Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Shinsaku Kiyomoto
@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24, author = {Kento Hasegawa and Katsutoshi Hanahara and Hiroshi Sugisaki and Minoru Kozu and Kazuhide Fukushima and Yosuke Murakami and Shinsaku Kiyomoto}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Vulnerability Information Sharing Platform for Securing Hardware Supply Chains}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {403--410}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012351800003648}, doi = {10.5220/0012351800003648}, timestamp = {Tue, 02 Apr 2024 14:37:52 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaHSKFMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/NarisadaFK23, author = {Shintaro Narisada and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Multiparallel {MMT:} Faster {ISD} Algorithm Solving High-Dimensional Syndrome Decoding Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {241--252}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022cip0023}, doi = {10.1587/TRANSFUN.2022CIP0023}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/NarisadaFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/HasegawaHNKT23, author = {Kento Hasegawa and Seira Hidano and Kohei Nozawa and Shinsaku Kiyomoto and Nozomu Togawa}, title = {R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training}, journal = {{IEEE} Trans. Computers}, volume = {72}, number = {2}, pages = {333--345}, year = {2023}, url = {https://doi.org/10.1109/TC.2022.3222090}, doi = {10.1109/TC.2022.3222090}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/HasegawaHNKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/Nguyen-SonHFKE23, author = {Hoang{-}Quoc Nguyen{-}Son and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto and Isao Echizen}, editor = {Anna Rogers and Jordan L. Boyd{-}Graber and Naoaki Okazaki}, title = {VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations}, booktitle = {Findings of the Association for Computational Linguistics: {ACL} 2023, Toronto, Canada, July 9-14, 2023}, pages = {5090--5104}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.findings-acl.315}, doi = {10.18653/V1/2023.FINDINGS-ACL.315}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/Nguyen-SonHFKE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/OkadaFKT23, author = {Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {695--724}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_26}, doi = {10.1007/978-3-031-33488-7\_26}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/OkadaFKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KhucSDGFK23, author = {Thanh Xuan Khuc and Willy Susilo and Dung Hoang Duong and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Chunpeng Ge and Moti Yung}, title = {Compact Accountable Ring Signatures in the Plain Model}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {23--43}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_2}, doi = {10.1007/978-981-97-0942-7\_2}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KhucSDGFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/NguyenSDGFK23, author = {Tuong Ngoc Nguyen and Willy Susilo and Dung Hoang Duong and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Chunpeng Ge and Moti Yung}, title = {Compact Ring Signatures with Post-Quantum Security in Standard Model}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {65--84}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_4}, doi = {10.1007/978-981-97-0942-7\_4}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/NguyenSDGFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AnandBCFIKLNST23, author = {Ravi Anand and Subhadeep Banik and Andrea Caforio and Kazuhide Fukushima and Takanori Isobe and Shinsaku Kiyomoto and Fukang Liu and Yuto Nakano and Kosei Sakamoto and Nobuyuki Takeuchi}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {229--248}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_12}, doi = {10.1007/978-3-031-50594-2\_12}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AnandBCFIKLNST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NarisadaBFK23, author = {Shintaro Narisada and Shohei Beppu and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {329--338}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011618000003405}, doi = {10.5220/0011618000003405}, timestamp = {Thu, 11 May 2023 10:52:54 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NarisadaBFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/KhucTSDGFK23, author = {Thanh Xuan Khuc and Anh The Ta and Willy Susilo and Dung Hoang Duong and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Francesco Regazzoni and Bodhisatwa Mazumdar and Sri Parameswaran}, title = {Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 13th International Conference, {SPACE} 2023, Roorkee, India, December 14-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14412}, pages = {214--241}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51583-5\_13}, doi = {10.1007/978-3-031-51583-5\_13}, timestamp = {Tue, 07 May 2024 20:12:09 +0200}, biburl = {https://dblp.org/rec/conf/space/KhucTSDGFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wahc/Narisada0FKN23, author = {Shintaro Narisada and Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Takashi Nishide}, editor = {Michael Brenner and Anamaria Costache and Kurt Rohloff}, title = {{GPU} Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation}, booktitle = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023}, pages = {1--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605759.3625256}, doi = {10.1145/3605759.3625256}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wahc/Narisada0FKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-01273, author = {Hoang{-}Quoc Nguyen{-}Son and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto and Isao Echizen}, title = {VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations}, journal = {CoRR}, volume = {abs/2306.01273}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.01273}, doi = {10.48550/ARXIV.2306.01273}, eprinttype = {arXiv}, eprint = {2306.01273}, timestamp = {Mon, 12 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-01273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkadaFKT23, author = {Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2023}, url = {https://eprint.iacr.org/2023/479}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkadaFKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NarisadaOFKN23, author = {Shintaro Narisada and Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Takashi Nishide}, title = {{GPU} Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1467}, year = {2023}, url = {https://eprint.iacr.org/2023/1467}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NarisadaOFKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OkadaTFKT22, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Erratum: {A} Compact Digital Signature Scheme Based on the Module-LWR Problem {[IEICE} Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. {E104.A} (2021), No. 9 pp.1219-1234]}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {2}, pages = {130}, year = {2022}, url = {https://doi.org/10.1587/transfun.2022eae0001}, doi = {10.1587/TRANSFUN.2022EAE0001}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IshizakaK22, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Multi-dimensional sub/super-range signatures}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103084}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103084}, doi = {10.1016/J.JISA.2021.103084}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/IshizakaK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DuongRSFKS22, author = {Dung Hoang Duong and Partha Sarathi Roy and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto and Arnaud Sipasseuth}, title = {Chosen-ciphertext lattice-based public key encryption with equality test in standard model}, journal = {Theor. Comput. Sci.}, volume = {905}, pages = {31--53}, year = {2022}, url = {https://doi.org/10.1016/j.tcs.2021.12.013}, doi = {10.1016/J.TCS.2021.12.013}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/DuongRSFKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/RoyDSSFK22, author = {Partha Sarathi Roy and Dung Hoang Duong and Willy Susilo and Arnaud Sipasseuth and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Lattice-based public-key encryption with equality test supporting flexible authorization in standard model}, journal = {Theor. Comput. Sci.}, volume = {929}, pages = {124--139}, year = {2022}, url = {https://doi.org/10.1016/j.tcs.2022.06.034}, doi = {10.1016/J.TCS.2022.06.034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/RoyDSSFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/0001JDSFK22, author = {Priyanka Dutta and Mei Jiang and Dung Hoang Duong and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {408--422}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517400}, doi = {10.1145/3488932.3517400}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/0001JDSFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/Nguyen-SonUHFK22, author = {Hoang{-}Quoc Nguyen{-}Son and Huy Quang Ung and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Yoav Goldberg and Zornitsa Kozareva and Yue Zhang}, title = {CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022}, pages = {2903--2913}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.findings-emnlp.210}, doi = {10.18653/V1/2022.FINDINGS-EMNLP.210}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/Nguyen-SonUHFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NguyenTLDSGFK22, author = {Tuong Ngoc Nguyen and Anh The Ta and Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Efficient Unique Ring Signatures from Lattices}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {447--466}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_22}, doi = {10.1007/978-3-031-17146-8\_22}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/NguyenTLDSGFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grapp/BracamonteHK22, author = {Vanessa Bracamonte and Seira Hidano and Shinsaku Kiyomoto}, editor = {A. Augusto de Sousa and Kurt Debattista and Alexis Paljic and Mounia Ziat and Christophe Hurter and Helen C. Purchase and Giovanni Maria Farinella and Petia Radeva and Kadi Bouatouch}, title = {Influence of Errors on the Evaluation of Text Classification Systems}, booktitle = {Computer Vision, Imaging and Computer Graphics Theory and Applications - 17th International Joint Conference, {VISIGRAPP} 2022, Virtual Event, February 6-8, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1815}, pages = {161--181}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45725-8\_8}, doi = {10.1007/978-3-031-45725-8\_8}, timestamp = {Fri, 26 Apr 2024 12:34:25 +0200}, biburl = {https://dblp.org/rec/conf/grapp/BracamonteHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hucapp/BracamonteHK22, author = {Vanessa Bracamonte and Seira Hidano and Shinsaku Kiyomoto}, editor = {Alexis Paljic and Mounia Ziat and Kadi Bouatouch}, title = {Effect of Errors on the Evaluation of Machine Learning Systems}, booktitle = {Proceedings of the 17th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, {VISIGRAPP} 2022, Volume 2: HUCAPP, Online Streaming, February 6-8, 2022}, pages = {48--57}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010839300003124}, doi = {10.5220/0010839300003124}, timestamp = {Tue, 06 Jun 2023 14:58:00 +0200}, biburl = {https://dblp.org/rec/conf/hucapp/BracamonteHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IshizakaFK22, author = {Masahito Ishizaka and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {337--362}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_17}, doi = {10.1007/978-3-031-29371-9\_17}, timestamp = {Thu, 06 Apr 2023 10:01:46 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IshizakaFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivapp/BracamonteHNK22, author = {Vanessa Bracamonte and Seira Hidano and Toru Nakamura and Shinsaku Kiyomoto}, editor = {Christophe Hurter and Helen C. Purchase and Kadi Bouatouch}, title = {Feature-level Approach for the Evaluation of Text Classification Models}, booktitle = {Proceedings of the 17th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, {VISIGRAPP} 2022, Volume 3: IVAPP, Online Streaming, February 6-8, 2022}, pages = {164--170}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010846900003124}, doi = {10.5220/0010846900003124}, timestamp = {Tue, 06 Jun 2023 14:58:00 +0200}, biburl = {https://dblp.org/rec/conf/ivapp/BracamonteHNK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DuttaDSFK22, author = {Priyanka Dutta and Dung Hoang Duong and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Chunpeng Ge and Fuchun Guo}, title = {Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices}, booktitle = {Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13600}, pages = {121--136}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20917-8\_9}, doi = {10.1007/978-3-031-20917-8\_9}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/DuttaDSFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-13702, author = {Kento Hasegawa and Seira Hidano and Kohei Nozawa and Shinsaku Kiyomoto and Nozomu Togawa}, title = {R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training}, journal = {CoRR}, volume = {abs/2205.13702}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.13702}, doi = {10.48550/ARXIV.2205.13702}, eprinttype = {arXiv}, eprint = {2205.13702}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-13702.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakamotoLNKI22, author = {Kosei Sakamoto and Fukang Liu and Yuto Nakano and Shinsaku Kiyomoto and Takanori Isobe}, title = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2022}, url = {https://eprint.iacr.org/2022/116}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SakamotoLNKI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenTLDSGFK22, author = {Tuong Ngoc Nguyen and Anh The Ta and Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Efficient Unique Ring Signatures From Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1070}, year = {2022}, url = {https://eprint.iacr.org/2022/1070}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenTLDSGFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LeVDSLFK21, author = {Huy Quoc Le and Bay Vo and Dung Hoang Duong and Willy Susilo and Ngoc T. Le and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Identity-Based Linkable Ring Signatures From Lattices}, journal = {{IEEE} Access}, volume = {9}, pages = {84739--84755}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3087808}, doi = {10.1109/ACCESS.2021.3087808}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LeVDSLFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeDRSFK21, author = {Huy Quoc Le and Dung Hoang Duong and Partha Sarathi Roy and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Lattice-based signcryption with equality test in standard model}, journal = {Comput. Stand. Interfaces}, volume = {76}, pages = {103515}, year = {2021}, url = {https://doi.org/10.1016/j.csi.2021.103515}, doi = {10.1016/J.CSI.2021.103515}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LeDRSFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/NarisadaOFK21, author = {Shintaro Narisada and Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Faster Rotation-Based Gauss Sieve for Solving the {SVP} on General Ideal Lattices}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {1}, pages = {79--88}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020CIP0014}, doi = {10.1587/TRANSFUN.2020CIP0014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/NarisadaOFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OkadaTFKT21, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {A Compact Digital Signature Scheme Based on the Module-LWR Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {9}, pages = {1219--1234}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020dmp0012}, doi = {10.1587/TRANSFUN.2020DMP0012}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/0005FXKT21, author = {Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {4}, pages = {267--281}, year = {2021}, url = {https://doi.org/10.1049/ise2.12012}, doi = {10.1049/ISE2.12012}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/0005FXKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/OkadaKC21, author = {Hiroki Okada and Shinsaku Kiyomoto and Carlos Cid}, title = {Integer-Wise Functional Bootstrapping on {TFHE:} Applications in Secure Integer Arithmetics}, journal = {Inf.}, volume = {12}, number = {8}, pages = {297}, year = {2021}, url = {https://doi.org/10.3390/info12080297}, doi = {10.3390/INFO12080297}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/OkadaKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/NozawaHHKHT21, author = {Kohei Nozawa and Kento Hasegawa and Seira Hidano and Shinsaku Kiyomoto and Kazuo Hashimoto and Nozomu Togawa}, title = {Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists}, journal = {J. Inf. Process.}, volume = {29}, pages = {236--246}, year = {2021}, url = {https://doi.org/10.2197/ipsjjip.29.236}, doi = {10.2197/IPSJJIP.29.236}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/NozawaHHKHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/MimotoHKKM21, author = {Tomoaki Mimoto and Masayuki Hashimoto and Shinsaku Kiyomoto and Koji Kitamura and Atsuko Miyaji}, title = {Privacy Risk of Document Data and a Countermeasure Framework}, journal = {J. Inf. Process.}, volume = {29}, pages = {778--786}, year = {2021}, url = {https://doi.org/10.2197/ipsjjip.29.778}, doi = {10.2197/IPSJJIP.29.778}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/MimotoHKKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/ThaoRBKKO21, author = {Tran Phuong Thao and Mohammad Shahriar Rahman and Md. Zakirul Alam Bhuiyan and Ayumu Kubota and Shinsaku Kiyomoto and Kazumasa Omote}, title = {Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data}, journal = {{IEEE} Trans. Big Data}, volume = {7}, number = {4}, pages = {703--716}, year = {2021}, url = {https://doi.org/10.1109/TBDATA.2017.2708085}, doi = {10.1109/TBDATA.2017.2708085}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/ThaoRBKKO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SakamotoLNKI21, author = {Kosei Sakamoto and Fukang Liu and Yuto Nakano and Shinsaku Kiyomoto and Takanori Isobe}, title = {Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {2}, pages = {1--30}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i2.1-30}, doi = {10.46586/TOSC.V2021.I2.1-30}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SakamotoLNKI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TaKNLDSFK21, author = {Anh The Ta and Thanh Xuan Khuc and Tuong Ngoc Nguyen and Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Efficient Unique Ring Signature for Blockchain Privacy Protection}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {391--407}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_20}, doi = {10.1007/978-3-030-90567-5\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TaKNLDSFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/BajardFKPSS21, author = {Jean{-}Claude Bajard and Kazuhide Fukushima and Shinsaku Kiyomoto and Thomas Plantard and Arnaud Sipasseuth and Willy Susilo}, title = {Generating Residue Number System Bases}, booktitle = {28th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2021, Lyngby, Denmark, June 14-16, 2021}, pages = {86--93}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ARITH51176.2021.00027}, doi = {10.1109/ARITH51176.2021.00027}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arith/BajardFKPSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/NarisadaMHUSHK21, author = {Shintaro Narisada and Yuki Matsumoto and Seira Hidano and Toshihiro Uchibayashi and Takuo Suganuma and Masahiro Hiji and Shinsaku Kiyomoto}, editor = {Mauro Conti and Marc Stevens and Stephan Krenn}, title = {Countermeasures Against Backdoor Attacks Towards Malware Detectors}, booktitle = {Cryptology and Network Security - 20th International Conference, {CANS} 2021, Vienna, Austria, December 13-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13099}, pages = {295--314}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92548-2\_16}, doi = {10.1007/978-3-030-92548-2\_16}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/NarisadaMHUSHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HasegawaHKT21, author = {Kento Hasegawa and Seira Hidano and Shinsaku Kiyomoto and Nozomu Togawa}, editor = {Mauro Conti and Marc Stevens and Stephan Krenn}, title = {Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training}, booktitle = {Cryptology and Network Security - 20th International Conference, {CANS} 2021, Vienna, Austria, December 13-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13099}, pages = {392--411}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92548-2\_21}, doi = {10.1007/978-3-030-92548-2\_21}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/HasegawaHKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteTK21, author = {Vanessa Bracamonte and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool}, booktitle = {Proceedings of the 7th International Conference on Information Systems Security and Privacy, {ICISSP} 2021, Online Streaming, February 11-13, 2021}, pages = {628--634}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010319706280634}, doi = {10.5220/0010319706280634}, timestamp = {Tue, 02 Mar 2021 22:35:43 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/Nguyen-SonTHBKY21, author = {Hoang{-}Quoc Nguyen{-}Son and Tran Phuong Thao and Seira Hidano and Vanessa Bracamonte and Shinsaku Kiyomoto and Rie Shigetomi Yamaguchi}, title = {{OPA2D:} One-Pixel Attack, Detection, and Defense in Deep Neural Networks}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9534332}, doi = {10.1109/IJCNN52387.2021.9534332}, timestamp = {Wed, 29 Sep 2021 17:00:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/Nguyen-SonTHBKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/HasegawaHNKT21, author = {Kento Hasegawa and Seira Hidano and Kohei Nozawa and Shinsaku Kiyomoto and Nozomu Togawa}, title = {Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists}, booktitle = {27th {IEEE} International Symposium on On-Line Testing and Robust System Design, {IOLTS} 2021, Torino, Italy, June 28-30, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IOLTS52814.2021.9486713}, doi = {10.1109/IOLTS52814.2021.9486713}, timestamp = {Wed, 04 Aug 2021 13:58:42 +0200}, biburl = {https://dblp.org/rec/conf/iolts/HasegawaHNKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/NarisadaFK21, author = {Shintaro Narisada and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Fast {GPU} Implementation of Dumer's Algorithm Solving the Syndrome Decoding Problem}, booktitle = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021}, pages = {971--977}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00136}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00136}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/NarisadaFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/UemuraFKKT21, author = {Shusaku Uemura and Kazuhide Fukushima and Shinsaku Kiyomoto and Momonari Kudo and Tsuyoshi Takagi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the {LWR} Problem}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {23--41}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_2}, doi = {10.1007/978-3-030-85987-9\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/UemuraFKKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NakamuraIKY21, author = {Toru Nakamura and Hiroshi Ito and Shinsaku Kiyomoto and Toshihiro Yamauchi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {64--73}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_4}, doi = {10.1007/978-3-030-85987-9\_4}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NakamuraIKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/naacl/Nguyen-SonPHGK21, author = {Hoang{-}Quoc Nguyen{-}Son and Tran Thao Phuong and Seira Hidano and Ishita Gupta and Shinsaku Kiyomoto}, editor = {Kristina Toutanova and Anna Rumshisky and Luke Zettlemoyer and Dilek Hakkani{-}T{\"{u}}r and Iz Beltagy and Steven Bethard and Ryan Cotterell and Tanmoy Chakraborty and Yichao Zhou}, title = {Machine Translated Text Detection Through Text Similarity with Round-Trip Translation}, booktitle = {Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, {NAACL-HLT} 2021, Online, June 6-11, 2021}, pages = {5792--5797}, publisher = {Association for Computational Linguistics}, year = {2021}, url = {https://doi.org/10.18653/v1/2021.naacl-main.462}, doi = {10.18653/V1/2021.NAACL-MAIN.462}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/naacl/Nguyen-SonPHGK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paclic/Nguyen-SonHFK21, author = {Hoang{-}Quoc Nguyen{-}Son and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Kaibao Hu and Jong{-}Bok Kim and Chengqing Zong and Emmanuele Chersoni}, title = {{SEPP:} Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text}, booktitle = {Proceedings of the 35th Pacific Asia Conference on Language, Information and Computation, {PACLIC} 2021, Shanghai International Studies University, Shanghai, China, 5-7 November 2021}, pages = {11--20}, publisher = {Association for Computational Lingustics}, year = {2021}, url = {https://aclanthology.org/2021.paclic-1.2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paclic/Nguyen-SonHFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OkadaKC21, author = {Hiroki Okada and Shinsaku Kiyomoto and Carlos Cid}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Comparison of {GKE} Protocols based on {SIDH}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {507--514}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010547305070514}, doi = {10.5220/0010547305070514}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OkadaKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/NakanoNKOIHYMK21, author = {Yuto Nakano and Toru Nakamura and Yasuaki Kobayashi and Takashi Ozu and Masahito Ishizaka and Masayuki Hashimoto and Hiroyuki Yokoyama and Yutaka Miyake and Shinsaku Kiyomoto}, title = {Automatic Security Inspection Framework for Trustworthy Supply Chain}, booktitle = {19th {IEEE/ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2021, Kanazawa, Japan, June 20-22, 2021}, pages = {45--50}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SERA51205.2021.9509040}, doi = {10.1109/SERA51205.2021.9509040}, timestamp = {Fri, 13 Aug 2021 10:40:52 +0200}, biburl = {https://dblp.org/rec/conf/sera/NakanoNKOIHYMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-05748, author = {Hoang{-}Quoc Nguyen{-}Son and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {{SEPP:} Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text}, journal = {CoRR}, volume = {abs/2110.05748}, year = {2021}, url = {https://arxiv.org/abs/2110.05748}, eprinttype = {arXiv}, eprint = {2110.05748}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-05748.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshizakaK21, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Multi-Dimensional Sub/Super-Range Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2021}, url = {https://eprint.iacr.org/2021/698}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshizakaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshizakaK21a, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1170}, year = {2021}, url = {https://eprint.iacr.org/2021/1170}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshizakaK21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkadaTFKT21, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {A Compact Digital Signature Scheme Based on the Module-LWR problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1699}, year = {2021}, url = {https://eprint.iacr.org/2021/1699}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkadaTFKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkadaTFKT20, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {On the Complexity of the LWR-Solving {BKW} Algorithm}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {1}, pages = {173--182}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_173}, doi = {10.1587/TRANSFUN.2019CIP0022}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkadaTFKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MimotoHKM20, author = {Tomoaki Mimoto and Seira Hidano and Shinsaku Kiyomoto and Atsuko Miyaji}, title = {Anonymization Technique Based on {SGD} Matrix Factorization}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {103-D}, number = {2}, pages = {299--308}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-d\_2\_299}, doi = {10.1587/TRANSINF.2019INP0013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MimotoHKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/HidanoMKKH20, author = {Seira Hidano and Takao Murakami and Shuichi Katsumata and Shinsaku Kiyomoto and Goichiro Hanaoka}, title = {Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {3}, pages = {264--283}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0052}, doi = {10.2478/POPETS-2020-0052}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/HidanoMKKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tem/RahmanOBBKW20, author = {Mohammad Shahriar Rahman and Abdullah Al Omar and Md. Zakirul Alam Bhuiyan and Anirban Basu and Shinsaku Kiyomoto and Guojun Wang}, title = {Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption}, journal = {{IEEE} Trans. Engineering Management}, volume = {67}, number = {4}, pages = {1476--1486}, year = {2020}, url = {https://doi.org/10.1109/TEM.2019.2960829}, doi = {10.1109/TEM.2019.2960829}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tem/RahmanOBBKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FukushimaPDKGF20, author = {Kazuhide Fukushima and Thomas Perianin and Victor Dyseryn and Shinsaku Kiyomoto and Sylvain Guilley and Adrien Facon}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Feasibility study of a camera-based {PUF} in a realistic scenario}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {31:1--31:6}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407047}, doi = {10.1145/3407023.3407047}, timestamp = {Mon, 03 Aug 2020 16:17:13 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/FukushimaPDKGF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/NarisadaSHUSHK20, author = {Shintaro Narisada and Shoichiro Sasaki and Seira Hidano and Toshihiro Uchibayashi and Takuo Suganuma and Masahiro Hiji and Shinsaku Kiyomoto}, editor = {Stephan Krenn and Haya Schulmann and Serge Vaudenay}, title = {Stronger Targeted Poisoning Attacks Against Malware Detection}, booktitle = {Cryptology and Network Security - 19th International Conference, {CANS} 2020, Vienna, Austria, December 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12579}, pages = {65--84}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65411-5\_4}, doi = {10.1007/978-3-030-65411-5\_4}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/cans/NarisadaSHUSHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/UenoFNKH20, author = {Rei Ueno and Kazuhide Fukushima and Yuto Nakano and Shinsaku Kiyomoto and Naofumi Homma}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Single-Trace Side-Channel Analysis on Polynomial-Based {MAC} Schemes}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {43--67}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_3}, doi = {10.1007/978-3-030-68773-1\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/UenoFNKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/NakanoNKIHYMK20, author = {Yuto Nakano and Toru Nakamura and Yasuaki Kobayashi and Masahito Ishizaka and Masayuki Hashimoto and Hiroyuki Yokoyama and Yutaka Miyake and Shinsaku Kiyomoto}, title = {Consideration on Data Conformance Toward Building Trust in Supply Chain}, booktitle = {2020 European Conference on Networks and Communications, EuCNC 2020, Dubrovnik, Croatia, June 15-18, 2020}, pages = {128--132}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuCNC48522.2020.9200933}, doi = {10.1109/EUCNC48522.2020.9200933}, timestamp = {Tue, 29 Sep 2020 14:45:05 +0200}, biburl = {https://dblp.org/rec/conf/eucnc/NakanoNKIHYMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/OkadaTFKT20, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {A Compact Digital Signature Scheme Based on the Module-LWR Problem}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {73--90}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_5}, doi = {10.1007/978-3-030-61078-4\_5}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/OkadaTFKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK20, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {142--151}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0008986101420151}, doi = {10.5220/0008986101420151}, timestamp = {Tue, 14 Apr 2020 10:48:30 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK20a, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Effects of Explanatory Information on Privacy Policy Summarization Tool Perception}, booktitle = {Information Systems Security and Privacy - 6th International Conference, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1545}, pages = {156--177}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-94900-6\_8}, doi = {10.1007/978-3-030-94900-6\_8}, timestamp = {Mon, 21 Mar 2022 16:15:19 +0100}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HidanoK20, author = {Seira Hidano and Shinsaku Kiyomoto}, editor = {Steven Furnell and Paolo Mori and Edgar R. Weippl and Olivier Camp}, title = {Recommender Systems Robust to Data Poisoning using Trim Learning}, booktitle = {Proceedings of the 6th International Conference on Information Systems Security and Privacy, {ICISSP} 2020, Valletta, Malta, February 25-27, 2020}, pages = {721--724}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009180407210724}, doi = {10.5220/0009180407210724}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HidanoK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/IshizakaK20, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, editor = {Willy Susilo and Robert H. Deng and Fuchun Guo and Yannan Li and Rolly Intan}, title = {Time-Specific Signatures}, booktitle = {Information Security - 23rd International Conference, {ISC} 2020, Bali, Indonesia, December 16-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12472}, pages = {20--38}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62974-8\_2}, doi = {10.1007/978-3-030-62974-8\_2}, timestamp = {Wed, 25 Nov 2020 17:15:03 +0100}, biburl = {https://dblp.org/rec/conf/isw/IshizakaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/OkadaKC20, author = {Hiroki Okada and Shinsaku Kiyomoto and Carlos Cid}, editor = {Willy Susilo and Robert H. Deng and Fuchun Guo and Yannan Li and Rolly Intan}, title = {Integerwise Functional Bootstrapping on {TFHE}}, booktitle = {Information Security - 23rd International Conference, {ISC} 2020, Bali, Indonesia, December 16-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12472}, pages = {107--125}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62974-8\_7}, doi = {10.1007/978-3-030-62974-8\_7}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/OkadaKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MimotoKKM20, author = {Tomoaki Mimoto and Shinsaku Kiyomoto and Koji Kitamura and Atsuko Miyaji}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {A Practical Privacy-Preserving Algorithm for Document Data}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {1376--1383}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00185}, doi = {10.1109/TRUSTCOM50675.2020.00185}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MimotoKKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/MiyajiKTNK20, author = {Atsuko Miyaji and Shinsaku Kiyomoto and Katsuya Tanaka and Yoshifumi Nishida and Koji Kitamura}, editor = {Atsuko Miyaji and Tomoaki Mimoto}, title = {Introduction}, booktitle = {Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields}, pages = {1--3}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-3654-0\_1}, doi = {10.1007/978-981-15-3654-0\_1}, timestamp = {Fri, 14 May 2021 08:30:50 +0200}, biburl = {https://dblp.org/rec/books/sp/20/MiyajiKTNK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/MimotoKM20, author = {Tomoaki Mimoto and Shinsaku Kiyomoto and Atsuko Miyaji}, editor = {Atsuko Miyaji and Tomoaki Mimoto}, title = {Secure Data Management Technology}, booktitle = {Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields}, pages = {65--105}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-3654-0\_4}, doi = {10.1007/978-981-15-3654-0\_4}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/20/MimotoKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03178, author = {Dung Hoang Duong and Partha Sarathi Roy and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto and Arnaud Sipasseuth}, title = {Lattice-based public key encryption with equality test in standard model, revisited}, journal = {CoRR}, volume = {abs/2005.03178}, year = {2020}, url = {https://arxiv.org/abs/2005.03178}, eprinttype = {arXiv}, eprint = {2005.03178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03178.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-05308, author = {Dung Hoang Duong and Kazuhide Fukushima and Shinsaku Kiyomoto and Partha Sarathi Roy and Arnaud Sipasseuth and Willy Susilo}, title = {Lattice-based public key encryption with equality test supporting flexible authorization in standard model}, journal = {CoRR}, volume = {abs/2005.05308}, year = {2020}, url = {https://arxiv.org/abs/2005.05308}, eprinttype = {arXiv}, eprint = {2005.05308}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-05308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-15423, author = {Huy Quoc Le and Dung Hoang Duong and Partha Sarathi Roy and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Lattice-based Signcryption with Equality Test in Standard Model}, journal = {CoRR}, volume = {abs/2012.15423}, year = {2020}, url = {https://arxiv.org/abs/2012.15423}, eprinttype = {arXiv}, eprint = {2012.15423}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-15423.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshizakaK20, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {595}, year = {2020}, url = {https://eprint.iacr.org/2020/595}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshizakaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshizakaK20a, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Time-Specific Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {658}, year = {2020}, url = {https://eprint.iacr.org/2020/658}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshizakaK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/OmarBBKR19, author = {Abdullah Al Omar and Md. Zakirul Alam Bhuiyan and Anirban Basu and Shinsaku Kiyomoto and Mohammad Shahriar Rahman}, title = {Privacy-friendly platform for healthcare data in cloud based on blockchain environment}, journal = {Future Gener. Comput. Syst.}, volume = {95}, pages = {511--521}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.12.044}, doi = {10.1016/J.FUTURE.2018.12.044}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/OmarBBKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AttrapadungHKMS19, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Shinsaku Kiyomoto and Tomoaki Mimoto and Jacob C. N. Schuldt}, title = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {9}, pages = {1048--1060}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1048}, doi = {10.1587/TRANSFUN.E102.A.1048}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/AttrapadungHKMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/NakamuraAMKS19, author = {Toru Nakamura and Andrew A. Adams and Kiyoshi Murata and Shinsaku Kiyomoto and Nobuo Suzuki}, title = {The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability}, journal = {J. Inf. Process.}, volume = {27}, pages = {787--801}, year = {2019}, url = {https://doi.org/10.2197/ipsjjip.27.787}, doi = {10.2197/IPSJJIP.27.787}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/NakamuraAMKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuongFK0S19, author = {Dung Hoang Duong and Kazuhide Fukushima and Shinsaku Kiyomoto and Partha Sarathi Roy and Willy Susilo}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Lattice-Based Public Key Encryption with Equality Test in Standard Model}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {138--155}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_8}, doi = {10.1007/978-3-030-21548-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuongFK0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicling/NguyenSonTHK19, author = {Hoang{-}Quoc Nguyen{-}Son and Tran Phuong Thao and Seira Hidano and Shinsaku Kiyomoto}, editor = {Alexander F. Gelbukh}, title = {Detecting Machine-Translated Paragraphs by Matching Similar Words}, booktitle = {Computational Linguistics and Intelligent Text Processing - 20th International Conference, CICLing 2019, La Rochelle, France, April 7-13, 2019, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13451}, pages = {521--532}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-031-24337-0\_36}, doi = {10.1007/978-3-031-24337-0\_36}, timestamp = {Tue, 28 Feb 2023 16:50:33 +0100}, biburl = {https://dblp.org/rec/conf/cicling/NguyenSonTHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NozawaHHKHT19, author = {Kohei Nozawa and Kento Hasegawa and Seira Hidano and Shinsaku Kiyomoto and Kazuo Hashimoto and Nozomu Togawa}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {341--359}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_22}, doi = {10.1007/978-3-030-42048-2\_22}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/NozawaHHKHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {67--74}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259500670074}, doi = {10.5220/0007259500670074}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {74--92}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_4}, doi = {10.1007/978-3-030-49443-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK19a, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {User Study of the Effectiveness of a Privacy Policy Summarization Tool}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {186--206}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_9}, doi = {10.1007/978-3-030-49443-8\_9}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0001MFKT19, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security Analysis and Efficient Implementation of Code-based Signature Schemes}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {213--220}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259102130220}, doi = {10.5220/0007259102130220}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/BracamonteHTK19, author = {Vanessa Bracamonte and Seira Hidano and Welderufael B. Tesfay and Shinsaku Kiyomoto}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {370--377}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007378403700377}, doi = {10.5220/0007378403700377}, timestamp = {Wed, 05 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/BracamonteHTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/BasuDNK19, author = {Anirban Basu and Theo Dimitrakos and Yuto Nakano and Shinsaku Kiyomoto}, editor = {Weizhi Meng and Piotr Cofta and Christian Damsgaard Jensen and Tyrone Grandison}, title = {A Framework for Blockchain-Based Verification of Integrity and Authenticity}, booktitle = {Trust Management {XIII} - 13th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {563}, pages = {196--208}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33716-2\_15}, doi = {10.1007/978-3-030-33716-2\_15}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BasuDNK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inlg/Nguyen-SonPHK19, author = {Hoang{-}Quoc Nguyen{-}Son and Tran Thao Phuong and Seira Hidano and Shinsaku Kiyomoto}, editor = {Kees van Deemter and Chenghua Lin and Hiroya Takamura}, title = {Detecting Machine-Translated Text using Back Translation}, booktitle = {Proceedings of the 12th International Conference on Natural Language Generation, {INLG} 2019, Tokyo, Japan, October 29 - November 1, 2019}, pages = {189--197}, publisher = {Association for Computational Linguistics}, year = {2019}, url = {https://aclanthology.org/W19-8626/}, doi = {10.18653/V1/W19-8626}, timestamp = {Thu, 05 Aug 2021 17:36:17 +0200}, biburl = {https://dblp.org/rec/conf/inlg/Nguyen-SonPHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FukushimaYKY19, author = {Kazuhide Fukushima and Ayumu Yoshimura and Shinsaku Kiyomoto and Norikazu Yamasaki}, editor = {Swee{-}Huay Heng and Javier L{\'{o}}pez}, title = {Evaluation of Software {PUF} Based on Gyroscope}, booktitle = {Information Security Practice and Experience - 15th International Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11879}, pages = {232--247}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34339-2\_13}, doi = {10.1007/978-3-030-34339-2\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FukushimaYKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiwis/KiyomotoNWNIK19, author = {Shinsaku Kiyomoto and Yuto Nakano and Atsushi Waseda and Toru Nakamura and Masahito Ishizaka and Yasuaki Kobayashi}, editor = {Irfan Awan and Muhammad Younas and Perin {\"{U}}nal and Markus Aleksy}, title = {A Framework for Secure and Trustworthy Data Management in Supply Chain}, booktitle = {Mobile Web and Intelligent Information Systems - 16th International Conference, MobiWIS 2019, Istanbul, Turkey, August 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11673}, pages = {148--159}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27192-3\_12}, doi = {10.1007/978-3-030-27192-3\_12}, timestamp = {Sun, 25 Oct 2020 22:57:17 +0100}, biburl = {https://dblp.org/rec/conf/mobiwis/KiyomotoNWNIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/SasakiHUSHK19, author = {Shoichiro Sasaki and Seira Hidano and Toshihiro Uchibayashi and Takuo Suganuma and Masahiro Hiji and Shinsaku Kiyomoto}, title = {On Embedding Backdoor in Malware Detectors Using Machine Learning}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949034}, doi = {10.1109/PST47121.2019.8949034}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/SasakiHUSHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Dutta0FKS19, author = {Sabyasachi Dutta and Partha Sarathi Roy and Kazuhide Fukushima and Shinsaku Kiyomoto and Kouichi Sakurai}, editor = {Ilsun You}, title = {Secret Sharing on Evolving Multi-level Access Structure}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {180--191}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_14}, doi = {10.1007/978-3-030-39303-8\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Dutta0FKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-10641, author = {Hoang{-}Quoc Nguyen{-}Son and Tran Phuong Thao and Seira Hidano and Shinsaku Kiyomoto}, title = {Detecting Machine-Translated Paragraphs by Matching Similar Words}, journal = {CoRR}, volume = {abs/1904.10641}, year = {2019}, url = {http://arxiv.org/abs/1904.10641}, eprinttype = {arXiv}, eprint = {1904.10641}, timestamp = {Thu, 02 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-10641.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-06558, author = {Hoang{-}Quoc Nguyen{-}Son and Tran Phuong Thao and Seira Hidano and Shinsaku Kiyomoto}, title = {Detecting Machine-Translated Text using Back Translation}, journal = {CoRR}, volume = {abs/1910.06558}, year = {2019}, url = {http://arxiv.org/abs/1910.06558}, eprinttype = {arXiv}, eprint = {1910.06558}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-06558.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-08981, author = {Hoang{-}Quoc Nguyen{-}Son and Tran Phuong Thao and Seira Hidano and Shinsaku Kiyomoto}, title = {Identifying Adversarial Sentences by Analyzing Text Complexity}, journal = {CoRR}, volume = {abs/1912.08981}, year = {2019}, url = {http://arxiv.org/abs/1912.08981}, eprinttype = {arXiv}, eprint = {1912.08981}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-08981.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001MFK19, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Evaluation of Code-based Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2019}, url = {https://eprint.iacr.org/2019/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001MFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HidanoMKKH18, author = {Seira Hidano and Takao Murakami and Shuichi Katsumata and Shinsaku Kiyomoto and Goichiro Hanaoka}, title = {Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {101-D}, number = {11}, pages = {2665--2676}, year = {2018}, url = {https://doi.org/10.1587/transinf.2017ICP0013}, doi = {10.1587/TRANSINF.2017ICP0013}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HidanoMKKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RahmanBNTK18, author = {Mohammad Shahriar Rahman and Anirban Basu and Toru Nakamura and Haruo Takasaki and Shinsaku Kiyomoto}, title = {{PPM:} Privacy Policy Manager for Home Energy Management System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {2}, pages = {42--56}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.06.30.042}, doi = {10.22667/JOWUA.2018.06.30.042}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RahmanBNTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuanXFKT18, author = {Ye Yuan and Junting Xiao and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {9846168:1--9846168:14}, year = {2018}, url = {https://doi.org/10.1155/2018/9846168}, doi = {10.1155/2018/9846168}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/YuanXFKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/NakanoHKS18, author = {Yuto Nakano and Seira Hidano and Shinsaku Kiyomoto and Kouichi Sakurai}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Marek R. Ogiela and Lidia Ogiela and Nadeem Javaid}, title = {Active Attack Against Oblivious {RAM}}, booktitle = {32nd {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018}, pages = {744--751}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AINA.2018.00112}, doi = {10.1109/AINA.2018.00112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/NakanoHKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/RujRBK18, author = {Sushmita Ruj and Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Marek R. Ogiela and Lidia Ogiela and Nadeem Javaid}, title = {BlockStore: {A} Secure Decentralized Storage Framework on Blockchain}, booktitle = {32nd {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2018, Krakow, Poland, May 16-18, 2018}, pages = {1096--1103}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AINA.2018.00157}, doi = {10.1109/AINA.2018.00157}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/RujRBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/TesfayHNKS18, author = {Welderufael B. Tesfay and Peter Hofmann and Toru Nakamura and Shinsaku Kiyomoto and Jetzabel M. Serna}, editor = {Rakesh M. Verma and Murat Kantarcioglu}, title = {PrivacyGuide: Towards an Implementation of the {EU} {GDPR} on Internet Privacy Policy Evaluation}, booktitle = {Proceedings of the Fourth {ACM} International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {15--21}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180445.3180447}, doi = {10.1145/3180445.3180447}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/TesfayHNKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/FukushimaNIK18, author = {Keishiro Fukushima and Toru Nakamura and Daisuke Ikeda and Shinsaku Kiyomoto}, title = {Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features}, booktitle = {Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018}, pages = {62--66}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3199478.3199486}, doi = {10.1145/3199478.3199486}, timestamp = {Sun, 14 Apr 2019 17:40:32 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/FukushimaNIK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OkadaTFKT18, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Kwangsu Lee}, title = {On the Complexity of the LWR-Solving {BKW} Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {196--214}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_13}, doi = {10.1007/978-3-030-12146-4\_13}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/OkadaTFKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/HidanoNK18, author = {Seira Hidano and Yuto Nakano and Shinsaku Kiyomoto}, editor = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Gary B. Wills and Robert John Walters and Farshad Firouzi and Victor Chang}, title = {An Evaluation Framework for Fastest Oblivious {RAM}}, booktitle = {Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security, IoTBDS 2018, Funchal, Madeira, Portugal, March 19-21, 2018}, pages = {114--122}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006690701140122}, doi = {10.5220/0006690701140122}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/HidanoNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/0001DMAFKS18, author = {Partha Sarathi Roy and Sabyasachi Dutta and Kirill Morozov and Avishek Adhikari and Kazuhide Fukushima and Shinsaku Kiyomoto and Kouichi Sakurai}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {578--594}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_37}, doi = {10.1007/978-3-319-99807-7\_37}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/0001DMAFKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MimotoKHBM18, author = {Tomoaki Mimoto and Shinsaku Kiyomoto and Seira Hidano and Anirban Basu and Atsuko Miyaji}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514189}, doi = {10.1109/PST.2018.8514189}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/MimotoKHBM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/OkadaCHK18, author = {Hiroki Okada and Carlos Cid and Seira Hidano and Shinsaku Kiyomoto}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Linear Depth Integer-Wise Homomorphic Division}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {91--106}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_8}, doi = {10.1007/978-3-030-20074-9\_8}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/OkadaCHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/TesfayHNKS18, author = {Welderufael B. Tesfay and Peter Hofmann and Toru Nakamura and Shinsaku Kiyomoto and Jetzabel M. Serna}, editor = {Pierre{-}Antoine Champin and Fabien Gandon and Mounia Lalmas and Panagiotis G. Ipeirotis}, title = {I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the {EU} {GDPR}}, booktitle = {Companion of the The Web Conference 2018 on The Web Conference 2018, {WWW} 2018, Lyon , France, April 23-27, 2018}, pages = {163--166}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3184558.3186969}, doi = {10.1145/3184558.3186969}, timestamp = {Fri, 16 Apr 2021 10:04:12 +0200}, biburl = {https://dblp.org/rec/conf/www/TesfayHNKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuanFXKT18, author = {Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1238}, year = {2018}, url = {https://eprint.iacr.org/2018/1238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuanFXKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/RahmanBKB17, author = {Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto and Md. Zakirul Alam Bhuiyan}, title = {Privacy-friendly secure bidding for smart grid demand-response}, journal = {Inf. Sci.}, volume = {379}, pages = {229--240}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.10.034}, doi = {10.1016/J.INS.2016.10.034}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/RahmanBKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/RahmanBK17, author = {Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto}, title = {Decentralized Ciphertext-Policy Attribute-Based Encryption: {A} Post-Quantum Construction}, journal = {J. Internet Serv. Inf. Secur.}, volume = {7}, number = {3}, pages = {1--16}, year = {2017}, url = {https://doi.org/10.22667/JISIS.2017.08.31.001}, doi = {10.22667/JISIS.2017.08.31.001}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/RahmanBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuYFTSKH17, author = {Rui Xu and Sze Ling Yeo and Kazuhide Fukushima and Tsuyoshi Takagi and Hwajung Seo and Shinsaku Kiyomoto and Matt Henricksen}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {An Experimental Study of the {BDD} Approach for the Search {LWE} Problem}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {253--272}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_13}, doi = {10.1007/978-3-319-61204-1\_13}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuYFTSKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NakamuraTKS17, author = {Toru Nakamura and Welderufael B. Tesfay and Shinsaku Kiyomoto and Jetzabel M. Serna}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Hannes Hartenstein and Jordi Herrera{-}Joancomart{\'{\i}}}, title = {Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2017 International Workshops, {DPM} 2017 and {CBT} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10436}, pages = {107--123}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67816-0\_7}, doi = {10.1007/978-3-319-67816-0\_7}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/NakamuraTKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KawaiUHAFK17, author = {Wataru Kawai and Rei Ueno and Naofumi Homma and Takafumi Aoki and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017}, pages = {113--121}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSPW.2017.60}, doi = {10.1109/EUROSPW.2017.60}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KawaiUHAFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/MakanjuZK17, author = {Adetokunbo Makanju and Nur Zincir{-}Heywood and Shinsaku Kiyomoto}, editor = {Peter A. N. Bosman}, title = {On evolutionary computation for moving target defense in software defined networks}, booktitle = {Genetic and Evolutionary Computation Conference, Berlin, Germany, July 15-19, 2017, Companion Material Proceedings}, pages = {287--288}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3067695.3075604}, doi = {10.1145/3067695.3075604}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/MakanjuZK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/YuanFKT17, author = {Ye Yuan and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-constrained implementation of lattice-based encryption scheme on standard Java Card}, booktitle = {2017 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017}, pages = {47--50}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HST.2017.7951796}, doi = {10.1109/HST.2017.7951796}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/YuanFKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/UchibayashiHHKA17, author = {Toshihiro Uchibayashi and Yuichi Hashi and Seira Hidano and Shinsaku Kiyomoto and Bernady O. Apduhan and Toru Abe and Takuo Suganuma and Masahiro Hiji}, editor = {Osvaldo Gervasi and Beniamino Murgante and Sanjay Misra and Giuseppe Borruso and Carmelo Maria Torre and Ana Maria A. C. Rocha and David Taniar and Bernady O. Apduhan and Elena N. Stankova and Alfredo Cuzzocrea}, title = {A Control Mechanism for Live Migration with Data Regulations Preservation}, booktitle = {Computational Science and Its Applications - {ICCSA} 2017 - 17th International Conference, Trieste, Italy, July 3-6, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10404}, pages = {509--522}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-62392-4\_37}, doi = {10.1007/978-3-319-62392-4\_37}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/UchibayashiHHKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BasuXCK17, author = {Anirban Basu and Rui Xu and Juan Camilo Corena and Shinsaku Kiyomoto}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Hypercubes and Private Information Retrieval}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {509--515}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_44}, doi = {10.1007/978-3-319-89500-0\_44}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/BasuXCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FukushimaHK17, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {White-box Implementation of Stream Cipher}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {263--269}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006115202630269}, doi = {10.5220/0006115202630269}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FukushimaHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KiyomotoBRR17, author = {Shinsaku Kiyomoto and Anirban Basu and Mohammad Shahriar Rahman and Sushmita Ruj}, title = {On blockchain-based authorization architecture for beyond-5G mobile services}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {136--141}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356363}, doi = {10.23919/ICITST.2017.8356363}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KiyomotoBRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/BasuRXFK17, author = {Anirban Basu and Mohammad Shahriar Rahman and Rui Xu and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Jan{-}Philipp Stegh{\"{o}}fer and Babak Esfandiari}, title = {VIGraph - {A} Framework for Verifiable Information}, booktitle = {Trust Management {XI} - 11th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {505}, pages = {12--20}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59171-1\_2}, doi = {10.1007/978-3-319-59171-1\_2}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BasuRXFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMBRK17, author = {Rui Xu and Kirill Morozov and Anirban Basu and Mohammad Shahriar Rahman and Shinsaku Kiyomoto}, editor = {Satoshi Obana and Koji Chida}, title = {Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {159--178}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_10}, doi = {10.1007/978-3-319-64200-0\_10}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMBRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/UchibayashiHHKS17, author = {Toshihiro Uchibayashi and Yuichi Hashi and Seira Hidano and Shinsaku Kiyomoto and Takuo Suganuma and Masahiro Hiji}, editor = {Leonard Barolli and Tomoya Enokido and Makoto Takizawa}, title = {Verification of Data Collection Methods for Live Migration Protection Mechanism}, booktitle = {Advances in Network-Based Information Systems, The 20th International Conference on Network-Based Information Systems, NBiS 2017, Ryerson University, Toronto, ON, Canada, August 24-26, 2017}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {7}, pages = {420--430}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65521-5\_36}, doi = {10.1007/978-3-319-65521-5\_36}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/UchibayashiHHKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/ThaoMRKK17, author = {Tran Phuong Thao and Atsuko Miyaji and Mohammad Shahriar Rahman and Shinsaku Kiyomoto and Ayumu Kubota}, editor = {Dong Seong Kim and Masato Kitakami and Vijay Varadharajan}, title = {Robust {ORAM:} Enhancing Availability, Confidentiality and Integrity}, booktitle = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017}, pages = {30--39}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PRDC.2017.14}, doi = {10.1109/PRDC.2017.14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prdc/ThaoMRKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/RahmanBK17, author = {Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto}, editor = {Dong Seong Kim and Masato Kitakami and Vijay Varadharajan}, title = {Towards Outsourced Privacy-Preserving Multiparty {DBSCAN}}, booktitle = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing, {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017}, pages = {225--226}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PRDC.2017.42}, doi = {10.1109/PRDC.2017.42}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/prdc/RahmanBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HidanoMKKH17, author = {Seira Hidano and Takao Murakami and Shuichi Katsumata and Shinsaku Kiyomoto and Goichiro Hanaoka}, title = {Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {115--126}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00023}, doi = {10.1109/PST.2017.00023}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/HidanoMKKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AttrapadungHKMS17, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Shinsaku Kiyomoto and Tomoaki Mimoto and Jacob C. N. Schuldt}, title = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00033}, doi = {10.1109/PST.2017.00033}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AttrapadungHKMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/KiyomotoRB17, author = {Shinsaku Kiyomoto and Mohammad Shahriar Rahman and Anirban Basu}, editor = {Liz Bacon and Jixin Ma and Lachlan M. MacKinnon}, title = {On blockchain-based anonymized dataset distribution platform}, booktitle = {15th {IEEE} International Conference on Software Engineering Research, Management and Applications, {SERA} 2017, London, United Kingdom, June 7-9, 2017}, pages = {85--92}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SERA.2017.7965711}, doi = {10.1109/SERA.2017.7965711}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sera/KiyomotoRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/OmarRBK17, author = {Abdullah Al Omar and Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto}, editor = {Guojun Wang and Mohammed Atiquzzaman and Zheng Yan and Kim{-}Kwang Raymond Choo}, title = {MediBchain: {A} Blockchain Based Privacy Preserving Platform for Healthcare Data}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10658}, pages = {534--543}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72395-2\_49}, doi = {10.1007/978-3-319-72395-2\_49}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/OmarRBK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MimotoKTM17, author = {Tomoaki Mimoto and Shinsaku Kiyomoto and Katsuya Tanaka and Atsuko Miyaji}, title = {(p, N)-identifiability: Anonymity under Practical Adversaries}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {996--1003}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.343}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.343}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/MimotoKTM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaXKH17, author = {Kazuhide Fukushima and Rui Xu and Shinsaku Kiyomoto and Naofumi Homma}, title = {Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1032--1037}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.348}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.348}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaXKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/MakanjuK17, author = {Adetokunbo Makanju and Shinsaku Kiyomoto}, title = {Diversification of Autonomous Vehicle Driving Behavior}, booktitle = {86th {IEEE} Vehicular Technology Conference, {VTC} Fall 2017, Toronto, ON, Canada, September 24-27, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/VTCFall.2017.8288316}, doi = {10.1109/VTCFALL.2017.8288316}, timestamp = {Mon, 20 Dec 2021 11:29:16 +0100}, biburl = {https://dblp.org/rec/conf/vtc/MakanjuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnc/YuanCKMT16, author = {Ye Yuan and Chen{-}Mou Cheng and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Portable Implementation of Lattice-based Cryptography using JavaScript}, journal = {Int. J. Netw. Comput.}, volume = {6}, number = {2}, pages = {309--327}, year = {2016}, url = {http://www.ijnc.org/index.php/ijnc/article/view/130}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnc/YuanCKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/RahmanK16, author = {Mohammad Shahriar Rahman and Shinsaku Kiyomoto}, editor = {Zhipeng Cai and Rafal A. Angryk and Wen{-}Zhan Song and Yingshu Li and Xiaojun Cao and Anu G. Bourgeois and Guangchun Luo and Liang Cheng and Bhaskar Krishnamachari}, title = {Secure Bike Sharing System for Multi-Modal Journey}, booktitle = {2016 {IEEE} International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom), BDCloud-SocialCom-SustainCom 2016, Atlanta, GA, USA, October 8-10, 2016}, pages = {437--444}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BDCloud-SocialCom-SustainCom.2016.71}, doi = {10.1109/BDCLOUD-SOCIALCOM-SUSTAINCOM.2016.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bdcloud/RahmanK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/HashiUHKBSH16, author = {Yuichi Hashi and Toshihiro Uchibayashi and Seira Hidano and Shinsaku Kiyomoto and Abdur Rahim Biswas and Takuo Suganuma and Masahiro Hiji}, title = {Data Protection for Cross-Border Live Migration in Multi-cloud Environment}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {681--685}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CANDAR.2016.0122}, doi = {10.1109/CANDAR.2016.0122}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic-nc/HashiUHKBSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakamuraKTS16a, author = {Toru Nakamura and Shinsaku Kiyomoto and Welderufael B. Tesfay and Jetzabel M. Serna}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Easing the Burden of Setting Privacy Preferences: {A} Machine Learning Approach}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {44--63}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_4}, doi = {10.1007/978-3-319-54433-5\_4}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakamuraKTS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NakamuraKTS16, author = {Toru Nakamura and Shinsaku Kiyomoto and Welderufael B. Tesfay and Jetzabel M. Serna}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Personalised Privacy by Default Preferences - Experiment and Analysis}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {53--62}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005681100530062}, doi = {10.5220/0005681100530062}, timestamp = {Mon, 30 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/NakamuraKTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/Basu0RK16, author = {Anirban Basu and Stephen Marsh and Mohammad Shahriar Rahman and Shinsaku Kiyomoto}, editor = {Sheikh Mahbub Habib and Julita Vassileva and Sjouke Mauw and Max M{\"{u}}hlh{\"{a}}user}, title = {A Model for Personalised Perception of Policies}, booktitle = {Trust Management {X} - 10th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {473}, pages = {52--62}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41354-9\_4}, doi = {10.1007/978-3-319-41354-9\_4}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/Basu0RK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/HidanoKBUS16, author = {Seira Hidano and Shinsaku Kiyomoto and Abdur Rahim Biswas and Toshihiro Uchibayashi and Takuo Suganuma}, editor = {Ilsun You and Fang{-}Yie Leu and Hsing{-}Chung Chen and Igor V. Kotenko}, title = {Access Control for Cross-Border Transfer of Sensor Data}, booktitle = {Mobile Internet Security - First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {797}, pages = {143--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-7850-7\_13}, doi = {10.1007/978-981-10-7850-7\_13}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec2/HidanoKBUS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BasuXRK16, author = {Anirban Basu and Rui Xu and Mohammad Shahriar Rahman and Shinsaku Kiyomoto}, title = {User-in-a-context: {A} blueprint for context-aware identification}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {329--334}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906982}, doi = {10.1109/PST.2016.7906982}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/BasuXRK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TschersichKPNBT16, author = {Markus Tschersich and Shinsaku Kiyomoto and Sebastian Pape and Toru Nakamura and G{\"{o}}khan Bal and Haruo Takasaki and Kai Rannenberg}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {On Gender Specific Perception of Data Sharing in Japan}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {150--160}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_11}, doi = {10.1007/978-3-319-33630-5\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/TschersichKPNBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaHK16, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Sensor-based Wearable {PUF}}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {207--214}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005946702070214}, doi = {10.5220/0005946702070214}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MimotoBK16, author = {Tomoaki Mimoto and Anirban Basu and Shinsaku Kiyomoto}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {411--418}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005963804110418}, doi = {10.5220/0005963804110418}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MimotoBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BasuKV016, author = {Anirban Basu and Shinsaku Kiyomoto and Jaideep Vaidya and Stephen Marsh}, title = {PrefRank: Quantification and Aggregation of Subjective User Preferences}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {7--13}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0039}, doi = {10.1109/TRUSTCOM.2016.0039}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BasuKV016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16, author = {Kazuhide Fukushima and Youssef Souissi and Seira Hidano and Robert Nguyen and Jean{-}Luc Danger and Sylvain Guilley and Yuto Nakano and Shinsaku Kiyomoto and Laurent Sauvage}, title = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {201--207}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0064}, doi = {10.1109/TRUSTCOM.2016.0064}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanBK16, author = {Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto}, title = {Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1759--1764}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0270}, doi = {10.1109/TRUSTCOM.2016.0270}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanEK16, author = {Mohammad Shahriar Rahman and Keita Emura and Shinsaku Kiyomoto}, title = {On the Leakage Resilient Cryptography in Game-Theoretic Settings}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {1984--1989}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0303}, doi = {10.1109/TRUSTCOM.2016.0303}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanEK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KiyomotoNTH15, author = {Shinsaku Kiyomoto and Toru Nakamura and Haruo Takasaki and Tatsuhiko Hirabayashi}, title = {Personal Agent for Services in {ITS}}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {493--500}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.16}, doi = {10.1109/ARES.2015.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasuCVCKSM15, author = {Anirban Basu and Juan Camilo Corena and Jaideep Vaidya and Jon Crowcroft and Shinsaku Kiyomoto and Yung Shin Van Der Sype and Yutaka Miyake}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Practical Private One-way Anonymous Message Routing}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {665}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714641}, doi = {10.1145/2714576.2714641}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasuCVCKSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcomp/HidanoKMVM15, author = {Seira Hidano and Shinsaku Kiyomoto and Yosuke Murakami and Panagiotis Vlacheas and Klaus Moessner}, editor = {Yin Zhang and Limei Peng and Chan{-}Hyun Youn}, title = {Design of a Security Gateway for iKaaS Platform}, booktitle = {Cloud Computing - 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {167}, pages = {323--333}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38904-2\_34}, doi = {10.1007/978-3-319-38904-2\_34}, timestamp = {Sat, 05 Sep 2020 17:58:59 +0200}, biburl = {https://dblp.org/rec/conf/cloudcomp/HidanoKMVM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/YuanCKMT15, author = {Ye Yuan and Chen{-}Mou Cheng and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Portable Implementation of Lattice-Based Cryptography Using JavaScript}, booktitle = {Third International Symposium on Computing and Networking, {CANDAR} 2015, Sapporo, Hokkaido, Japan, December 8-11, 2015}, pages = {58--67}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CANDAR.2015.36}, doi = {10.1109/CANDAR.2015.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/YuanCKMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/BasuCVCKMSN15, author = {Anirban Basu and Juan Camilo Corena and Jaideep Vaidya and Jon Crowcroft and Shinsaku Kiyomoto and Stephen Marsh and Yung Shin Van Der Sype and Toru Nakamura}, editor = {Christian Damsgaard Jensen and Stephen Marsh and Theo Dimitrakos and Yuko Murayama}, title = {Lightweight Practical Private One-Way Anonymous Messaging}, booktitle = {Trust Management {IX} - 9th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {454}, pages = {76--91}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18491-3\_6}, doi = {10.1007/978-3-319-18491-3\_6}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BasuCVCKMSN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/RahmanBK15, author = {Mohammad Shahriar Rahman and Anirban Basu and Shinsaku Kiyomoto}, title = {Privacy-friendly secure bidding scheme for demand response in smart grid}, booktitle = {{IEEE} First International Smart Cities Conference, {ISC2} 2015, Guadalajara, Mexico, October 25-28, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ISC2.2015.7366208}, doi = {10.1109/ISC2.2015.7366208}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isc2/RahmanBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isica/HidanoPK15, author = {Seira Hidano and Martin Pecovsk{\'{y}} and Shinsaku Kiyomoto}, editor = {Kangshun Li and Jin Li and Yong Liu and Aniello Castiglione}, title = {New Security Challenges in the 5G Network}, booktitle = {Computational Intelligence and Intelligent Systems - 7th International Symposium, {ISICA} 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {575}, pages = {619--630}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-981-10-0356-1\_64}, doi = {10.1007/978-981-10-0356-1\_64}, timestamp = {Thu, 20 Apr 2023 17:39:50 +0200}, biburl = {https://dblp.org/rec/conf/isica/HidanoPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BasuNHK15, author = {Anirban Basu and Toru Nakamura and Seira Hidano and Shinsaku Kiyomoto}, title = {k-anonymity: Risks and the Reality}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {983--989}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.473}, doi = {10.1109/TRUSTCOM.2015.473}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BasuNHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KiyomotoNM15, author = {Shinsaku Kiyomoto and Toru Nakamura and Yutaka Miyake}, title = {Towards Tracing of k-Anonymized Datasets}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1237--1242}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.511}, doi = {10.1109/TRUSTCOM.2015.511}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/KiyomotoNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wf-iot/NeisseBSMKB15, author = {Ricardo Neisse and Gianmarco Baldini and Gary Steri and Yutaka Miyake and Shinsaku Kiyomoto and Abdur Rahim Biswas}, title = {An agent-based framework for Informed Consent in the internet of things}, booktitle = {2nd {IEEE} World Forum on Internet of Things, WF-IoT 2015, Milan, Italy, December 14-16, 2015}, pages = {789--794}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WF-IoT.2015.7389154}, doi = {10.1109/WF-IOT.2015.7389154}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wf-iot/NeisseBSMKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HidanoK15, author = {Seira Hidano and Shinsaku Kiyomoto}, editor = {Howon Kim and Dooho Choi}, title = {On Partitioning Secret Data Based on Concept of Functional Safety}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {110--121}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_10}, doi = {10.1007/978-3-319-31875-2\_10}, timestamp = {Thu, 02 Mar 2023 10:53:05 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HidanoK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakanoFKIMTS14, author = {Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsukasa Ishiguro and Yutaka Miyake and Toshiaki Tanaka and Kouichi Sakurai}, title = {Fast Implementation of KCipher-2 for Software and Hardware}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {1}, pages = {43--52}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.43}, doi = {10.1587/TRANSINF.E97.D.43}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoFKIMTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HibikiHNFKMA14, author = {Takafumi Hibiki and Naofumi Homma and Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Takafumi Aoki}, title = {Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {157--166}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.157}, doi = {10.1587/TRANSFUN.E97.A.157}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/HibikiHNFKMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakanoKMS14, author = {Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, title = {Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {10}, pages = {2576--2585}, year = {2014}, url = {https://doi.org/10.1587/transinf.2013THP0007}, doi = {10.1587/TRANSINF.2013THP0007}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoKMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/KiyomotoFM14, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, title = {Security issues on {IT} systems during disasters: a survey}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {5}, number = {2}, pages = {173--185}, year = {2014}, url = {https://doi.org/10.1007/s12652-013-0177-8}, doi = {10.1007/S12652-013-0177-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/KiyomotoFM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KiyomotoM14, author = {Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {PrivacyFrost2: {A} Efficient Data Anonymization Tool Based on Scoring Functions}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {211--225}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_16}, doi = {10.1007/978-3-319-10975-6\_16}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/CorenaBKMO14, author = {Juan Camilo Corena and Anirban Basu and Shinsaku Kiyomoto and Yutaka Miyake and Tomoaki Ohtsuki}, title = {{XOR} network coding pollution prevention without homomorphic functions}, booktitle = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2014, Las Vegas, NV, USA, January 10-13, 2014}, pages = {293--300}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CCNC.2014.6866586}, doi = {10.1109/CCNC.2014.6866586}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/CorenaBKMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/BasuCMPGKVM14, author = {Anirban Basu and Juan Camilo Corena and Anna Monreale and Dino Pedreschi and Fosca Giannotti and Shinsaku Kiyomoto and Jaideep Vaidya and Yutaka Miyake}, title = {CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud}, booktitle = {{IEEE} 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014, Singapore, December 15-18, 2014}, pages = {731--734}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CloudCom.2014.114}, doi = {10.1109/CLOUDCOM.2014.114}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/BasuCMPGKVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/CorenaBNKM14, author = {Juan Camilo Corena and Anirban Basu and Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Data Storage on the Cloud under User Control}, booktitle = {{IEEE} 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014, Singapore, December 15-18, 2014}, pages = {739--742}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CloudCom.2014.113}, doi = {10.1109/CLOUDCOM.2014.113}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/CorenaBNKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/NakanoBKM14, author = {Yuto Nakano and Anirban Basu and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Javier L{\'{o}}pez and Indrajit Ray and Bruno Crispo}, title = {Key Extraction Attack Using Statistical Analysis of Memory Dump Data}, booktitle = {Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8924}, pages = {239--246}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17127-2\_17}, doi = {10.1007/978-3-319-17127-2\_17}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/NakanoBKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CorenaBKMO14, author = {Juan Camilo Corena and Anirban Basu and Shinsaku Kiyomoto and Yutaka Miyake and Tomoaki Ohtsuki}, title = {Beyond proofs of data possession: Finding defective blocks in outsourced storage}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin, TX, USA, December 8-12, 2014}, pages = {2381--2386}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GLOCOM.2014.7037164}, doi = {10.1109/GLOCOM.2014.7037164}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CorenaBKMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/BasuMCGPKMYT14, author = {Anirban Basu and Anna Monreale and Juan Camilo Corena and Fosca Giannotti and Dino Pedreschi and Shinsaku Kiyomoto and Yutaka Miyake and Tadashi Yanagihara and Roberto Trasarti}, editor = {Jianying Zhou and Nurit Gal{-}Oz and Jie Zhang and Ehud Gudes}, title = {A Privacy Risk Model for Trajectory Data}, booktitle = {Trust Management {VIII} - 8th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2014, Singapore, July 7-10, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {430}, pages = {125--140}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43813-8\_9}, doi = {10.1007/978-3-662-43813-8\_9}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BasuMCGPKMYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/KiyomotoM14, author = {Shinsaku Kiyomoto and Yutaka Miyake}, title = {How to Find an Appropriate {K} for K-Anonymization}, booktitle = {Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United Kingdom, 2-4 July, 2014}, pages = {273--279}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IMIS.2014.34}, doi = {10.1109/IMIS.2014.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/KiyomotoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshiguroKMT14, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, editor = {Hugo Krawczyk}, title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} Challenge over a 128-Dimensional Ideal Lattice}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {411--428}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_24}, doi = {10.1007/978-3-642-54631-0\_24}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IshiguroKMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BasuCKVMM14, author = {Anirban Basu and Juan Camilo Corena and Shinsaku Kiyomoto and Jaideep Vaidya and Stephen Marsh and Yutaka Miyake}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {PrefRank: fair aggregation of subjective user preferences}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {287--288}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2555084}, doi = {10.1145/2554850.2555084}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BasuCKVMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BasuCKMVG0M14, author = {Anirban Basu and Juan Camilo Corena and Shinsaku Kiyomoto and Stephen Marsh and Jaideep Vaidya and Guibing Guo and Jie Zhang and Yutaka Miyake}, editor = {Yookun Cho and Sung Y. Shin and Sang{-}Wook Kim and Chih{-}Cheng Hung and Jiman Hong}, title = {Privacy preserving trusted social feedback}, booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014}, pages = {1706--1711}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554850.2554860}, doi = {10.1145/2554850.2554860}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BasuCKMVG0M14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CorenaBNKM14, author = {Juan Camilo Corena and Anirban Basu and Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {307--314}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005049803070314}, doi = {10.5220/0005049803070314}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CorenaBNKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NakanoSNSDGKM14, author = {Yuto Nakano and Youssef Souissi and Robert Nguyen and Laurent Sauvage and Jean{-}Luc Danger and Sylvain Guilley and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {David Naccache and Damien Sauveron}, title = {A Pre-processing Composition for Secret Key Recovery on Android Smartphone}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {76--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_6}, doi = {10.1007/978-3-662-43826-8\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wistp/NakanoSNSDGKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KiyomotoNTWM13, author = {Shinsaku Kiyomoto and Toru Nakamura and Haruo Takasaki and Ryu Watanabe and Yutaka Miyake}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {{PPM:} Privacy Policy Manager for Personalized Services}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {377--392}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_26}, doi = {10.1007/978-3-642-40588-4\_26}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoNTWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HibikiHNFKMA13, author = {Takafumi Hibiki and Naofumi Homma and Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Takafumi Aoki}, editor = {Emmanuel Prouff}, title = {Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {169--183}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_11}, doi = {10.1007/978-3-642-40026-1\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HibikiHNFKMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JiaAFBSFKM13, author = {Limin Jia and Jassim Aljuraidan and Elli Fragkaki and Lujo Bauer and Michael Stroucken and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract)}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {775--792}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_43}, doi = {10.1007/978-3-642-40203-6\_43}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JiaAFBSFKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IshiguroKM13, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Pierangela Samarati}, title = {A Key-revocable Attribute-based Encryption for Mobile Cloud Environments}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {51--61}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223155/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IshiguroKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13, author = {Shinsaku Kiyomoto and Andre Rein and Yuto Nakano and Carsten Rudolph and Yutaka Miyake}, editor = {Pierangela Samarati}, title = {{LMM} - {A} Common Component for Software License Management on Cloud}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {284--295}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223177/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoRNRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HenricksenK13, author = {Matt Henricksen and Shinsaku Kiyomoto}, editor = {Pierangela Samarati}, title = {{AVON} - {A} Fast Hash Function for Intel {SIMD} Architectures}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {482--487}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223203/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HenricksenK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NakamuraKWM13, author = {Toru Nakamura and Shinsaku Kiyomoto and Ryu Watanabe and Yutaka Miyake}, title = {{P3MCF:} Practical Privacy-Preserving Multi-domain Collaborative Filtering}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {354--361}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.271}, doi = {10.1109/TRUSTCOM.2013.271}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NakamuraKWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshiguroKMT13, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} in the Ideal Lattice of 128 dimensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2013}, url = {http://eprint.iacr.org/2013/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshiguroKMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc7008, author = {Shinsaku Kiyomoto and Wook Shin}, title = {A Description of the KCipher-2 Encryption Algorithm}, journal = {{RFC}}, volume = {7008}, pages = {1--37}, year = {2013}, url = {https://doi.org/10.17487/RFC7008}, doi = {10.17487/RFC7008}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc7008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FukushimaKM12, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Software Protection Combined with Tamper-Proof Device}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {213--222}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.213}, doi = {10.1587/TRANSFUN.E95.A.213}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/FukushimaKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, title = {Design of Categorization Mechanism for Disaster-Information-Gathering System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {21--34}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.021}, doi = {10.22667/JOWUA.2012.12.31.021}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Gerald Quirchmayr and Josef Basl and Ilsun You and Lida Xu and Edgar R. Weippl}, title = {Security-and-Privacy-Related Issues on {IT} Systems During Disasters}, booktitle = {Multidisciplinary Research and Practice for Information Systems - {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, {CD-ARES} 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7465}, pages = {445--459}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32498-7\_33}, doi = {10.1007/978-3-642-32498-7\_33}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/NakanoCKM12, author = {Yuto Nakano and Carlos Cid and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Stefan Mangard}, title = {Memory Access Pattern Protection for Resource-Constrained Devices}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {188--202}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_13}, doi = {10.1007/978-3-642-37288-9\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/NakanoCKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KiyomotoMT12, author = {Shinsaku Kiyomoto and Yutaka Miyake and Toshiaki Tanaka}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {1755--1762}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.214}, doi = {10.1109/TRUSTCOM.2012.214}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KiyomotoMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Privacy Preservation of User History Graph}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {87--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_9}, doi = {10.1007/978-3-642-30955-7\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/FukushimaKM11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Towards Secure Cloud Computing Architecture - {A} Solution Based on Software Protection Mechanism}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {1}, pages = {4--17}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.05.31.004}, doi = {10.22667/JISIS.2011.05.31.004}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/FukushimaKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiyomotoM11, author = {Shinsaku Kiyomoto and Keith M. Martin}, title = {Model for a Common Notion of Privacy Leakage on Public Database}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {50--62}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.050}, doi = {10.22667/JOWUA.2011.03.31.050}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiyomotoM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/ShinFKM11, author = {Wook Shin and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {{AMY:} Use your cell phone to create a protected personal network over devices}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {57}, number = {1}, pages = {99--104}, year = {2011}, url = {https://doi.org/10.1109/TCE.2011.5735487}, doi = {10.1109/TCE.2011.5735487}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/ShinFKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KiyomotoMT11, author = {Shinsaku Kiyomoto and Yutaka Miyake and Toshiaki Tanaka}, title = {Privacy Frost: {A} User-Oriented Data Anonymization Tool}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {442--447}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.68}, doi = {10.1109/ARES.2011.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NakanoCFK11, author = {Yuto Nakano and Carlos Cid and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Analysis of Message Injection in Stream Cipher-Based Hash Functions}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {498--513}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_29}, doi = {10.1007/978-3-642-21554-4\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NakanoCFK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KiyomotoFM11, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Wai{-}Chi Fang and L. Javier Garc{\'{\i}}a{-}Villalba and Kirk P. Arnett and Muhammad Khurram Khan}, title = {Data Anonymity in Multi-Party Service Model}, booktitle = {Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {259}, pages = {21--30}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27189-2\_3}, doi = {10.1007/978-3-642-27189-2\_3}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KiyomotoFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/FukushimaKMS11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, editor = {Mohammad S. Obaidat and Jos{\'{e}} Luis Sevillano and Joaquim Filipe}, title = {Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme}, booktitle = {E-Business and Telecommunications - International Joint Conference, {ICETE} 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {314}, pages = {233--248}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35755-8\_17}, doi = {10.1007/978-3-642-35755-8\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/FukushimaKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/IshiguroKM11, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Sihan Qing and Willy Susilo and Guilin Wang and Dongmei Liu}, title = {Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha}, booktitle = {Information and Communications Security - 13th International Conference, {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7043}, pages = {255--266}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25243-3\_21}, doi = {10.1007/978-3-642-25243-3\_21}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/IshiguroKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/KiyomotoM11, author = {Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {On Data Importance Analysis}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {628--633}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.127}, doi = {10.1109/INCOS.2011.127}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/KiyomotoM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiyomotoHYNF11, author = {Shinsaku Kiyomoto and Matthew Henricksen and Wun{-}She Yap and Yuto Nakano and Kazuhide Fukushima}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {{MASHA} - Low Cost Authentication with a New Stream Cipher}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {63--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_5}, doi = {10.1007/978-3-642-24861-0\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiyomotoHYNF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/OtaKM11, author = {Haruki Ota and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Automatic security verification for 3-party authentication and key exchange protocols}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {254--258}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6060010}, doi = {10.1109/ICNSS.2011.6060010}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/nss/OtaKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaKMS11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--49}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FukushimaKTS10, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, title = {Improved Subset Difference Method with Ternary Tree}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {11}, pages = {2034--2044}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.2034}, doi = {10.1587/TRANSFUN.E93.A.2034}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FukushimaKTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HenricksenYYKT10, author = {Matthew Henricksen and Wun{-}She Yap and Chee Hoo Yian and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Side-Channel Analysis of the {K2} Stream Cipher}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {53--73}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_4}, doi = {10.1007/978-3-642-14081-5\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HenricksenYYKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/OtaKT10, author = {Haruki Ota and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Security Verification for Authentication and Key Exchange Protocols, Revisited}, booktitle = {24th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13 April 2010}, pages = {226--233}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WAINA.2010.43}, doi = {10.1109/WAINA.2010.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/OtaKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/KiyomotoM10, author = {Shinsaku Kiyomoto and Keith M. Martin}, title = {Towards a Common Notion of Privacy Leakage on Public Database}, booktitle = {Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, {BWCCA} 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)}, pages = {186--191}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/BWCCA.2010.69}, doi = {10.1109/BWCCA.2010.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bwcca/KiyomotoM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ShinKFT10, author = {Wook Shin and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {323--329}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ShinKFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KiyomotoT10, author = {Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Ana R. Cavalli and Jean Leneutre}, title = {A User-Oriented Anonymization Mechanism for Public Data}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, {DPM} 2010 and 3rd International Workshop, {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6514}, pages = {22--35}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19348-4\_3}, doi = {10.1007/978-3-642-19348-4\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KiyomotoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/NakanoKKT10, author = {Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Stream Cipher-Based Hash Function and Its Security}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {188--202}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_12}, doi = {10.1007/978-3-642-25206-8\_12}, timestamp = {Sat, 19 Oct 2019 20:35:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/NakanoKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IyamaKFTT10, author = {Tadashi Iyama and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Tsuyoshi Takagi}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Efficient Implementation of Pairing on {BREW} Mobile Phones}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {326--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_22}, doi = {10.1007/978-3-642-16825-3\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IyamaKFTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ShinKKFT10, author = {Wook Shin and Sanghoon Kwak and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A Small But Non-negligible Flaw in the Android Permission Scheme}, booktitle = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010}, pages = {107--110}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/POLICY.2010.11}, doi = {10.1109/POLICY.2010.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/ShinKKFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NakanoKKT10, author = {Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {On a Construction of Stream-cipher-based Hash Functions}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {334--343}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/NakanoKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/ShinKFT10, author = {Wook Shin and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {944--951}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.140}, doi = {10.1109/SOCIALCOM.2010.140}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/ShinKFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KiyomotoFT09, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {Design of Anonymous Attribute Authentication Mechanism}, journal = {{IEICE} Trans. Commun.}, volume = {92-B}, number = {4}, pages = {1112--1118}, year = {2009}, url = {https://doi.org/10.1587/transcom.E92.B.1112}, doi = {10.1587/TRANSCOM.E92.B.1112}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KiyomotoFT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KuriharaKFT09, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A Fast (\emph{k}, \emph{L}, \emph{n})-Threshold Ramp Secret Sharing Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {1808--1821}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1808}, doi = {10.1587/TRANSFUN.E92.A.1808}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KuriharaKFT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/FukushimaKT09, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Obfuscation Mechanism in Conjunction with Tamper-Proof Module}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {665--670}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.20}, doi = {10.1109/CSE.2009.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/FukushimaKT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KiyomotoFM09, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Keith M. Martin}, editor = {Mohammad S. Obaidat and Joaquim Filipe}, title = {Offline Peer-to-Peer Broadcast with Anonymity}, booktitle = {e-Business and Telecommunications - 6th International Joint Conference, {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {130}, pages = {174--185}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-20077-9\_12}, doi = {10.1007/978-3-642-20077-9\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/KiyomotoFM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CidKK09, author = {Carlos Cid and Shinsaku Kiyomoto and Jun Kurihara}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {The rakaposhi Stream Cipher}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {32--46}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_5}, doi = {10.1007/978-3-642-11145-7\_5}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CidKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ShinGKFT09, author = {Wook Shin and Carl A. Gunter and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {How to Bootstrap Security for Ad-Hoc Network: Revisited}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {119--131}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_11}, doi = {10.1007/978-3-642-01244-0\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ShinGKFT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoFM09, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Keith M. Martin}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Offline Peer-to-peer Broadcasting Scheme with Anonymity}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {75--82}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoFM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KiyomotoMF09, author = {Shinsaku Kiyomoto and Keith M. Martin and Kazuhide Fukushima}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Privacy-Aware Location Database Service for Granular Queries}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {28--37}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_3}, doi = {10.1007/978-3-642-03944-7\_3}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KiyomotoMF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KuriharaKFT08, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A Fast (3, \emph{n})-Threshold Secret Sharing Scheme Using Exclusive-OR Operations}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {127--138}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.127}, doi = {10.1093/IETFEC/E91-A.1.127}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KuriharaKFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FukushimaKTS08, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, title = {Analysis of Program Obfuscation Schemes with Variable Encoding Technique}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {316--329}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.316}, doi = {10.1093/IETFEC/E91-A.1.316}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FukushimaKTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoshitomiTKT08, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {5}, pages = {1330--1337}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.5.1330}, doi = {10.1093/IETISY/E91-D.5.1330}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoshitomiTKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KuriharaKFT08a, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {On a Fast (\emph{k, n})-Threshold Secret Sharing Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2365--2378}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2365}, doi = {10.1093/IETFEC/E91-A.9.2365}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KuriharaKFT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/FukushimaKTS08, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, title = {Optimization of Group Key Management Structure with a Client Join-Leave Mechanism}, journal = {J. Inf. Process.}, volume = {16}, pages = {130--141}, year = {2008}, url = {https://doi.org/10.2197/ipsjjip.16.130}, doi = {10.2197/IPSJJIP.16.130}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/FukushimaKTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/KiyomotoOT08, author = {Shinsaku Kiyomoto and Haruki Ota and Toshiaki Tanaka}, editor = {Jos{\'{e}} Cordeiro and Joaquim Filipe}, title = {On-the-Fly Automatic Generation of Security Protocols}, booktitle = {{ICEIS} 2008 - Proceedings of the Tenth International Conference on Enterprise Information Systems, Volume ISAS-2, Barcelona, Spain, June 12-16, 2008}, pages = {97--104}, year = {2008}, timestamp = {Mon, 15 Jun 2015 19:00:08 +0200}, biburl = {https://dblp.org/rec/conf/iceis/KiyomotoOT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KiyomotoT08, author = {Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Anonymous attribute authentication scheme using self-blindable certificates}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {215--217}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565060}, doi = {10.1109/ISI.2008.4565060}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/KiyomotoT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KuriharaKFT08, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {455--470}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_31}, doi = {10.1007/978-3-540-85886-7\_31}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KuriharaKFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoTS08, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {FPGA-Targeted Hardware Implementations of {K2}}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {270--277}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:20:36 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FukushimaKTS08, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Ternary Subset Difference Method and Its Quantitative Analysis}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {225--239}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_17}, doi = {10.1007/978-3-642-00306-6\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FukushimaKTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuriharaKFT08, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2008}, url = {http://eprint.iacr.org/2008/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuriharaKFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OtaYKTO07, author = {Haruki Ota and Kazuki Yoneyama and Shinsaku Kiyomoto and Toshiaki Tanaka and Kazuo Ohta}, title = {Universally Composable Hierarchical Hybrid Authenticated Key Exchange}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {139--151}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.139}, doi = {10.1093/IETFEC/E90-A.1.139}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OtaYKTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KiyomotoFTS07, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Kouichi Sakurai}, title = {On Effectiveness of Clock Control in Stream Ciphers}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {9}, pages = {1780--1787}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.9.1780}, doi = {10.1093/IETFEC/E90-A.9.1780}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KiyomotoFTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/KiyomotoTMM07, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Yutaka Miyake and Yoshinori Mitamura}, title = {Development of security functions for a medical information sharing platform}, journal = {Syst. Comput. Jpn.}, volume = {38}, number = {11}, pages = {49--63}, year = {2007}, url = {https://doi.org/10.1002/scj.20466}, doi = {10.1002/SCJ.20466}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/KiyomotoTMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KiyomotoTS07, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, editor = {Joaquim Filipe and Mohammad S. Obaidat}, title = {{K2} Stream Cipher}, booktitle = {E-business and Telecommunications - 4th International Conference, {ICETE} 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {23}, pages = {214--226}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88653-2\_16}, doi = {10.1007/978-3-540-88653-2\_16}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/KiyomotoTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoTS07, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {{K2:} {A} Stream Cipher Algorithm using Dynamic Feedback Control}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {204--213}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YoshitomiTKT07, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {203--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_15}, doi = {10.1007/978-3-540-77535-5\_15}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YoshitomiTKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoshitomiTKT07, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Efficient Implementation of the Pairing on Mobilephones using {BREW}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2007}, url = {http://eprint.iacr.org/2007/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoshitomiTKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KiyomotoT06, author = {Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {222--226}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.222}, doi = {10.1093/IETFEC/E89-A.1.222}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KiyomotoT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/FukushimaKT06, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services}, booktitle = {7th International Conference on Mobile Data Management {(MDM} 2006), Nara, Japan, May 9-13, 2006}, pages = {17}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MDM.2006.83}, doi = {10.1109/MDM.2006.83}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/FukushimaKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OtaKT05, author = {Haruki Ota and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {287--295}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_287\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OtaKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KiyomotoTS05, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, title = {Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {10}, pages = {2778--2791}, year = {2005}, url = {https://doi.org/10.1093/ietfec/e88-a.10.2778}, doi = {10.1093/IETFEC/E88-A.10.2778}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KiyomotoTS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamadaKTN04, author = {Akira Yamada and Shinsaku Kiyomoto and Toshiaki Tanaka and Koji Nakao}, title = {New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {182--189}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_182\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/YamadaKTN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KurodaYOKT04, author = {Masahiro Kuroda and Mariko Yoshida and Ryoji Ono and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Secure Service and Network Framework for Mobile Ethernet}, journal = {Wirel. Pers. Commun.}, volume = {29}, number = {3-4}, pages = {161--190}, year = {2004}, url = {https://doi.org/10.1023/B:WIRE.0000047061.87235.8b}, doi = {10.1023/B:WIRE.0000047061.87235.8B}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KurodaYOKT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.