scispace - formally typeset
S

Shinsaku Kiyomoto

Researcher at Kyushu University

Publications -  229
Citations -  2209

Shinsaku Kiyomoto is an academic researcher from Kyushu University. The author has contributed to research in topics: Encryption & Information privacy. The author has an hindex of 21, co-authored 214 publications receiving 1720 citations.

Papers
More filters
Journal ArticleDOI

Privacy-friendly platform for healthcare data in cloud based on blockchain environment

TL;DR: This paper presents a patient centric healthcare data management system using blockchain technology as storage which helps to attain privacy and analyzes the data processing procedures and the cost effectiveness of the smart contracts used in the system.
Book ChapterDOI

MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data

TL;DR: This paper presents a patient centric healthcare data management system by using Blockchain as storage to attain privacy by using the cryptographic functions to protect patient’s data.
Book ChapterDOI

A New (k,n)-Threshold Secret Sharing Scheme and Its Extension

TL;DR: Wang et al. as discussed by the authors proposed a new (k,n)-threshold secret sharing scheme, which uses just EXCLUSIVE-OR(XOR) operations to make shares and recover the secret.
Proceedings ArticleDOI

PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation

TL;DR: PrivacyGuide is a privacy policy summarization tool inspired by the European Union (EU) General Data Protection Regulation (GDPR) and based on machine learning and natural language processing techniques that is able to classify privacy policy content into eleven privacy aspects with a weighted average accuracy.
Proceedings ArticleDOI

A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework

TL;DR: This paper proposes a formal model of the Android permission scheme, and provides a state-based model which includes the behavior specification of permission authorization and the interactions between application components, and shows how it can logically confirm the security of the specified system.