*Ken Ichikawa and Kanta Matsuura, "Preventing execution of JIT shellcode by isolating running process"
*Kaori Tosu and Noboru Kunihiro, "Optimizing Bounds against Multi-Prime Phi-Hiding Problems"
*Yutaka Kawai, "Schnorr Signature May Not Be Secure under Several Diffie-Hellman Type Assumptions"
Takayuki Yamada, *Seiichi Gohshi, and *Isao Echizen, "Method for preventing illegal recording of displayed content based on differences in sensory perception between humans and devices"
Remarks:
Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.
'*'=Presenter(s).
IWSEC 2011 List of Posters
Securing Biometric Identification with Image-Based Authentication
*Takao Murakami, Kenta Takahashi, and Kanta Matsuura
Some Experiments of Fingerprinting Attacks on Tor Anonymity System and Efficacy of Dummy-Packets Countermeasure
*Ryo Hirafuji, *Kou Inagaki, *Hiroe Ishikawa, Takurou Hosoi, and Kanta Matsuura
Technical Requirements toward Open Distribution of Honeypot Trace Data Aiming at Research Promotion
*Takurou Hosoi and Kanta Matsuura
Preventing execution of JIT shellcode by isolating running process
*Ken Ichikawa and Kanta Matsuura
Bots Detection Using Observation Sensors
*Takayoshi Hojo and Kanta Matsuura
Identification of applications in the encrypted tunnel
*Le Ngoc Tu and Yasuhiro Nakamura
Design and Development of Multi-purpose Cryptographic Platform toward Wider Deployment of Pairing-Based Cryptography
*Satsuya Ohata, Toshiyuki Miyazawa, Tetsutaro Kobayashi, and Kanta Matsuura
Interdependency of Information Security and Its Dependence on IS Multiplier of Sub-industries
*Bongkot Jenjarrussakul, *Ryouta Hishiki, Hideyuki Tanaka, Kanta Matsuura, and Hideki Imai
Optimizing Bounds against Multi-Prime Phi-Hiding Problems
*Kaori Tosu and Noboru Kunihiro
Entropy-Based Network Behavior Characterization and Bot Detection
*Seiichiro Mizoguchi, Yoshiaki Hori, and Kouichi Sakurai
Secure Anonymous Authentication Scheme based on Three Party Structure Using Non-Tamper-Resistant Smart Card
*Ryoichi Isawa and Masakatu Morii
Experiment of Person Behavior under Virus Infected Situation
*Shun-ichi Kurino and Noriaki Yoshikai
Schnorr Signature May Not Be Secure under Several Diffie-Hellman Type Assumptions
*Yutaka Kawai
Development of DF-Salvia which provides mandatory access control based on data flow
*Takehiro Kashiyama, Tatsuya Oishi, Eiji Takimoto, and Koichi Mouri
INFORMATION HIDING FOR DIGITAL IMAGE USING BETWEEN-CLASS VARIANCE
*Kazuki Yamato, Madoka Hasegawa, Yuichi Tanaka, and Shigeo Kato
Method for preventing illegal recording of displayed content based on differences in sensory perception between humans and devices
Takayuki Yamada, *Seiichi Gohshi, and *Isao Echizen
Fine-grained Access Control Framework in Android APIs
*Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Jyunya Kani, Harunobu Agematsu, and Masakatsu Nishigaki
STUDY ON POSITION OF ACCELEROMETER SENSOR FOR GAIT AUTHENTICATION
*Dai Higuchi, Madoka Hasegawa, Yuichi Tanaka, and Shigeo Kato
Effcient Implementation of the EtaT Pairing on GPU
*Yosuke Katoh, Chen-Mou Cheng, and Tsuyoshi Takagi
Toward Practical Probabilistic Packet Marking
*Akira Kanaoka and Eiji Okamoto
Frequency Analysis on Searchable Encryption with Provable Security
*Takanori Suga, Takashi Nishide, and Kouichi Sakurai
Cryptographic Self-Corrector for Cloud Computing Security
*Yuto Kawahara, Go Yamamoto, Tetsutaro Kobayashi, and Tsuyoshi Takagi
Privacy-Preserving Item Recommendation System in Cloud Computing
*Anirban Basu, Hiroaki Kikuchi, Jaideep Vaidya, and Theo Dimitrakos
Enhanced System for Ensuring Integrity of Extracted Video Data
*Tetsuya Izu, Masahiko Takenaka, and Takashi Yoshioka
A Killer Application of Dependent Key Assignment Schemes: Secure Outsourced Data on Cloud
Anil Mundra, Anish Mathuria, Naveen Kumar, *Takahiro Matsuda, and *Kanta Matsuura
Producing a questionnaire on Anshin about information security by brainstorming and the KJ method
*Dai Nishioka, Yuko Murayama, and Yasuhiro Fujihara
A Practical Measure Against Billing Frauds: The Concept
*Takehisa Kato, Kohei Nasaka, Takumi Yamamoto, and Masakatsu Nishigaki
Best Poster Award
Remarks:
IWSEC 2011 List of Posters
*Takao Murakami, Kenta Takahashi, and Kanta Matsuura
*Ryo Hirafuji, *Kou Inagaki, *Hiroe Ishikawa, Takurou Hosoi, and Kanta Matsuura
*Takurou Hosoi and Kanta Matsuura
*Ken Ichikawa and Kanta Matsuura
*Takayoshi Hojo and Kanta Matsuura
*Le Ngoc Tu and Yasuhiro Nakamura
*Satsuya Ohata, Toshiyuki Miyazawa, Tetsutaro Kobayashi, and Kanta Matsuura
*Bongkot Jenjarrussakul, *Ryouta Hishiki, Hideyuki Tanaka, Kanta Matsuura, and Hideki Imai
*Kaori Tosu and Noboru Kunihiro
*Seiichiro Mizoguchi, Yoshiaki Hori, and Kouichi Sakurai
*Ryoichi Isawa and Masakatu Morii
*Shun-ichi Kurino and Noriaki Yoshikai
*Yutaka Kawai
*Takehiro Kashiyama, Tatsuya Oishi, Eiji Takimoto, and Koichi Mouri
*Kazuki Yamato, Madoka Hasegawa, Yuichi Tanaka, and Shigeo Kato
Takayuki Yamada, *Seiichi Gohshi, and *Isao Echizen
*Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Jyunya Kani, Harunobu Agematsu, and Masakatsu Nishigaki
*Dai Higuchi, Madoka Hasegawa, Yuichi Tanaka, and Shigeo Kato
*Yosuke Katoh, Chen-Mou Cheng, and Tsuyoshi Takagi
*Akira Kanaoka and Eiji Okamoto
*Takanori Suga, Takashi Nishide, and Kouichi Sakurai
*Yuto Kawahara, Go Yamamoto, Tetsutaro Kobayashi, and Tsuyoshi Takagi
*Anirban Basu, Hiroaki Kikuchi, Jaideep Vaidya, and Theo Dimitrakos
*Tetsuya Izu, Masahiko Takenaka, and Takashi Yoshioka
Anil Mundra, Anish Mathuria, Naveen Kumar, *Takahiro Matsuda, and *Kanta Matsuura
*Dai Nishioka, Yuko Murayama, and Yasuhiro Fujihara
*Takehisa Kato, Kohei Nasaka, Takumi Yamamoto, and Masakatsu Nishigaki