomoto},
  editor       = {Christophe Hurter and
                  Helen C. Purchase and
                  Kadi Bouatouch},
  title        = {Feature-level Approach for the Evaluation of Text Classification Models},
  booktitle    = {Proceedings of the 17th International Joint Conference on Computer
                  Vision, Imaging and Computer Graphics Theory and Applications, {VISIGRAPP}
                  2022, Volume 3: IVAPP, Online Streaming, February 6-8, 2022},
  pages        = {164--170},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010846900003124},
  doi          = {10.5220/0010846900003124},
  timestamp    = {Tue, 06 Jun 2023 14:58:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivapp/BracamonteHNK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DuttaDSFK22,
  author       = {Priyanka Dutta and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Chunpeng Ge and
                  Fuchun Guo},
  title        = {Zero-Knowledge Range Arguments for Signed Fractional Numbers from
                  Lattices},
  booktitle    = {Provable and Practical Security - 16th International Conference, ProvSec
                  2022, Nanjing, China, November 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13600},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20917-8\_9},
  doi          = {10.1007/978-3-031-20917-8\_9},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/DuttaDSFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-13702,
  author       = {Kento Hasegawa and
                  Seira Hidano and
                  Kohei Nozawa and
                  Shinsaku Kiyomoto and
                  Nozomu Togawa},
  title        = {R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial
                  Training},
  journal      = {CoRR},
  volume       = {abs/2205.13702},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.13702},
  doi          = {10.48550/ARXIV.2205.13702},
  eprinttype    = {arXiv},
  eprint       = {2205.13702},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-13702.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakamotoLNKI22,
  author       = {Kosei Sakamoto and
                  Fukang Liu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Takanori Isobe},
  title        = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full
                  version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/116},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SakamotoLNKI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenTLDSGFK22,
  author       = {Tuong Ngoc Nguyen and
                  Anh The Ta and
                  Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Efficient Unique Ring Signatures From Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1070},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1070},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenTLDSGFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LeVDSLFK21,
  author       = {Huy Quoc Le and
                  Bay Vo and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Ngoc T. Le and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Identity-Based Linkable Ring Signatures From Lattices},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {84739--84755},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3087808},
  doi          = {10.1109/ACCESS.2021.3087808},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LeVDSLFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LeDRSFK21,
  author       = {Huy Quoc Le and
                  Dung Hoang Duong and
                  Partha Sarathi Roy and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Lattice-based signcryption with equality test in standard model},
  journal      = {Comput. Stand. Interfaces},
  volume       = {76},
  pages        = {103515},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.csi.2021.103515},
  doi          = {10.1016/J.CSI.2021.103515},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LeDRSFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/NarisadaOFK21,
  author       = {Shintaro Narisada and
                  Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Faster Rotation-Based Gauss Sieve for Solving the {SVP} on General
                  Ideal Lattices},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {1},
  pages        = {79--88},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020CIP0014},
  doi          = {10.1587/TRANSFUN.2020CIP0014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/NarisadaOFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OkadaTFKT21,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {9},
  pages        = {1219--1234},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020dmp0012},
  doi          = {10.1587/TRANSFUN.2020DMP0012},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/0005FXKT21,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Junting Xiao and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-constrained implementation of lattice-based encryption scheme
                  on standard Java Card platform},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {267--281},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12012},
  doi          = {10.1049/ISE2.12012},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/0005FXKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/OkadaKC21,
  author       = {Hiroki Okada and
                  Shinsaku Kiyomoto and
                  Carlos Cid},
  title        = {Integer-Wise Functional Bootstrapping on {TFHE:} Applications in Secure
                  Integer Arithmetics},
  journal      = {Inf.},
  volume       = {12},
  number       = {8},
  pages        = {297},
  year         = {2021},
  url          = {https://doi.org/10.3390/info12080297},
  doi          = {10.3390/INFO12080297},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/OkadaKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/NozawaHHKHT21,
  author       = {Kohei Nozawa and
                  Kento Hasegawa and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Kazuo Hashimoto and
                  Nozomu Togawa},
  title        = {Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level
                  Netlists},
  journal      = {J. Inf. Process.},
  volume       = {29},
  pages        = {236--246},
  year         = {2021},
  url          = {https://doi.org/10.2197/ipsjjip.29.236},
  doi          = {10.2197/IPSJJIP.29.236},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/NozawaHHKHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/MimotoHKKM21,
  author       = {Tomoaki Mimoto and
                  Masayuki Hashimoto and
                  Shinsaku Kiyomoto and
                  Koji Kitamura and
                  Atsuko Miyaji},
  title        = {Privacy Risk of Document Data and a Countermeasure Framework},
  journal      = {J. Inf. Process.},
  volume       = {29},
  pages        = {778--786},
  year         = {2021},
  url          = {https://doi.org/10.2197/ipsjjip.29.778},
  doi          = {10.2197/IPSJJIP.29.778},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/MimotoHKKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/ThaoRBKKO21,
  author       = {Tran Phuong Thao and
                  Mohammad Shahriar Rahman and
                  Md. Zakirul Alam Bhuiyan and
                  Ayumu Kubota and
                  Shinsaku Kiyomoto and
                  Kazumasa Omote},
  title        = {Optimizing Share Size in Efficient and Robust Secret Sharing Scheme
                  for Big Data},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {7},
  number       = {4},
  pages        = {703--716},
  year         = {2021},
  url          = {https://doi.org/10.1109/TBDATA.2017.2708085},
  doi          = {10.1109/TBDATA.2017.2708085},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/ThaoRBKKO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SakamotoLNKI21,
  author       = {Kosei Sakamoto and
                  Fukang Liu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Takanori Isobe},
  title        = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {2},
  pages        = {1--30},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i2.1-30},
  doi          = {10.46586/TOSC.V2021.I2.1-30},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SakamotoLNKI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TaKNLDSFK21,
  author       = {Anh The Ta and
                  Thanh Xuan Khuc and
                  Tuong Ngoc Nguyen and
                  Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Efficient Unique Ring Signature for Blockchain Privacy Protection},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {391--407},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_20},
  doi          = {10.1007/978-3-030-90567-5\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TaKNLDSFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/BajardFKPSS21,
  author       = {Jean{-}Claude Bajard and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Thomas Plantard and
                  Arnaud Sipasseuth and
                  Willy Susilo},
  title        = {Generating Residue Number System Bases},
  booktitle    = {28th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2021, Lyngby,
                  Denmark, June 14-16, 2021},
  pages        = {86--93},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ARITH51176.2021.00027},
  doi          = {10.1109/ARITH51176.2021.00027},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arith/BajardFKPSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/NarisadaMHUSHK21,
  author       = {Shintaro Narisada and
                  Yuki Matsumoto and
                  Seira Hidano and
                  Toshihiro Uchibayashi and
                  Takuo Suganuma and
                  Masahiro Hiji and
                  Shinsaku Kiyomoto},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {Countermeasures Against Backdoor Attacks Towards Malware Detectors},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {295--314},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_16},
  doi          = {10.1007/978-3-030-92548-2\_16},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/NarisadaMHUSHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HasegawaHKT21,
  author       = {Kento Hasegawa and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Nozomu Togawa},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {Toward Learning Robust Detectors from Imbalanced Datasets Leveraging
                  Weighted Adversarial Training},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {392--411},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_21},
  doi          = {10.1007/978-3-030-92548-2\_21},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/HasegawaHKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteTK21,
  author       = {Vanessa Bracamonte and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Towards Exploring User Perception of a Privacy Sensitive Information
                  Detection Tool},
  booktitle    = {Proceedings of the 7th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13,
                  2021},
  pages        = {628--634},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010319706280634},
  doi          = {10.5220/0010319706280634},
  timestamp    = {Tue, 02 Mar 2021 22:35:43 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/Nguyen-SonTHBKY21,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Tran Phuong Thao and
                  Seira Hidano and
                  Vanessa Bracamonte and
                  Shinsaku Kiyomoto and
                  Rie Shigetomi Yamaguchi},
  title        = {{OPA2D:} One-Pixel Attack, Detection, and Defense in Deep Neural Networks},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9534332},
  doi          = {10.1109/IJCNN52387.2021.9534332},
  timestamp    = {Wed, 29 Sep 2021 17:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/Nguyen-SonTHBKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/HasegawaHNKT21,
  author       = {Kento Hasegawa and
                  Seira Hidano and
                  Kohei Nozawa and
                  Shinsaku Kiyomoto and
                  Nozomu Togawa},
  title        = {Data Augmentation for Machine Learning-Based Hardware Trojan Detection
                  at Gate-Level Netlists},
  booktitle    = {27th {IEEE} International Symposium on On-Line Testing and Robust
                  System Design, {IOLTS} 2021, Torino, Italy, June 28-30, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IOLTS52814.2021.9486713},
  doi          = {10.1109/IOLTS52814.2021.9486713},
  timestamp    = {Wed, 04 Aug 2021 13:58:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iolts/HasegawaHNKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/NarisadaFK21,
  author       = {Shintaro Narisada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Fast {GPU} Implementation of Dumer's Algorithm Solving the Syndrome
                  Decoding Problem},
  booktitle    = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking
                  (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September
                  30 - Oct. 3, 2021},
  pages        = {971--977},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00136},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00136},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/NarisadaFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/UemuraFKKT21,
  author       = {Shusaku Uemura and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Momonari Kudo and
                  Tsuyoshi Takagi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on
                  the {LWR} Problem},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_2},
  doi          = {10.1007/978-3-030-85987-9\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/UemuraFKKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NakamuraIKY21,
  author       = {Toru Nakamura and
                  Hiroshi Ito and
                  Shinsaku Kiyomoto and
                  Toshihiro Yamauchi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {(Short Paper) Evidence Collection and Preservation System with Virtual
                  Machine Monitoring},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {64--73},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_4},
  doi          = {10.1007/978-3-030-85987-9\_4},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NakamuraIKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/naacl/Nguyen-SonPHGK21,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Tran Thao Phuong and
                  Seira Hidano and
                  Ishita Gupta and
                  Shinsaku Kiyomoto},
  editor       = {Kristina Toutanova and
                  Anna Rumshisky and
                  Luke Zettlemoyer and
                  Dilek Hakkani{-}T{\"{u}}r and
                  Iz Beltagy and
                  Steven Bethard and
                  Ryan Cotterell and
                  Tanmoy Chakraborty and
                  Yichao Zhou},
  title        = {Machine Translated Text Detection Through Text Similarity with Round-Trip
                  Translation},
  booktitle    = {Proceedings of the 2021 Conference of the North American Chapter of
                  the Association for Computational Linguistics: Human Language Technologies,
                  {NAACL-HLT} 2021, Online, June 6-11, 2021},
  pages        = {5792--5797},
  publisher    = {Association for Computational Linguistics},
  year         = {2021},
  url          = {https://doi.org/10.18653/v1/2021.naacl-main.462},
  doi          = {10.18653/V1/2021.NAACL-MAIN.462},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/naacl/Nguyen-SonPHGK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paclic/Nguyen-SonHFK21,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Kaibao Hu and
                  Jong{-}Bok Kim and
                  Chengqing Zong and
                  Emmanuele Chersoni},
  title        = {{SEPP:} Similarity Estimation of Predicted Probabilities for Defending
                  and Detecting Adversarial Text},
  booktitle    = {Proceedings of the 35th Pacific Asia Conference on Language, Information
                  and Computation, {PACLIC} 2021, Shanghai International Studies University,
                  Shanghai, China, 5-7 November 2021},
  pages        = {11--20},
  publisher    = {Association for Computational Lingustics},
  year         = {2021},
  url          = {https://aclanthology.org/2021.paclic-1.2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paclic/Nguyen-SonHFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OkadaKC21,
  author       = {Hiroki Okada and
                  Shinsaku Kiyomoto and
                  Carlos Cid},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Comparison of {GKE} Protocols based on {SIDH}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {507--514},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010547305070514},
  doi          = {10.5220/0010547305070514},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OkadaKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/NakanoNKOIHYMK21,
  author       = {Yuto Nakano and
                  Toru Nakamura and
                  Yasuaki Kobayashi and
                  Takashi Ozu and
                  Masahito Ishizaka and
                  Masayuki Hashimoto and
                  Hiroyuki Yokoyama and
                  Yutaka Miyake and
                  Shinsaku Kiyomoto},
  title        = {Automatic Security Inspection Framework for Trustworthy Supply Chain},
  booktitle    = {19th {IEEE/ACIS} International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2021, Kanazawa, Japan,
                  June 20-22, 2021},
  pages        = {45--50},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SERA51205.2021.9509040},
  doi          = {10.1109/SERA51205.2021.9509040},
  timestamp    = {Fri, 13 Aug 2021 10:40:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/NakanoNKOIHYMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-05748,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {{SEPP:} Similarity Estimation of Predicted Probabilities for Defending
                  and Detecting Adversarial Text},
  journal      = {CoRR},
  volume       = {abs/2110.05748},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.05748},
  eprinttype    = {arXiv},
  eprint       = {2110.05748},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-05748.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshizakaK21,
  author       = {Masahito Ishizaka and
                  Shinsaku Kiyomoto},
  title        = {Multi-Dimensional Sub/Super-Range Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/698},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshizakaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshizakaK21a,
  author       = {Masahito Ishizaka and
                  Shinsaku Kiyomoto},
  title        = {Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures
                  from Downgradable Affine MACs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1170},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1170},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshizakaK21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkadaTFKT21,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1699},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1699},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkadaTFKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkadaTFKT20,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {On the Complexity of the LWR-Solving {BKW} Algorithm},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {173--182},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_173},
  doi          = {10.1587/TRANSFUN.2019CIP0022},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkadaTFKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MimotoHKM20,
  author       = {Tomoaki Mimoto and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Atsuko Miyaji},
  title        = {Anonymization Technique Based on {SGD} Matrix Factorization},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {2},
  pages        = {299--308},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_299},
  doi          = {10.1587/TRANSINF.2019INP0013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MimotoHKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HidanoMKKH20,
  author       = {Seira Hidano and
                  Takao Murakami and
                  Shuichi Katsumata and
                  Shinsaku Kiyomoto and
                  Goichiro Hanaoka},
  title        = {Exposing Private User Behaviors of Collaborative Filtering via Model
                  Inversion Techniques},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {3},
  pages        = {264--283},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0052},
  doi          = {10.2478/POPETS-2020-0052},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/HidanoMKKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/RahmanOBBKW20,
  author       = {Mohammad Shahriar Rahman and
                  Abdullah Al Omar and
                  Md. Zakirul Alam Bhuiyan and
                  Anirban Basu and
                  Shinsaku Kiyomoto and
                  Guojun Wang},
  title        = {Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed
                  Trust Assumption},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {67},
  number       = {4},
  pages        = {1476--1486},
  year         = {2020},
  url          = {https://doi.org/10.1109/TEM.2019.2960829},
  doi          = {10.1109/TEM.2019.2960829},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tem/RahmanOBBKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FukushimaPDKGF20,
  author       = {Kazuhide Fukushima and
                  Thomas Perianin and
                  Victor Dyseryn and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley and
                  Adrien Facon},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Feasibility study of a camera-based {PUF} in a realistic scenario},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {31:1--31:6},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3407047},
  doi          = {10.1145/3407023.3407047},
  timestamp    = {Mon, 03 Aug 2020 16:17:13 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FukushimaPDKGF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/NarisadaSHUSHK20,
  author       = {Shintaro Narisada and
                  Shoichiro Sasaki and
                  Seira Hidano and
                  Toshihiro Uchibayashi and
                  Takuo Suganuma and
                  Masahiro Hiji and
                  Shinsaku Kiyomoto},
  editor       = {Stephan Krenn and
                  Haya Schulmann and
                  Serge Vaudenay},
  title        = {Stronger Targeted Poisoning Attacks Against Malware Detection},
  booktitle    = {Cryptology and Network Security - 19th International Conference, {CANS}
                  2020, Vienna, Austria, December 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12579},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65411-5\_4},
  doi          = {10.1007/978-3-030-65411-5\_4},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/NarisadaSHUSHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/UenoFNKH20,
  author       = {Rei Ueno and
                  Kazuhide Fukushima and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Naofumi Homma},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Single-Trace Side-Channel Analysis on Polynomial-Based {MAC} Schemes},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {43--67},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_3},
  doi          = {10.1007/978-3-030-68773-1\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/UenoFNKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/NakanoNKIHYMK20,
  author       = {Yuto Nakano and
                  Toru Nakamura and
                  Yasuaki Kobayashi and
                  Masahito Ishizaka and
                  Masayuki Hashimoto and
                  Hiroyuki Yokoyama and
                  Yutaka Miyake and
                  Shinsaku Kiyomoto},
  title        = {Consideration on Data Conformance Toward Building Trust in Supply
                  Chain},
  booktitle    = {2020 European Conference on Networks and Communications, EuCNC 2020,
                  Dubrovnik, Croatia, June 15-18, 2020},
  pages        = {128--132},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuCNC48522.2020.9200933},
  doi          = {10.1109/EUCNC48522.2020.9200933},
  timestamp    = {Tue, 29 Sep 2020 14:45:05 +0200},
  biburl       = {https://dblp.org/rec/conf/eucnc/NakanoNKIHYMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/OkadaTFKT20,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR Problem},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_5},
  doi          = {10.1007/978-3-030-61078-4\_5},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/OkadaTFKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK20,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Evaluating the Effect of Justification and Confidence Information
                  on User Perception of a Privacy Policy Summarization Tool},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {142--151},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0008986101420151},
  doi          = {10.5220/0008986101420151},
  timestamp    = {Tue, 14 Apr 2020 10:48:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteHTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK20a,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Effects of Explanatory Information on Privacy Policy Summarization
                  Tool Perception},
  booktitle    = {Information Systems Security and Privacy - 6th International Conference,
                  {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1545},
  pages        = {156--177},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-94900-6\_8},
  doi          = {10.1007/978-3-030-94900-6\_8},
  timestamp    = {Mon, 21 Mar 2022 16:15:19 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteHTK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HidanoK20,
  author       = {Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Steven Furnell and
                  Paolo Mori and
                  Edgar R. Weippl and
                  Olivier Camp},
  title        = {Recommender Systems Robust to Data Poisoning using Trim Learning},
  booktitle    = {Proceedings of the 6th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27,
                  2020},
  pages        = {721--724},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009180407210724},
  doi          = {10.5220/0009180407210724},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HidanoK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/IshizakaK20,
  author       = {Masahito Ishizaka and
                  Shinsaku Kiyomoto},
  editor       = {Willy Susilo and
                  Robert H. Deng and
                  Fuchun Guo and
                  Yannan Li and
                  Rolly Intan},
  title        = {Time-Specific Signatures},
  booktitle    = {Information Security - 23rd International Conference, {ISC} 2020,
                  Bali, Indonesia, December 16-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12472},
  pages        = {20--38},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62974-8\_2},
  doi          = {10.1007/978-3-030-62974-8\_2},
  timestamp    = {Wed, 25 Nov 2020 17:15:03 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/IshizakaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/OkadaKC20,
  author       = {Hiroki Okada and
                  Shinsaku Kiyomoto and
                  Carlos Cid},
  editor       = {Willy Susilo and
                  Robert H. Deng and
                  Fuchun Guo and
                  Yannan Li and
                  Rolly Intan},
  title        = {Integerwise Functional Bootstrapping on {TFHE}},
  booktitle    = {Information Security - 23rd International Conference, {ISC} 2020,
                  Bali, Indonesia, December 16-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12472},
  pages        = {107--125},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62974-8\_7},
  doi          = {10.1007/978-3-030-62974-8\_7},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/OkadaKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MimotoKKM20,
  author       = {Tomoaki Mimoto and
                  Shinsaku Kiyomoto and
                  Koji Kitamura and
                  Atsuko Miyaji},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {A Practical Privacy-Preserving Algorithm for Document Data},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {1376--1383},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00185},
  doi          = {10.1109/TRUSTCOM50675.2020.00185},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MimotoKKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/MiyajiKTNK20,
  author       = {Atsuko Miyaji and
                  Shinsaku Kiyomoto and
                  Katsuya Tanaka and
                  Yoshifumi Nishida and
                  Koji Kitamura},
  editor       = {Atsuko Miyaji and
                  Tomoaki Mimoto},
  title        = {Introduction},
  booktitle    = {Security Infrastructure Technology for Integrated Utilization of Big
                  Data - Applied to the Living Safety and Medical Fields},
  pages        = {1--3},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-3654-0\_1},
  doi          = {10.1007/978-981-15-3654-0\_1},
  timestamp    = {Fri, 14 May 2021 08:30:50 +0200},
  biburl       = {https://dblp.org/rec/books/sp/20/MiyajiKTNK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/MimotoKM20,
  author       = {Tomoaki Mimoto and
                  Shinsaku Kiyomoto and
                  Atsuko Miyaji},
  editor       = {Atsuko Miyaji and
                  Tomoaki Mimoto},
  title        = {Secure Data Management Technology},
  booktitle    = {Security Infrastructure Technology for Integrated Utilization of Big
                  Data - Applied to the Living Safety and Medical Fields},
  pages        = {65--105},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-3654-0\_4},
  doi          = {10.1007/978-981-15-3654-0\_4},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/20/MimotoKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-03178,
  author       = {Dung Hoang Duong and
                  Partha Sarathi Roy and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Arnaud Sipasseuth},
  title        = {Lattice-based public key encryption with equality test in standard
                  model, revisited},
  journal      = {CoRR},
  volume       = {abs/2005.03178},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.03178},
  eprinttype    = {arXiv},
  eprint       = {2005.03178},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-03178.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-05308,
  author       = {Dung Hoang Duong and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Partha Sarathi Roy and
                  Arnaud Sipasseuth and
                  Willy Susilo},
  title        = {Lattice-based public key encryption with equality test supporting
                  flexible authorization in standard model},
  journal      = {CoRR},
  volume       = {abs/2005.05308},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.05308},
  eprinttype    = {arXiv},
  eprint       = {2005.05308},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-05308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-15423,
  author       = {Huy Quoc Le and
                  Dung Hoang Duong and
                  Partha Sarathi Roy and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Lattice-based Signcryption with Equality Test in Standard Model},
  journal      = {CoRR},
  volume       = {abs/2012.15423},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.15423},
  eprinttype    = {arXiv},
  eprint       = {2012.15423},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-15423.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshizakaK20,
  author       = {Masahito Ishizaka and
                  Shinsaku Kiyomoto},
  title        = {Time-Specific Encryption with Constant-Size Secret-Keys Secure under
                  Standard Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {595},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/595},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshizakaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshizakaK20a,
  author       = {Masahito Ishizaka and
                  Shinsaku Kiyomoto},
  title        = {Time-Specific Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {658},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/658},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshizakaK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/OmarBBKR19,
  author       = {Abdullah Al Omar and
                  Md. Zakirul Alam Bhuiyan and
                  Anirban Basu and
                  Shinsaku Kiyomoto and
                  Mohammad Shahriar Rahman},
  title        = {Privacy-friendly platform for healthcare data in cloud based on blockchain
                  environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {95},
  pages        = {511--521},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.12.044},
  doi          = {10.1016/J.FUTURE.2018.12.044},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/OmarBBKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AttrapadungHKMS19,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Shinsaku Kiyomoto and
                  Tomoaki Mimoto and
                  Jacob C. N. Schuldt},
  title        = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient
                  Constructions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {9},
  pages        = {1048--1060},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1048},
  doi          = {10.1587/TRANSFUN.E102.A.1048},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/AttrapadungHKMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/NakamuraAMKS19,
  author       = {Toru Nakamura and
                  Andrew A. Adams and
                  Kiyoshi Murata and
                  Shinsaku Kiyomoto and
                  Nobuo Suzuki},
  title        = {The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs
                  on User Acceptability},
  journal      = {J. Inf. Process.},
  volume       = {27},
  pages        = {787--801},
  year         = {2019},
  url          = {https://doi.org/10.2197/ipsjjip.27.787},
  doi          = {10.2197/IPSJJIP.27.787},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/NakamuraAMKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuongFK0S19,
  author       = {Dung Hoang Duong and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Partha Sarathi Roy and
                  Willy Susilo},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Lattice-Based Public Key Encryption with Equality Test in Standard
                  Model},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_8},
  doi          = {10.1007/978-3-030-21548-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuongFK0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicling/NguyenSonTHK19,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Tran Phuong Thao and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Alexander F. Gelbukh},
  title        = {Detecting Machine-Translated Paragraphs by Matching Similar Words},
  booktitle    = {Computational Linguistics and Intelligent Text Processing - 20th International
                  Conference, CICLing 2019, La Rochelle, France, April 7-13, 2019, Revised
                  Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13451},
  pages        = {521--532},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-031-24337-0\_36},
  doi          = {10.1007/978-3-031-24337-0\_36},
  timestamp    = {Tue, 28 Feb 2023 16:50:33 +0100},
  biburl       = {https://dblp.org/rec/conf/cicling/NguyenSonTHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NozawaHHKHT19,
  author       = {Kohei Nozawa and
                  Kento Hasegawa and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Kazuo Hashimoto and
                  Nozomu Togawa},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  pages        = {341--359},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42048-2\_22},
  doi          = {10.1007/978-3-030-42048-2\_22},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/NozawaHHKHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {67--74},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259500670074},
  doi          = {10.5220/0007259500670074},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_4},
  doi          = {10.1007/978-3-030-49443-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK19a,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {User Study of the Effectiveness of a Privacy Policy Summarization
                  Tool},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {186--206},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_9},
  doi          = {10.1007/978-3-030-49443-8\_9},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteHTK19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0001MFKT19,
  author       = {Partha Sarathi Roy and
                  Kirill Morozov and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Security Analysis and Efficient Implementation of Code-based Signature
                  Schemes},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {213--220},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259102130220},
  doi          = {10.5220/0007259102130220},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/BracamonteHTK19,
  author       = {Vanessa Bracamonte and
                  Seira Hidano and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluating Privacy Policy Summarization: An Experimental Study among
                  Japanese Users},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {370--377},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007378403700377},
  doi          = {10.5220/0007378403700377},
  timestamp    = {Wed, 05 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/BracamonteHTK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BasuDNK19,
  author       = {Anirban Basu and
                  Theo Dimitrakos and
                  Yuto Nakano and
                  Shinsaku Kiyomoto},
  editor       = {Weizhi Meng and
                  Piotr Cofta and
                  Christian Damsgaard Jensen and
                  Tyrone Grandison},
  title        = {A Framework for Blockchain-Based Verification of Integrity and Authenticity},
  booktitle    = {Trust Management {XIII} - 13th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {563},
  pages        = {196--208},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33716-2\_15},
  doi          = {10.1007/978-3-030-33716-2\_15},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/BasuDNK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inlg/Nguyen-SonPHK19,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Tran Thao Phuong and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Kees van Deemter and
                  Chenghua Lin and
                  Hiroya Takamura},
  title        = {Detecting Machine-Translated Text using Back Translation},
  booktitle    = {Proceedings of the 12th International Conference on Natural Language
                  Generation, {INLG} 2019, Tokyo, Japan, October 29 - November 1, 2019},
  pages        = {189--197},
  publisher    = {Association for Computational Linguistics},
  year         = {2019},
  url          = {https://aclanthology.org/W19-8626/},
  doi          = {10.18653/V1/W19-8626},
  timestamp    = {Thu, 05 Aug 2021 17:36:17 +0200},
  biburl       = {https://dblp.org/rec/conf/inlg/Nguyen-SonPHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FukushimaYKY19,
  author       = {Kazuhide Fukushima and
                  Ayumu Yoshimura and
                  Shinsaku Kiyomoto and
                  Norikazu Yamasaki},
  editor       = {Swee{-}Huay Heng and
                  Javier L{\'{o}}pez},
  title        = {Evaluation of Software {PUF} Based on Gyroscope},
  booktitle    = {Information Security Practice and Experience - 15th International
                  Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28,
                  2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11879},
  pages        = {232--247},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34339-2\_13},
  doi          = {10.1007/978-3-030-34339-2\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/FukushimaYKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiwis/KiyomotoNWNIK19,
  author       = {Shinsaku Kiyomoto and
                  Yuto Nakano and
                  Atsushi Waseda and
                  Toru Nakamura and
                  Masahito Ishizaka and
                  Yasuaki Kobayashi},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Perin {\"{U}}nal and
                  Markus Aleksy},
  title        = {A Framework for Secure and Trustworthy Data Management in Supply Chain},
  booktitle    = {Mobile Web and Intelligent Information Systems - 16th International
                  Conference, MobiWIS 2019, Istanbul, Turkey, August 26-28, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11673},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27192-3\_12},
  doi          = {10.1007/978-3-030-27192-3\_12},
  timestamp    = {Sun, 25 Oct 2020 22:57:17 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiwis/KiyomotoNWNIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/SasakiHUSHK19,
  author       = {Shoichiro Sasaki and
                  Seira Hidano and
                  Toshihiro Uchibayashi and
                  Takuo Suganuma and
                  Masahiro Hiji and
                  Shinsaku Kiyomoto},
  title        = {On Embedding Backdoor in Malware Detectors Using Machine Learning},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949034},
  doi          = {10.1109/PST47121.2019.8949034},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/SasakiHUSHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Dutta0FKS19,
  author       = {Sabyasachi Dutta and
                  Partha Sarathi Roy and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Kouichi Sakurai},
  editor       = {Ilsun You},
  title        = {Secret Sharing on Evolving Multi-level Access Structure},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_14},
  doi          = {10.1007/978-3-030-39303-8\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Dutta0FKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-10641,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Tran Phuong Thao and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  title        = {Detecting Machine-Translated Paragraphs by Matching Similar Words},
  journal      = {CoRR},
  volume       = {abs/1904.10641},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.10641},
  eprinttype    = {arXiv},
  eprint       = {1904.10641},
  timestamp    = {Thu, 02 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-10641.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-06558,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Tran Phuong Thao and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  title        = {Detecting Machine-Translated Text using Back Translation},
  journal      = {CoRR},
  volume       = {abs/1910.06558},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.06558},
  eprinttype    = {arXiv},
  eprint       = {1910.06558},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-06558.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-08981,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Tran Phuong Thao and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  title        = {Identifying Adversarial Sentences by Analyzing Text Complexity},
  journal      = {CoRR},
  volume       = {abs/1912.08981},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.08981},
  eprinttype    = {arXiv},
  eprint       = {1912.08981},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-08981.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001MFK19,
  author       = {Partha Sarathi Roy and
                  Kirill Morozov and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Evaluation of Code-based Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001MFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HidanoMKKH18,
  author       = {Seira Hidano and
                  Takao Murakami and
                  Shuichi Katsumata and
                  Shinsaku Kiyomoto and
                  Goichiro Hanaoka},
  title        = {Model Inversion Attacks for Online Prediction Systems: Without Knowledge
                  of Non-Sensitive Attributes},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {101-D},
  number       = {11},
  pages        = {2665--2676},
  year         = {2018},
  url          = {https://doi.org/10.1587/transinf.2017ICP0013},
  doi          = {10.1587/TRANSINF.2017ICP0013},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HidanoMKKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RahmanBNTK18,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Toru Nakamura and
                  Haruo Takasaki and
                  Shinsaku Kiyomoto},
  title        = {{PPM:} Privacy Policy Manager for Home Energy Management System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {2},
  pages        = {42--56},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.06.30.042},
  doi          = {10.22667/JOWUA.2018.06.30.042},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RahmanBNTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuanXFKT18,
  author       = {Ye Yuan and
                  Junting Xiao and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Portable Implementation of Postquantum Encryption Schemes and Key
                  Exchange Protocols on JavaScript-Enabled Platforms},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {9846168:1--9846168:14},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/9846168},
  doi          = {10.1155/2018/9846168},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/YuanXFKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/NakanoHKS18,
  author       = {Yuto Nakano and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Kouichi Sakurai},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Marek R. Ogiela and
                  Lidia Ogiela and
                  Nadeem Javaid},
  title        = {Active Attack Against Oblivious {RAM}},
  booktitle    = {32nd {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018},
  pages        = {744--751},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AINA.2018.00112},
  doi          = {10.1109/AINA.2018.00112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/NakanoHKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/RujRBK18,
  author       = {Sushmita Ruj and
                  Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Marek R. Ogiela and
                  Lidia Ogiela and
                  Nadeem Javaid},
  title        = {BlockStore: {A} Secure Decentralized Storage Framework on Blockchain},
  booktitle    = {32nd {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018},
  pages        = {1096--1103},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AINA.2018.00157},
  doi          = {10.1109/AINA.2018.00157},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/RujRBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/TesfayHNKS18,
  author       = {Welderufael B. Tesfay and
                  Peter Hofmann and
                  Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Jetzabel M. Serna},
  editor       = {Rakesh M. Verma and
                  Murat Kantarcioglu},
  title        = {PrivacyGuide: Towards an Implementation of the {EU} {GDPR} on Internet
                  Privacy Policy Evaluation},
  booktitle    = {Proceedings of the Fourth {ACM} International Workshop on Security
                  and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {15--21},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180445.3180447},
  doi          = {10.1145/3180445.3180447},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/TesfayHNKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsp/FukushimaNIK18,
  author       = {Keishiro Fukushima and
                  Toru Nakamura and
                  Daisuke Ikeda and
                  Shinsaku Kiyomoto},
  title        = {Challenges in Classifying Privacy Policies by Machine Learning with
                  Word-based Features},
  booktitle    = {Proceedings of the 2nd International Conference on Cryptography, Security
                  and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018},
  pages        = {62--66},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3199478.3199486},
  doi          = {10.1145/3199478.3199486},
  timestamp    = {Sun, 14 Apr 2019 17:40:32 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsp/FukushimaNIK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OkadaTFKT18,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Kwangsu Lee},
  title        = {On the Complexity of the LWR-Solving {BKW} Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_13},
  doi          = {10.1007/978-3-030-12146-4\_13},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/OkadaTFKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/HidanoNK18,
  author       = {Seira Hidano and
                  Yuto Nakano and
                  Shinsaku Kiyomoto},
  editor       = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Gary B. Wills and
                  Robert John Walters and
                  Farshad Firouzi and
                  Victor Chang},
  title        = {An Evaluation Framework for Fastest Oblivious {RAM}},
  booktitle    = {Proceedings of the 3rd International Conference on Internet of Things,
                  Big Data and Security, IoTBDS 2018, Funchal, Madeira, Portugal, March
                  19-21, 2018},
  pages        = {114--122},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006690701140122},
  doi          = {10.5220/0006690701140122},
  timestamp    = {Tue, 29 Sep 2020 09:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/HidanoNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/0001DMAFKS18,
  author       = {Partha Sarathi Roy and
                  Sabyasachi Dutta and
                  Kirill Morozov and
                  Avishek Adhikari and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Kouichi Sakurai},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary:
                  Cheater Identification and Robustness},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {578--594},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_37},
  doi          = {10.1007/978-3-319-99807-7\_37},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/0001DMAFKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MimotoKHBM18,
  author       = {Tomoaki Mimoto and
                  Shinsaku Kiyomoto and
                  Seira Hidano and
                  Anirban Basu and
                  Atsuko Miyaji},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {The Possibility of Matrix Decomposition as Anonymization and Evaluation
                  for Time-sequence Data},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514189},
  doi          = {10.1109/PST.2018.8514189},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/MimotoKHBM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/OkadaCHK18,
  author       = {Hiroki Okada and
                  Carlos Cid and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Linear Depth Integer-Wise Homomorphic Division},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {91--106},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_8},
  doi          = {10.1007/978-3-030-20074-9\_8},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/OkadaCHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/TesfayHNKS18,
  author       = {Welderufael B. Tesfay and
                  Peter Hofmann and
                  Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Jetzabel M. Serna},
  editor       = {Pierre{-}Antoine Champin and
                  Fabien Gandon and
                  Mounia Lalmas and
                  Panagiotis G. Ipeirotis},
  title        = {I Read but Don't Agree: Privacy Policy Benchmarking using Machine
                  Learning and the {EU} {GDPR}},
  booktitle    = {Companion of the The Web Conference 2018 on The Web Conference 2018,
                  {WWW} 2018, Lyon , France, April 23-27, 2018},
  pages        = {163--166},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3184558.3186969},
  doi          = {10.1145/3184558.3186969},
  timestamp    = {Fri, 16 Apr 2021 10:04:12 +0200},
  biburl       = {https://dblp.org/rec/conf/www/TesfayHNKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuanFXKT18,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Junting Xiao and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-Constrained Implementation of Lattice-based Encryption Scheme
                  on the Standard Java Card Platform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1238},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuanFXKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/RahmanBKB17,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto and
                  Md. Zakirul Alam Bhuiyan},
  title        = {Privacy-friendly secure bidding for smart grid demand-response},
  journal      = {Inf. Sci.},
  volume       = {379},
  pages        = {229--240},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.10.034},
  doi          = {10.1016/J.INS.2016.10.034},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/RahmanBKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/RahmanBK17,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  title        = {Decentralized Ciphertext-Policy Attribute-Based Encryption: {A} Post-Quantum
                  Construction},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {1--16},
  year         = {2017},
  url          = {https://doi.org/10.22667/JISIS.2017.08.31.001},
  doi          = {10.22667/JISIS.2017.08.31.001},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/RahmanBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuYFTSKH17,
  author       = {Rui Xu and
                  Sze Ling Yeo and
                  Kazuhide Fukushima and
                  Tsuyoshi Takagi and
                  Hwajung Seo and
                  Shinsaku Kiyomoto and
                  Matt Henricksen},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {An Experimental Study of the {BDD} Approach for the Search {LWE} Problem},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_13},
  doi          = {10.1007/978-3-319-61204-1\_13},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuYFTSKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NakamuraTKS17,
  author       = {Toru Nakamura and
                  Welderufael B. Tesfay and
                  Shinsaku Kiyomoto and
                  Jetzabel M. Serna},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Hannes Hartenstein and
                  Jordi Herrera{-}Joancomart{\'{\i}}},
  title        = {Default Privacy Setting Prediction by Grouping User's Attributes and
                  Settings Preferences},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017,
                  Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10436},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67816-0\_7},
  doi          = {10.1007/978-3-319-67816-0\_7},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/NakamuraTKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KawaiUHAFK17,
  author       = {Wataru Kawai and
                  Rei Ueno and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017},
  pages        = {113--121},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSPW.2017.60},
  doi          = {10.1109/EUROSPW.2017.60},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KawaiUHAFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/MakanjuZK17,
  author       = {Adetokunbo Makanju and
                  Nur Zincir{-}Heywood and
                  Shinsaku Kiyomoto},
  editor       = {Peter A. N. Bosman},
  title        = {On evolutionary computation for moving target defense in software
                  defined networks},
  booktitle    = {Genetic and Evolutionary Computation Conference, Berlin, Germany,
                  July 15-19, 2017, Companion Material Proceedings},
  pages        = {287--288},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3067695.3075604},
  doi          = {10.1145/3067695.3075604},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/MakanjuZK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/YuanFKT17,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-constrained implementation of lattice-based encryption scheme
                  on standard Java Card},
  booktitle    = {2017 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017},
  pages        = {47--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HST.2017.7951796},
  doi          = {10.1109/HST.2017.7951796},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/YuanFKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/UchibayashiHHKA17,
  author       = {Toshihiro Uchibayashi and
                  Yuichi Hashi and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Bernady O. Apduhan and
                  Toru Abe and
                  Takuo Suganuma and
                  Masahiro Hiji},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Sanjay Misra and
                  Giuseppe Borruso and
                  Carmelo Maria Torre and
                  Ana Maria A. C. Rocha and
                  David Taniar and
                  Bernady O. Apduhan and
                  Elena N. Stankova and
                  Alfredo Cuzzocrea},
  title        = {A Control Mechanism for Live Migration with Data Regulations Preservation},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2017 - 17th International
                  Conference, Trieste, Italy, July 3-6, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10404},
  pages        = {509--522},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-62392-4\_37},
  doi          = {10.1007/978-3-319-62392-4\_37},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/UchibayashiHHKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BasuXCK17,
  author       = {Anirban Basu and
                  Rui Xu and
                  Juan Camilo Corena and
                  Shinsaku Kiyomoto},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Hypercubes and Private Information Retrieval},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {509--515},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_44},
  doi          = {10.1007/978-3-319-89500-0\_44},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BasuXCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FukushimaHK17,
  author       = {Kazuhide Fukushima and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {White-box Implementation of Stream Cipher},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {263--269},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006115202630269},
  doi          = {10.5220/0006115202630269},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FukushimaHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KiyomotoBRR17,
  author       = {Shinsaku Kiyomoto and
                  Anirban Basu and
                  Mohammad Shahriar Rahman and
                  Sushmita Ruj},
  title        = {On blockchain-based authorization architecture for beyond-5G mobile
                  services},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {136--141},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356363},
  doi          = {10.23919/ICITST.2017.8356363},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KiyomotoBRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BasuRXFK17,
  author       = {Anirban Basu and
                  Mohammad Shahriar Rahman and
                  Rui Xu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Jan{-}Philipp Stegh{\"{o}}fer and
                  Babak Esfandiari},
  title        = {VIGraph - {A} Framework for Verifiable Information},
  booktitle    = {Trust Management {XI} - 11th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {505},
  pages        = {12--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59171-1\_2},
  doi          = {10.1007/978-3-319-59171-1\_2},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/BasuRXFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMBRK17,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Anirban Basu and
                  Mohammad Shahriar Rahman and
                  Shinsaku Kiyomoto},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Security Analysis of a Verifiable Server-Aided Approximate Similarity
                  Computation},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_10},
  doi          = {10.1007/978-3-319-64200-0\_10},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMBRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/UchibayashiHHKS17,
  author       = {Toshihiro Uchibayashi and
                  Yuichi Hashi and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Takuo Suganuma and
                  Masahiro Hiji},
  editor       = {Leonard Barolli and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {Verification of Data Collection Methods for Live Migration Protection
                  Mechanism},
  booktitle    = {Advances in Network-Based Information Systems, The 20th International
                  Conference on Network-Based Information Systems, NBiS 2017, Ryerson
                  University, Toronto, ON, Canada, August 24-26, 2017},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {7},
  pages        = {420--430},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65521-5\_36},
  doi          = {10.1007/978-3-319-65521-5\_36},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/UchibayashiHHKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/ThaoMRKK17,
  author       = {Tran Phuong Thao and
                  Atsuko Miyaji and
                  Mohammad Shahriar Rahman and
                  Shinsaku Kiyomoto and
                  Ayumu Kubota},
  editor       = {Dong Seong Kim and
                  Masato Kitakami and
                  Vijay Varadharajan},
  title        = {Robust {ORAM:} Enhancing Availability, Confidentiality and Integrity},
  booktitle    = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017},
  pages        = {30--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PRDC.2017.14},
  doi          = {10.1109/PRDC.2017.14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prdc/ThaoMRKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prdc/RahmanBK17,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  editor       = {Dong Seong Kim and
                  Masato Kitakami and
                  Vijay Varadharajan},
  title        = {Towards Outsourced Privacy-Preserving Multiparty {DBSCAN}},
  booktitle    = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing,
                  {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017},
  pages        = {225--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PRDC.2017.42},
  doi          = {10.1109/PRDC.2017.42},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/prdc/RahmanBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HidanoMKKH17,
  author       = {Seira Hidano and
                  Takao Murakami and
                  Shuichi Katsumata and
                  Shinsaku Kiyomoto and
                  Goichiro Hanaoka},
  title        = {Model Inversion Attacks for Prediction Systems: Without Knowledge
                  of Non-Sensitive Attributes},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {115--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00023},
  doi          = {10.1109/PST.2017.00023},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/HidanoMKKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AttrapadungHKMS17,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Shinsaku Kiyomoto and
                  Tomoaki Mimoto and
                  Jacob C. N. Schuldt},
  title        = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient
                  Constructions},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00033},
  doi          = {10.1109/PST.2017.00033},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AttrapadungHKMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/KiyomotoRB17,
  author       = {Shinsaku Kiyomoto and
                  Mohammad Shahriar Rahman and
                  Anirban Basu},
  editor       = {Liz Bacon and
                  Jixin Ma and
                  Lachlan M. MacKinnon},
  title        = {On blockchain-based anonymized dataset distribution platform},
  booktitle    = {15th {IEEE} International Conference on Software Engineering Research,
                  Management and Applications, {SERA} 2017, London, United Kingdom,
                  June 7-9, 2017},
  pages        = {85--92},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SERA.2017.7965711},
  doi          = {10.1109/SERA.2017.7965711},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/KiyomotoRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/OmarRBK17,
  author       = {Abdullah Al Omar and
                  Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  editor       = {Guojun Wang and
                  Mohammed Atiquzzaman and
                  Zheng Yan and
                  Kim{-}Kwang Raymond Choo},
  title        = {MediBchain: {A} Blockchain Based Privacy Preserving Platform for Healthcare
                  Data},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December
                  12-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10658},
  pages        = {534--543},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72395-2\_49},
  doi          = {10.1007/978-3-319-72395-2\_49},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/OmarRBK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MimotoKTM17,
  author       = {Tomoaki Mimoto and
                  Shinsaku Kiyomoto and
                  Katsuya Tanaka and
                  Atsuko Miyaji},
  title        = {(p, N)-identifiability: Anonymity under Practical Adversaries},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {996--1003},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.343},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.343},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MimotoKTM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaXKH17,
  author       = {Kazuhide Fukushima and
                  Rui Xu and
                  Shinsaku Kiyomoto and
                  Naofumi Homma},
  title        = {Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1032--1037},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.348},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.348},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaXKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/MakanjuK17,
  author       = {Adetokunbo Makanju and
                  Shinsaku Kiyomoto},
  title        = {Diversification of Autonomous Vehicle Driving Behavior},
  booktitle    = {86th {IEEE} Vehicular Technology Conference, {VTC} Fall 2017, Toronto,
                  ON, Canada, September 24-27, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/VTCFall.2017.8288316},
  doi          = {10.1109/VTCFALL.2017.8288316},
  timestamp    = {Mon, 20 Dec 2021 11:29:16 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/MakanjuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/YuanCKMT16,
  author       = {Ye Yuan and
                  Chen{-}Mou Cheng and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  title        = {Portable Implementation of Lattice-based Cryptography using JavaScript},
  journal      = {Int. J. Netw. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {309--327},
  year         = {2016},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/130},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnc/YuanCKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/RahmanK16,
  author       = {Mohammad Shahriar Rahman and
                  Shinsaku Kiyomoto},
  editor       = {Zhipeng Cai and
                  Rafal A. Angryk and
                  Wen{-}Zhan Song and
                  Yingshu Li and
                  Xiaojun Cao and
                  Anu G. Bourgeois and
                  Guangchun Luo and
                  Liang Cheng and
                  Bhaskar Krishnamachari},
  title        = {Secure Bike Sharing System for Multi-Modal Journey},
  booktitle    = {2016 {IEEE} International Conferences on Big Data and Cloud Computing
                  (BDCloud), Social Computing and Networking (SocialCom), Sustainable
                  Computing and Communications (SustainCom), BDCloud-SocialCom-SustainCom
                  2016, Atlanta, GA, USA, October 8-10, 2016},
  pages        = {437--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BDCloud-SocialCom-SustainCom.2016.71},
  doi          = {10.1109/BDCLOUD-SOCIALCOM-SUSTAINCOM.2016.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bdcloud/RahmanK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/HashiUHKBSH16,
  author       = {Yuichi Hashi and
                  Toshihiro Uchibayashi and
                  Seira Hidano and
                  Shinsaku Kiyomoto and
                  Abdur Rahim Biswas and
                  Takuo Suganuma and
                  Masahiro Hiji},
  title        = {Data Protection for Cross-Border Live Migration in Multi-cloud Environment},
  booktitle    = {Fourth International Symposium on Computing and Networking, {CANDAR}
                  2016, Hiroshima, Japan, November 22-25, 2016},
  pages        = {681--685},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CANDAR.2016.0122},
  doi          = {10.1109/CANDAR.2016.0122},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic-nc/HashiUHKBSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NakamuraKTS16a,
  author       = {Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Welderufael B. Tesfay and
                  Jetzabel M. Serna},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Easing the Burden of Setting Privacy Preferences: {A} Machine Learning
                  Approach},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_4},
  doi          = {10.1007/978-3-319-54433-5\_4},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NakamuraKTS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NakamuraKTS16,
  author       = {Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Welderufael B. Tesfay and
                  Jetzabel M. Serna},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Personalised Privacy by Default Preferences - Experiment and Analysis},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {53--62},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005681100530062},
  doi          = {10.5220/0005681100530062},
  timestamp    = {Mon, 30 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/NakamuraKTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/Basu0RK16,
  author       = {Anirban Basu and
                  Stephen Marsh and
                  Mohammad Shahriar Rahman and
                  Shinsaku Kiyomoto},
  editor       = {Sheikh Mahbub Habib and
                  Julita Vassileva and
                  Sjouke Mauw and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {A Model for Personalised Perception of Policies},
  booktitle    = {Trust Management {X} - 10th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {473},
  pages        = {52--62},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41354-9\_4},
  doi          = {10.1007/978-3-319-41354-9\_4},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/Basu0RK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/HidanoKBUS16,
  author       = {Seira Hidano and
                  Shinsaku Kiyomoto and
                  Abdur Rahim Biswas and
                  Toshihiro Uchibayashi and
                  Takuo Suganuma},
  editor       = {Ilsun You and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen and
                  Igor V. Kotenko},
  title        = {Access Control for Cross-Border Transfer of Sensor Data},
  booktitle    = {Mobile Internet Security - First International Symposium, MobiSec
                  2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {797},
  pages        = {143--153},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-981-10-7850-7\_13},
  doi          = {10.1007/978-981-10-7850-7\_13},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec2/HidanoKBUS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BasuXRK16,
  author       = {Anirban Basu and
                  Rui Xu and
                  Mohammad Shahriar Rahman and
                  Shinsaku Kiyomoto},
  title        = {User-in-a-context: {A} blueprint for context-aware identification},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {329--334},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906982},
  doi          = {10.1109/PST.2016.7906982},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/BasuXRK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TschersichKPNBT16,
  author       = {Markus Tschersich and
                  Shinsaku Kiyomoto and
                  Sebastian Pape and
                  Toru Nakamura and
                  G{\"{o}}khan Bal and
                  Haruo Takasaki and
                  Kai Rannenberg},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {On Gender Specific Perception of Data Sharing in Japan},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {150--160},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_11},
  doi          = {10.1007/978-3-319-33630-5\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/TschersichKPNBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaHK16,
  author       = {Kazuhide Fukushima and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Sensor-based Wearable {PUF}},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {207--214},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005946702070214},
  doi          = {10.5220/0005946702070214},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MimotoBK16,
  author       = {Tomoaki Mimoto and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Towards Practical k-Anonymization: Correlation-based Construction
                  of Generalization Hierarchy},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {411--418},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005963804110418},
  doi          = {10.5220/0005963804110418},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MimotoBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BasuKV016,
  author       = {Anirban Basu and
                  Shinsaku Kiyomoto and
                  Jaideep Vaidya and
                  Stephen Marsh},
  title        = {PrefRank: Quantification and Aggregation of Subjective User Preferences},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {7--13},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0039},
  doi          = {10.1109/TRUSTCOM.2016.0039},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BasuKV016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16,
  author       = {Kazuhide Fukushima and
                  Youssef Souissi and
                  Seira Hidano and
                  Robert Nguyen and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Laurent Sauvage},
  title        = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes:
                  The Final Piece of All-in-One Assessment Methodology},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {201--207},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0064},
  doi          = {10.1109/TRUSTCOM.2016.0064},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanBK16,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  title        = {Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning
                  with Errors over Rings},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1759--1764},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0270},
  doi          = {10.1109/TRUSTCOM.2016.0270},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanEK16,
  author       = {Mohammad Shahriar Rahman and
                  Keita Emura and
                  Shinsaku Kiyomoto},
  title        = {On the Leakage Resilient Cryptography in Game-Theoretic Settings},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1984--1989},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0303},
  doi          = {10.1109/TRUSTCOM.2016.0303},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanEK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoNTH15,
  author       = {Shinsaku Kiyomoto and
                  Toru Nakamura and
                  Haruo Takasaki and
                  Tatsuhiko Hirabayashi},
  title        = {Personal Agent for Services in {ITS}},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {493--500},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.16},
  doi          = {10.1109/ARES.2015.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BasuCVCKSM15,
  author       = {Anirban Basu and
                  Juan Camilo Corena and
                  Jaideep Vaidya and
                  Jon Crowcroft and
                  Shinsaku Kiyomoto and
                  Yung Shin Van Der Sype and
                  Yutaka Miyake},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Practical Private One-way Anonymous Message Routing},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {665},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714641},
  doi          = {10.1145/2714576.2714641},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BasuCVCKSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcomp/HidanoKMVM15,
  author       = {Seira Hidano and
                  Shinsaku Kiyomoto and
                  Yosuke Murakami and
                  Panagiotis Vlacheas and
                  Klaus Moessner},
  editor       = {Yin Zhang and
                  Limei Peng and
                  Chan{-}Hyun Youn},
  title        = {Design of a Security Gateway for iKaaS Platform},
  booktitle    = {Cloud Computing - 6th International Conference, CloudComp 2015, Daejeon,
                  South Korea, October 28-29, 2015, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {167},
  pages        = {323--333},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38904-2\_34},
  doi          = {10.1007/978-3-319-38904-2\_34},
  timestamp    = {Sat, 05 Sep 2020 17:58:59 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcomp/HidanoKMVM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/YuanCKMT15,
  author       = {Ye Yuan and
                  Chen{-}Mou Cheng and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  title        = {Portable Implementation of Lattice-Based Cryptography Using JavaScript},
  booktitle    = {Third International Symposium on Computing and Networking, {CANDAR}
                  2015, Sapporo, Hokkaido, Japan, December 8-11, 2015},
  pages        = {58--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CANDAR.2015.36},
  doi          = {10.1109/CANDAR.2015.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/YuanCKMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BasuCVCKMSN15,
  author       = {Anirban Basu and
                  Juan Camilo Corena and
                  Jaideep Vaidya and
                  Jon Crowcroft and
                  Shinsaku Kiyomoto and
                  Stephen Marsh and
                  Yung Shin Van Der Sype and
                  Toru Nakamura},
  editor       = {Christian Damsgaard Jensen and
                  Stephen Marsh and
                  Theo Dimitrakos and
                  Yuko Murayama},
  title        = {Lightweight Practical Private One-Way Anonymous Messaging},
  booktitle    = {Trust Management {IX} - 9th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {454},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18491-3\_6},
  doi          = {10.1007/978-3-319-18491-3\_6},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/BasuCVCKMSN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/RahmanBK15,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  title        = {Privacy-friendly secure bidding scheme for demand response in smart
                  grid},
  booktitle    = {{IEEE} First International Smart Cities Conference, {ISC2} 2015, Guadalajara,
                  Mexico, October 25-28, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISC2.2015.7366208},
  doi          = {10.1109/ISC2.2015.7366208},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/RahmanBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isica/HidanoPK15,
  author       = {Seira Hidano and
                  Martin Pecovsk{\'{y}} and
                  Shinsaku Kiyomoto},
  editor       = {Kangshun Li and
                  Jin Li and
                  Yong Liu and
                  Aniello Castiglione},
  title        = {New Security Challenges in the 5G Network},
  booktitle    = {Computational Intelligence and Intelligent Systems - 7th International
                  Symposium, {ISICA} 2015, Guangzhou, China, November 21-22, 2015, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {575},
  pages        = {619--630},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-981-10-0356-1\_64},
  doi          = {10.1007/978-981-10-0356-1\_64},
  timestamp    = {Thu, 20 Apr 2023 17:39:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isica/HidanoPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BasuNHK15,
  author       = {Anirban Basu and
                  Toru Nakamura and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  title        = {k-anonymity: Risks and the Reality},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {983--989},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.473},
  doi          = {10.1109/TRUSTCOM.2015.473},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BasuNHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KiyomotoNM15,
  author       = {Shinsaku Kiyomoto and
                  Toru Nakamura and
                  Yutaka Miyake},
  title        = {Towards Tracing of k-Anonymized Datasets},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1237--1242},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.511},
  doi          = {10.1109/TRUSTCOM.2015.511},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/KiyomotoNM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wf-iot/NeisseBSMKB15,
  author       = {Ricardo Neisse and
                  Gianmarco Baldini and
                  Gary Steri and
                  Yutaka Miyake and
                  Shinsaku Kiyomoto and
                  Abdur Rahim Biswas},
  title        = {An agent-based framework for Informed Consent in the internet of things},
  booktitle    = {2nd {IEEE} World Forum on Internet of Things, WF-IoT 2015, Milan,
                  Italy, December 14-16, 2015},
  pages        = {789--794},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/WF-IoT.2015.7389154},
  doi          = {10.1109/WF-IOT.2015.7389154},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wf-iot/NeisseBSMKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HidanoK15,
  author       = {Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {On Partitioning Secret Data Based on Concept of Functional Safety},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {110--121},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_10},
  doi          = {10.1007/978-3-319-31875-2\_10},
  timestamp    = {Thu, 02 Mar 2023 10:53:05 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HidanoK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoFKIMTS14,
  author       = {Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsukasa Ishiguro and
                  Yutaka Miyake and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Fast Implementation of KCipher-2 for Software and Hardware},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {1},
  pages        = {43--52},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.E97.D.43},
  doi          = {10.1587/TRANSINF.E97.D.43},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakanoFKIMTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HibikiHNFKMA14,
  author       = {Takafumi Hibiki and
                  Naofumi Homma and
                  Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Takafumi Aoki},
  title        = {Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based
                  Countermeasure},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {157--166},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.157},
  doi          = {10.1587/TRANSFUN.E97.A.157},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/HibikiHNFKMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoKMS14,
  author       = {Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Kouichi Sakurai},
  title        = {Comparison of Access Pattern Protection Schemes and Proposals for
                  Efficient Implementation},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {10},
  pages        = {2576--2585},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.2013THP0007},
  doi          = {10.1587/TRANSINF.2013THP0007},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakanoKMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/KiyomotoFM14,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  title        = {Security issues on {IT} systems during disasters: a survey},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {173--185},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12652-013-0177-8},
  doi          = {10.1007/S12652-013-0177-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/KiyomotoFM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoM14,
  author       = {Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {PrivacyFrost2: {A} Efficient Data Anonymization Tool Based on Scoring
                  Functions},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {211--225},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_16},
  doi          = {10.1007/978-3-319-10975-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/CorenaBKMO14,
  author       = {Juan Camilo Corena and
                  Anirban Basu and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tomoaki Ohtsuki},
  title        = {{XOR} network coding pollution prevention without homomorphic functions},
  booktitle    = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2014, Las Vegas, NV, USA, January 10-13, 2014},
  pages        = {293--300},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CCNC.2014.6866586},
  doi          = {10.1109/CCNC.2014.6866586},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/CorenaBKMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/BasuCMPGKVM14,
  author       = {Anirban Basu and
                  Juan Camilo Corena and
                  Anna Monreale and
                  Dino Pedreschi and
                  Fosca Giannotti and
                  Shinsaku Kiyomoto and
                  Jaideep Vaidya and
                  Yutaka Miyake},
  title        = {CF-inspired Privacy-Preserving Prediction of Next Location in the
                  Cloud},
  booktitle    = {{IEEE} 6th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2014, Singapore, December 15-18, 2014},
  pages        = {731--734},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CloudCom.2014.114},
  doi          = {10.1109/CLOUDCOM.2014.114},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/BasuCMPGKVM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/CorenaBNKM14,
  author       = {Juan Camilo Corena and
                  Anirban Basu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {Data Storage on the Cloud under User Control},
  booktitle    = {{IEEE} 6th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2014, Singapore, December 15-18, 2014},
  pages        = {739--742},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CloudCom.2014.113},
  doi          = {10.1109/CLOUDCOM.2014.113},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/CorenaBNKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/NakanoBKM14,
  author       = {Yuto Nakano and
                  Anirban Basu and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Javier L{\'{o}}pez and
                  Indrajit Ray and
                  Bruno Crispo},
  title        = {Key Extraction Attack Using Statistical Analysis of Memory Dump Data},
  booktitle    = {Risks and Security of Internet and Systems - 9th International Conference,
                  CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8924},
  pages        = {239--246},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17127-2\_17},
  doi          = {10.1007/978-3-319-17127-2\_17},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/NakanoBKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/CorenaBKMO14,
  author       = {Juan Camilo Corena and
                  Anirban Basu and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tomoaki Ohtsuki},
  title        = {Beyond proofs of data possession: Finding defective blocks in outsourced
                  storage},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin,
                  TX, USA, December 8-12, 2014},
  pages        = {2381--2386},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7037164},
  doi          = {10.1109/GLOCOM.2014.7037164},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/CorenaBKMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BasuMCGPKMYT14,
  author       = {Anirban Basu and
                  Anna Monreale and
                  Juan Camilo Corena and
                  Fosca Giannotti and
                  Dino Pedreschi and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tadashi Yanagihara and
                  Roberto Trasarti},
  editor       = {Jianying Zhou and
                  Nurit Gal{-}Oz and
                  Jie Zhang and
                  Ehud Gudes},
  title        = {A Privacy Risk Model for Trajectory Data},
  booktitle    = {Trust Management {VIII} - 8th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2014, Singapore, July 7-10, 2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {430},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43813-8\_9},
  doi          = {10.1007/978-3-662-43813-8\_9},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/BasuMCGPKMYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/KiyomotoM14,
  author       = {Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {How to Find an Appropriate {K} for K-Anonymization},
  booktitle    = {Eighth International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United
                  Kingdom, 2-4 July, 2014},
  pages        = {273--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IMIS.2014.34},
  doi          = {10.1109/IMIS.2014.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/KiyomotoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshiguroKMT14,
  author       = {Tsukasa Ishiguro and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  editor       = {Hugo Krawczyk},
  title        = {Parallel Gauss Sieve Algorithm: Solving the {SVP} Challenge over a
                  128-Dimensional Ideal Lattice},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {411--428},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_24},
  doi          = {10.1007/978-3-642-54631-0\_24},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IshiguroKMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BasuCKVMM14,
  author       = {Anirban Basu and
                  Juan Camilo Corena and
                  Shinsaku Kiyomoto and
                  Jaideep Vaidya and
                  Stephen Marsh and
                  Yutaka Miyake},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {PrefRank: fair aggregation of subjective user preferences},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {287--288},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2555084},
  doi          = {10.1145/2554850.2555084},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BasuCKVMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BasuCKMVG0M14,
  author       = {Anirban Basu and
                  Juan Camilo Corena and
                  Shinsaku Kiyomoto and
                  Stephen Marsh and
                  Jaideep Vaidya and
                  Guibing Guo and
                  Jie Zhang and
                  Yutaka Miyake},
  editor       = {Yookun Cho and
                  Sung Y. Shin and
                  Sang{-}Wook Kim and
                  Chih{-}Cheng Hung and
                  Jiman Hong},
  title        = {Privacy preserving trusted social feedback},
  booktitle    = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
                  Korea - March 24 - 28, 2014},
  pages        = {1706--1711},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2554850.2554860},
  doi          = {10.1145/2554850.2554860},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BasuCKMVG0M14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CorenaBNKM14,
  author       = {Juan Camilo Corena and
                  Anirban Basu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Multiple-server Efficient Reusable Proof of Data Possesion from
                  Private Information Retrieval Techniques},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {307--314},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005049803070314},
  doi          = {10.5220/0005049803070314},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CorenaBNKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14,
  author       = {Yuto Nakano and
                  Youssef Souissi and
                  Robert Nguyen and
                  Laurent Sauvage and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_6},
  doi          = {10.1007/978-3-662-43826-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoNTWM13,
  author       = {Shinsaku Kiyomoto and
                  Toru Nakamura and
                  Haruo Takasaki and
                  Ryu Watanabe and
                  Yutaka Miyake},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {{PPM:} Privacy Policy Manager for Personalized Services},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {377--392},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_26},
  doi          = {10.1007/978-3-642-40588-4\_26},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HibikiHNFKMA13,
  author       = {Takafumi Hibiki and
                  Naofumi Homma and
                  Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Takafumi Aoki},
  editor       = {Emmanuel Prouff},
  title        = {Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_11},
  doi          = {10.1007/978-3-642-40026-1\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/HibikiHNFKMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JiaAFBSFKM13,
  author       = {Limin Jia and
                  Jassim Aljuraidan and
                  Elli Fragkaki and
                  Lujo Bauer and
                  Michael Stroucken and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Run-Time Enforcement of Information-Flow Properties on Android - (Extended
                  Abstract)},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {775--792},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_43},
  doi          = {10.1007/978-3-642-40203-6\_43},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JiaAFBSFKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IshiguroKM13,
  author       = {Tsukasa Ishiguro and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Pierangela Samarati},
  title        = {A Key-revocable Attribute-based Encryption for Mobile Cloud Environments},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {51--61},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223155/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IshiguroKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13,
  author       = {Shinsaku Kiyomoto and
                  Andre Rein and
                  Yuto Nakano and
                  Carsten Rudolph and
                  Yutaka Miyake},
  editor       = {Pierangela Samarati},
  title        = {{LMM} - {A} Common Component for Software License Management on Cloud},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {284--295},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223177/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoRNRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HenricksenK13,
  author       = {Matt Henricksen and
                  Shinsaku Kiyomoto},
  editor       = {Pierangela Samarati},
  title        = {{AVON} - {A} Fast Hash Function for Intel {SIMD} Architectures},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {482--487},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223203/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HenricksenK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NakamuraKWM13,
  author       = {Toru Nakamura and
                  Shinsaku Kiyomoto and
                  Ryu Watanabe and
                  Yutaka Miyake},
  title        = {{P3MCF:} Practical Privacy-Preserving Multi-domain Collaborative Filtering},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {354--361},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.271},
  doi          = {10.1109/TRUSTCOM.2013.271},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NakamuraKWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshiguroKMT13,
  author       = {Tsukasa Ishiguro and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  title        = {Parallel Gauss Sieve Algorithm: Solving the {SVP} in the Ideal Lattice
                  of 128 dimensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshiguroKMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc7008,
  author       = {Shinsaku Kiyomoto and
                  Wook Shin},
  title        = {A Description of the KCipher-2 Encryption Algorithm},
  journal      = {{RFC}},
  volume       = {7008},
  pages        = {1--37},
  year         = {2013},
  url          = {https://doi.org/10.17487/RFC7008},
  doi          = {10.17487/RFC7008},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc7008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FukushimaKM12,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {Software Protection Combined with Tamper-Proof Device},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {213--222},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.213},
  doi          = {10.1587/TRANSFUN.E95.A.213},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/FukushimaKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiyomotoFM12,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  title        = {Design of Categorization Mechanism for Disaster-Information-Gathering
                  System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {21--34},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.021},
  doi          = {10.22667/JOWUA.2012.12.31.021},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KiyomotoFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoFM12,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  editor       = {Gerald Quirchmayr and
                  Josef Basl and
                  Ilsun You and
                  Lida Xu and
                  Edgar R. Weippl},
  title        = {Security-and-Privacy-Related Issues on {IT} Systems During Disasters},
  booktitle    = {Multidisciplinary Research and Practice for Information Systems -
                  {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and
                  Workshop on Availability, Reliability, and Security, {CD-ARES} 2012,
                  Prague, Czech Republic, August 20-24, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7465},
  pages        = {445--459},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32498-7\_33},
  doi          = {10.1007/978-3-642-32498-7\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/NakanoCKM12,
  author       = {Yuto Nakano and
                  Carlos Cid and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Stefan Mangard},
  title        = {Memory Access Pattern Protection for Resource-Constrained Devices},
  booktitle    = {Smart Card Research and Advanced Applications - 11th International
                  Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7771},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37288-9\_13},
  doi          = {10.1007/978-3-642-37288-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/NakanoCKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KiyomotoMT12,
  author       = {Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Toshiaki Tanaka},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering
                  System for Disasters},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {1755--1762},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.214},
  doi          = {10.1109/TRUSTCOM.2012.214},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KiyomotoMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KiyomotoFM12,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Privacy Preservation of User History Graph},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {87--96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_9},
  doi          = {10.1007/978-3-642-30955-7\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KiyomotoFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/FukushimaKM11,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {Towards Secure Cloud Computing Architecture - {A} Solution Based on
                  Software Protection Mechanism},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {4--17},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.05.31.004},
  doi          = {10.22667/JISIS.2011.05.31.004},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/FukushimaKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiyomotoM11,
  author       = {Shinsaku Kiyomoto and
                  Keith M. Martin},
  title        = {Model for a Common Notion of Privacy Leakage on Public Database},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {50--62},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.050},
  doi          = {10.22667/JOWUA.2011.03.31.050},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KiyomotoM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ShinFKM11,
  author       = {Wook Shin and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {{AMY:} Use your cell phone to create a protected personal network
                  over devices},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {57},
  number       = {1},
  pages        = {99--104},
  year         = {2011},
  url          = {https://doi.org/10.1109/TCE.2011.5735487},
  doi          = {10.1109/TCE.2011.5735487},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/ShinFKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoMT11,
  author       = {Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Toshiaki Tanaka},
  title        = {Privacy Frost: {A} User-Oriented Data Anonymization Tool},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {442--447},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.68},
  doi          = {10.1109/ARES.2011.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NakanoCFK11,
  author       = {Yuto Nakano and
                  Carlos Cid and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Analysis of Message Injection in Stream Cipher-Based Hash Functions},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {498--513},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_29},
  doi          = {10.1007/978-3-642-21554-4\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NakanoCFK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KiyomotoFM11,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Wai{-}Chi Fang and
                  L. Javier Garc{\'{\i}}a{-}Villalba and
                  Kirk P. Arnett and
                  Muhammad Khurram Khan},
  title        = {Data Anonymity in Multi-Party Service Model},
  booktitle    = {Security Technology - International Conference, SecTech 2011, Held
                  as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December
                  8-10, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {259},
  pages        = {21--30},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27189-2\_3},
  doi          = {10.1007/978-3-642-27189-2\_3},
  timestamp    = {Sat, 30 Sep 2023 09:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KiyomotoFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/FukushimaKMS11,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Kouichi Sakurai},
  editor       = {Mohammad S. Obaidat and
                  Jos{\'{e}} Luis Sevillano and
                  Joaquim Filipe},
  title        = {Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast
                  Encryption Scheme},
  booktitle    = {E-Business and Telecommunications - International Joint Conference,
                  {ICETE} 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {314},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35755-8\_17},
  doi          = {10.1007/978-3-642-35755-8\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/FukushimaKMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/IshiguroKM11,
  author       = {Tsukasa Ishiguro and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Sihan Qing and
                  Willy Susilo and
                  Guilin Wang and
                  Dongmei Liu},
  title        = {Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha},
  booktitle    = {Information and Communications Security - 13th International Conference,
                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7043},
  pages        = {255--266},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25243-3\_21},
  doi          = {10.1007/978-3-642-25243-3\_21},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/IshiguroKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/KiyomotoM11,
  author       = {Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Mario K{\"{o}}ppen},
  title        = {On Data Importance Analysis},
  booktitle    = {2011 Third International Conference on Intelligent Networking and
                  Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec.
                  2, 2011},
  pages        = {628--633},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/INCoS.2011.127},
  doi          = {10.1109/INCOS.2011.127},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/KiyomotoM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiyomotoHYNF11,
  author       = {Shinsaku Kiyomoto and
                  Matthew Henricksen and
                  Wun{-}She Yap and
                  Yuto Nakano and
                  Kazuhide Fukushima},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {{MASHA} - Low Cost Authentication with a New Stream Cipher},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_5},
  doi          = {10.1007/978-3-642-24861-0\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiyomotoHYNF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/OtaKM11,
  author       = {Haruki Ota and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Automatic security verification for 3-party authentication and key
                  exchange protocols},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {254--258},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6060010},
  doi          = {10.1109/ICNSS.2011.6060010},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/OtaKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaKMS11,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Kouichi Sakurai},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Towards Optimal Revocation and Tracing Schemes - The Power of the
                  Ternary Tree},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {37--49},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaKMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FukushimaKTS10,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Improved Subset Difference Method with Ternary Tree},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {11},
  pages        = {2034--2044},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.2034},
  doi          = {10.1587/TRANSFUN.E93.A.2034},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FukushimaKTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HenricksenYYKT10,
  author       = {Matthew Henricksen and
                  Wun{-}She Yap and
                  Chee Hoo Yian and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Side-Channel Analysis of the {K2} Stream Cipher},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {53--73},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_4},
  doi          = {10.1007/978-3-642-14081-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HenricksenYYKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/OtaKT10,
  author       = {Haruki Ota and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Security Verification for Authentication and Key Exchange Protocols,
                  Revisited},
  booktitle    = {24th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13
                  April 2010},
  pages        = {226--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WAINA.2010.43},
  doi          = {10.1109/WAINA.2010.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/OtaKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/KiyomotoM10,
  author       = {Shinsaku Kiyomoto and
                  Keith M. Martin},
  title        = {Towards a Common Notion of Privacy Leakage on Public Database},
  booktitle    = {Proceedings of the Fifth International Conference on Broadband and
                  Wireless Computing, Communication and Applications, {BWCCA} 2010,
                  November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan
                  (In conjunction with the 3PGCIC-2010 International Conference)},
  pages        = {186--191},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/BWCCA.2010.69},
  doi          = {10.1109/BWCCA.2010.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/KiyomotoM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ShinKFT10,
  author       = {Wook Shin and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {A Frst Step Towards Automated Permission-enforcement Analysis of the
                  Android Framework},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {323--329},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 11:46:08 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ShinKFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KiyomotoT10,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Ana R. Cavalli and
                  Jean Leneutre},
  title        = {A User-Oriented Anonymization Mechanism for Public Data},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 5th
                  International Workshop, {DPM} 2010 and 3rd International Workshop,
                  {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6514},
  pages        = {22--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19348-4\_3},
  doi          = {10.1007/978-3-642-19348-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KiyomotoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/NakanoKKT10,
  author       = {Yuto Nakano and
                  Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Stream Cipher-Based Hash Function and Its Security},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_12},
  doi          = {10.1007/978-3-642-25206-8\_12},
  timestamp    = {Sat, 19 Oct 2019 20:35:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/NakanoKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IyamaKFTT10,
  author       = {Tadashi Iyama and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka and
                  Tsuyoshi Takagi},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Efficient Implementation of Pairing on {BREW} Mobile Phones},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {326--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_22},
  doi          = {10.1007/978-3-642-16825-3\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IyamaKFTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ShinKKFT10,
  author       = {Wook Shin and
                  Sanghoon Kwak and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A Small But Non-negligible Flaw in the Android Permission Scheme},
  booktitle    = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages        = {107--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/POLICY.2010.11},
  doi          = {10.1109/POLICY.2010.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/ShinKKFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NakanoKKT10,
  author       = {Yuto Nakano and
                  Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {On a Construction of Stream-cipher-based Hash Functions},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {334--343},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/NakanoKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/ShinKFT10,
  author       = {Wook Shin and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {A Formal Model to Analyze the Permission Authorization and Enforcement
                  in the Android Framework},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {944--951},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.140},
  doi          = {10.1109/SOCIALCOM.2010.140},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/ShinKFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KiyomotoFT09,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {Design of Anonymous Attribute Authentication Mechanism},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {92-B},
  number       = {4},
  pages        = {1112--1118},
  year         = {2009},
  url          = {https://doi.org/10.1587/transcom.E92.B.1112},
  doi          = {10.1587/TRANSCOM.E92.B.1112},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KiyomotoFT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KuriharaKFT09,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A Fast (\emph{k}, \emph{L}, \emph{n})-Threshold Ramp Secret Sharing
                  Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1808--1821},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1808},
  doi          = {10.1587/TRANSFUN.E92.A.1808},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KuriharaKFT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/FukushimaKT09,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Obfuscation Mechanism in Conjunction with Tamper-Proof Module},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {665--670},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.20},
  doi          = {10.1109/CSE.2009.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/FukushimaKT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KiyomotoFM09,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Keith M. Martin},
  editor       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {Offline Peer-to-Peer Broadcast with Anonymity},
  booktitle    = {e-Business and Telecommunications - 6th International Joint Conference,
                  {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {130},
  pages        = {174--185},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-20077-9\_12},
  doi          = {10.1007/978-3-642-20077-9\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KiyomotoFM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CidKK09,
  author       = {Carlos Cid and
                  Shinsaku Kiyomoto and
                  Jun Kurihara},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {The rakaposhi Stream Cipher},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_5},
  doi          = {10.1007/978-3-642-11145-7\_5},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CidKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ShinGKFT09,
  author       = {Wook Shin and
                  Carl A. Gunter and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {How to Bootstrap Security for Ad-Hoc Network: Revisited},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {119--131},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_11},
  doi          = {10.1007/978-3-642-01244-0\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ShinGKFT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoFM09,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Keith M. Martin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Offline Peer-to-peer Broadcasting Scheme with Anonymity},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {75--82},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoFM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KiyomotoMF09,
  author       = {Shinsaku Kiyomoto and
                  Keith M. Martin and
                  Kazuhide Fukushima},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Privacy-Aware Location Database Service for Granular Queries},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {28--37},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_3},
  doi          = {10.1007/978-3-642-03944-7\_3},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KiyomotoMF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KuriharaKFT08,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A Fast (3, \emph{n})-Threshold Secret Sharing Scheme Using Exclusive-OR
                  Operations},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {127--138},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.127},
  doi          = {10.1093/IETFEC/E91-A.1.127},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KuriharaKFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FukushimaKTS08,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Analysis of Program Obfuscation Schemes with Variable Encoding Technique},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {316--329},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.316},
  doi          = {10.1093/IETFEC/E91-A.1.316},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FukushimaKTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoshitomiTKT08,
  author       = {Motoi Yoshitomi and
                  Tsuyoshi Takagi and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {5},
  pages        = {1330--1337},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.5.1330},
  doi          = {10.1093/IETISY/E91-D.5.1330},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoshitomiTKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KuriharaKFT08a,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {On a Fast (\emph{k, n})-Threshold Secret Sharing Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2365--2378},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2365},
  doi          = {10.1093/IETFEC/E91-A.9.2365},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KuriharaKFT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/FukushimaKTS08,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Optimization of Group Key Management Structure with a Client Join-Leave
                  Mechanism},
  journal      = {J. Inf. Process.},
  volume       = {16},
  pages        = {130--141},
  year         = {2008},
  url          = {https://doi.org/10.2197/ipsjjip.16.130},
  doi          = {10.2197/IPSJJIP.16.130},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/FukushimaKTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/KiyomotoOT08,
  author       = {Shinsaku Kiyomoto and
                  Haruki Ota and
                  Toshiaki Tanaka},
  editor       = {Jos{\'{e}} Cordeiro and
                  Joaquim Filipe},
  title        = {On-the-Fly Automatic Generation of Security Protocols},
  booktitle    = {{ICEIS} 2008 - Proceedings of the Tenth International Conference on
                  Enterprise Information Systems, Volume ISAS-2, Barcelona, Spain, June
                  12-16, 2008},
  pages        = {97--104},
  year         = {2008},
  timestamp    = {Mon, 15 Jun 2015 19:00:08 +0200},
  biburl       = {https://dblp.org/rec/conf/iceis/KiyomotoOT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KiyomotoT08,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Anonymous attribute authentication scheme using self-blindable certificates},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {215--217},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565060},
  doi          = {10.1109/ISI.2008.4565060},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KiyomotoT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KuriharaKFT08,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {455--470},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_31},
  doi          = {10.1007/978-3-540-85886-7\_31},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KuriharaKFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoTS08,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {FPGA-Targeted Hardware Implementations of {K2}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {270--277},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FukushimaKTS08,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Ternary Subset Difference Method and Its Quantitative Analysis},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_17},
  doi          = {10.1007/978-3-642-00306-6\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FukushimaKTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuriharaKFT08,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuriharaKFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OtaYKTO07,
  author       = {Haruki Ota and
                  Kazuki Yoneyama and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kazuo Ohta},
  title        = {Universally Composable Hierarchical Hybrid Authenticated Key Exchange},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {139--151},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.139},
  doi          = {10.1093/IETFEC/E90-A.1.139},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OtaYKTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KiyomotoFTS07,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {On Effectiveness of Clock Control in Stream Ciphers},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {9},
  pages        = {1780--1787},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.9.1780},
  doi          = {10.1093/IETFEC/E90-A.9.1780},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KiyomotoFTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/KiyomotoTMM07,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Yutaka Miyake and
                  Yoshinori Mitamura},
  title        = {Development of security functions for a medical information sharing
                  platform},
  journal      = {Syst. Comput. Jpn.},
  volume       = {38},
  number       = {11},
  pages        = {49--63},
  year         = {2007},
  url          = {https://doi.org/10.1002/scj.20466},
  doi          = {10.1002/SCJ.20466},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/KiyomotoTMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KiyomotoTS07,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Joaquim Filipe and
                  Mohammad S. Obaidat},
  title        = {{K2} Stream Cipher},
  booktitle    = {E-business and Telecommunications - 4th International Conference,
                  {ICETE} 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {23},
  pages        = {214--226},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88653-2\_16},
  doi          = {10.1007/978-3-540-88653-2\_16},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KiyomotoTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoTS07,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {{K2:} {A} Stream Cipher Algorithm using Dynamic Feedback Control},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {204--213},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YoshitomiTKT07,
  author       = {Motoi Yoshitomi and
                  Tsuyoshi Takagi and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_15},
  doi          = {10.1007/978-3-540-77535-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YoshitomiTKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoshitomiTKT07,
  author       = {Motoi Yoshitomi and
                  Tsuyoshi Takagi and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Efficient Implementation of the Pairing on Mobilephones using {BREW}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoshitomiTKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KiyomotoT06,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Evaluation of Mutational Capability and Real-Time Applicability of
                  Obfuscation Techniques},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {222--226},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.222},
  doi          = {10.1093/IETFEC/E89-A.1.222},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KiyomotoT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/FukushimaKT06,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile
                  Services},
  booktitle    = {7th International Conference on Mobile Data Management {(MDM} 2006),
                  Nara, Japan, May 9-13, 2006},
  pages        = {17},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/MDM.2006.83},
  doi          = {10.1109/MDM.2006.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/FukushimaKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OtaKT05,
  author       = {Haruki Ota and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Proposal of a Transformation Method for Iris Codes in Iris Scanning
                  Verification},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {287--295},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_287\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OtaKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KiyomotoTS05,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled
                  Stream Ciphers},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {10},
  pages        = {2778--2791},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietfec/e88-a.10.2778},
  doi          = {10.1093/IETFEC/E88-A.10.2778},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KiyomotoTS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamadaKTN04,
  author       = {Akira Yamada and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Koji Nakao},
  title        = {New Time-Stamping Scheme Using Mutual Communications with Pseudonymous
                  Clients},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {182--189},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_182\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamadaKTN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KurodaYOKT04,
  author       = {Masahiro Kuroda and
                  Mariko Yoshida and
                  Ryoji Ono and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Secure Service and Network Framework for Mobile Ethernet},
  journal      = {Wirel. Pers. Commun.},
  volume       = {29},
  number       = {3-4},
  pages        = {161--190},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:WIRE.0000047061.87235.8b},
  doi          = {10.1023/B:WIRE.0000047061.87235.8B},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KurodaYOKT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics