Best Poster Award

  • *Ken Ichikawa and Kanta Matsuura, "Preventing execution of JIT shellcode by isolating running process"

  • *Kaori Tosu and Noboru Kunihiro, "Optimizing Bounds against Multi-Prime Phi-Hiding Problems"

  • *Yutaka Kawai, "Schnorr Signature May Not Be Secure under Several Diffie-Hellman Type Assumptions"

  • Takayuki Yamada, *Seiichi Gohshi, and *Isao Echizen, "Method for preventing illegal recording of displayed content based on differences in sensory perception between humans and devices"

Remarks:

  • Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.
  • '*'=Presenter(s).

IWSEC 2011 List of Posters

  1. Securing Biometric Identification with Image-Based Authentication
    *Takao Murakami, Kenta Takahashi, and Kanta Matsuura
  2. Some Experiments of Fingerprinting Attacks on Tor Anonymity System and Efficacy of Dummy-Packets Countermeasure
    *Ryo Hirafuji, *Kou Inagaki, *Hiroe Ishikawa, Takurou Hosoi, and Kanta Matsuura
  3. Technical Requirements toward Open Distribution of Honeypot Trace Data Aiming at Research Promotion
    *Takurou Hosoi and Kanta Matsuura
  4. Preventing execution of JIT shellcode by isolating running process
    *Ken Ichikawa and Kanta Matsuura
  5. Bots Detection Using Observation Sensors
    *Takayoshi Hojo and Kanta Matsuura
  6. Identification of applications in the encrypted tunnel
    *Le Ngoc Tu and Yasuhiro Nakamura
  7. Design and Development of Multi-purpose Cryptographic Platform toward Wider Deployment of Pairing-Based Cryptography
    *Satsuya Ohata, Toshiyuki Miyazawa, Tetsutaro Kobayashi, and Kanta Matsuura
  8. Interdependency of Information Security and Its Dependence on IS Multiplier of Sub-industries
    *Bongkot Jenjarrussakul, *Ryouta Hishiki, Hideyuki Tanaka, Kanta Matsuura, and Hideki Imai
  9. Optimizing Bounds against Multi-Prime Phi-Hiding Problems
    *Kaori Tosu and Noboru Kunihiro
  10. Entropy-Based Network Behavior Characterization and Bot Detection
    *Seiichiro Mizoguchi, Yoshiaki Hori, and Kouichi Sakurai
  11. Secure Anonymous Authentication Scheme based on Three Party Structure Using Non-Tamper-Resistant Smart Card
    *Ryoichi Isawa and Masakatu Morii
  12. Experiment of Person Behavior under Virus Infected Situation
    *Shun-ichi Kurino and Noriaki Yoshikai
  13. Schnorr Signature May Not Be Secure under Several Diffie-Hellman Type Assumptions
    *Yutaka Kawai
  14. Development of DF-Salvia which provides mandatory access control based on data flow
    *Takehiro Kashiyama, Tatsuya Oishi, Eiji Takimoto, and Koichi Mouri
  15. INFORMATION HIDING FOR DIGITAL IMAGE USING BETWEEN-CLASS VARIANCE
    *Kazuki Yamato, Madoka Hasegawa, Yuichi Tanaka, and Shigeo Kato
  16. Method for preventing illegal recording of displayed content based on differences in sensory perception between humans and devices
    Takayuki Yamada, *Seiichi Gohshi, and *Isao Echizen
  17. Fine-grained Access Control Framework in Android APIs
    *Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Jyunya Kani, Harunobu Agematsu, and Masakatsu Nishigaki
  18. STUDY ON POSITION OF ACCELEROMETER SENSOR FOR GAIT AUTHENTICATION
    *Dai Higuchi, Madoka Hasegawa, Yuichi Tanaka, and Shigeo Kato
  19. Effcient Implementation of the EtaT Pairing on GPU
    *Yosuke Katoh, Chen-Mou Cheng, and Tsuyoshi Takagi
  20. Toward Practical Probabilistic Packet Marking
    *Akira Kanaoka and Eiji Okamoto
  21. Frequency Analysis on Searchable Encryption with Provable Security
    *Takanori Suga, Takashi Nishide, and Kouichi Sakurai
  22. Cryptographic Self-Corrector for Cloud Computing Security
    *Yuto Kawahara, Go Yamamoto, Tetsutaro Kobayashi, and Tsuyoshi Takagi
  23. Privacy-Preserving Item Recommendation System in Cloud Computing
    *Anirban Basu, Hiroaki Kikuchi, Jaideep Vaidya, and Theo Dimitrakos
  24. Enhanced System for Ensuring Integrity of Extracted Video Data
    *Tetsuya Izu, Masahiko Takenaka, and Takashi Yoshioka
  25. A Killer Application of Dependent Key Assignment Schemes: Secure Outsourced Data on Cloud
    Anil Mundra, Anish Mathuria, Naveen Kumar, *Takahiro Matsuda, and *Kanta Matsuura
  26. Producing a questionnaire on Anshin about information security by brainstorming and the KJ method
    *Dai Nishioka, Yuko Murayama, and Yasuhiro Fujihara
  27. A Practical Measure Against Billing Frauds: The Concept
    *Takehisa Kato, Kohei Nasaka, Takumi Yamamoto, and Masakatsu Nishigaki