A New (k,n)-Threshold Secret Sharing Scheme and Its Extension J Kurihara, S Kiyomoto, K Fukushima, T Tanaka Information Security: 11th International Conference, ISC 2008, Taipei …, 2008 | 147 | 2008 |
An encryption-based access control framework for content-centric networking J Kurihara, E Uzun, CA Wood IFIP Networking Conference (IFIP Networking), 2015, 1-9, 2015 | 83 | 2015 |
On a fast (k, n)-threshold secret sharing scheme J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008 | 68 | 2008 |
Security vulnerabilities and solutions in mobile WiMAX A Deininger, S Kiyomoto, J Kurihara, T Tanaka IJCSNS International Journal of Computer Science and Network Security 7 (11 …, 2007 | 67 | 2007 |
Relative generalized rank weight of linear codes and its applications to network coding J Kurihara, R Matsumoto, T Uyematsu IEEE Transactions on Information Theory 61 (7), 3912-3936, 2013 | 60 | 2013 |
Secret sharing schemes based on linear codes can be precisely characterized by the relative generalized Hamming weight J Kurihara, T Uyematsu, R Matsumoto IEICE Transactions on Fundamentals of Electronics, Communications and …, 2012 | 51 | 2012 |
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE transactions on fundamentals of electronics, communications and …, 2008 | 50 | 2008 |
A fast (k, L, n)-threshold ramp secret sharing scheme J Kurihara, S Kiyomoto, K Fukushima, T Tanaka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2009 | 44 | 2009 |
Access control framework for information centric networking E Uzun, J Kurihara, CA Wood US Patent 9,552,493, 2017 | 42 | 2017 |
The rakaposhi Stream Cipher. C Cid, S Kiyomoto, J Kurihara ICICS 5927, 32-46, 2009 | 37 | 2009 |
A consumer-driven access control approach to censorship circumvention in content-centric networking J Kurihara, K Yokota, A Tagami Proceedings of the 3rd ACM Conference on Information-Centric Networking, 186-194, 2016 | 17 | 2016 |
Explicit construction of universal strongly secure network coding via MRD codes J Kurihara, T Uyematsu, R Matsumoto 2012 IEEE International Symposium on Information Theory Proceedings, 1483-1487, 2012 | 17 | 2012 |
Threshold secret sharing apparatus, threshold secret sharing scheme, secret information decryption method, and program for the same J Kurihara, S Kiyomoto, T Tanaka US Patent 8,275,124, 2012 | 14 | 2012 |
A novel realization of threshold schemes over binary field extensions J Kurihara, T Uyematsu IEICE Transactions on Fundamentals of Electronics, Communications and …, 2011 | 11 | 2011 |
New parameters of linear codes expressing security performance of universal secure network coding J Kurihara, T Uyematsu, R Matsumoto 2012 50th Annual Allerton Conference on Communication, Control, and …, 2012 | 10 | 2012 |
In-device proxy re-encryption service for information-centric networking access control K Suksomboon, A Tagami, A Basu, J Kurihara 2018 IEEE 43rd Conference on Local Computer Networks (LCN), 303-306, 2018 | 8 | 2018 |
Network coding for content-centric network J Kurihara, E Uzun, JJ Garcia-Luna-Aceves US Patent 9,497,282, 2016 | 7 | 2016 |
Rtt-based caching policies to improve user-centric performance in ccn K Yokota, K Sugiyama, J Kurihara, A Tagami 2016 IEEE 30th International Conference on Advanced Information Networking …, 2016 | 6 | 2016 |
Strongly-secure secret sharing based on linear codes can be characterized by generalized Hamming weight J Kurihara, T Uyematsu 2011 49th Annual Allerton Conference on Communication, Control, and …, 2011 | 6 | 2011 |
On a construction of stream-cipher-based hash functions Y Nakano, J Kurihara, S Kiyomoto, T Tanaka 2010 International Conference on Security and Cryptography (SECRYPT), 1-11, 2010 | 6 | 2010 |