Takayuki YAMADA, Seiichi GOHSHI, *Isao ECHIZEN, "Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices"
*Hui ZHANG, Tsuyoshi TAKAGI, "Cryptanalysis of Multi-prime RSA with Small Prime Difference"
*Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro, "Bounded CCA Secure KEM from the Computational Bilinear Diffie-Hellman Assumption"
*Yuji Suga, "Optimal Construction of Graph-based Visual Secret Sharing Schemes for Multiple Secrets"
Remarks:
Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.
'*'=Presenter(s).
IWSEC 2012 List of Posters
Privacy-Preserving Encrypted Data Masking suitable for Sensor Data
Kenichi Abiru, Shigehiro Idani, Koichi Itoh, Tetsuya Izu, Takao Ogura, Masahiko Takenaka, Hiroshi Tsuda, *Mebae Ushida
Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices
Takayuki YAMADA, Seiichi GOHSHI, *Isao ECHIZEN
Secure log transfer in virtual machine with minimal modification to library
*Masaya Sato and Toshihiro Yamauchi
An application-specific continuous authentication system using document reading behavior
*Sungyoung Cho, Minsu Kim, Jongin Won, SangEun Kwon, Chae-ho Lim, Sehun Kim
Mathematical Modeling and Theoretical Analysis of Web Crawler-Based Malicious Webpage Detection
*Junsang Park, Sang Geun Han
To Prevent Cache Poisoning in LAN By using TCP Restricted DNS
*Ros Sam Ath, Yasuhiro Nakamura
Protection against Misusing Malicious Browser Extensions in E-Voting
*So Ito, Yoshihiro Oyama
Toward Constructing a Software Security Knowledge Base for Web Applications Development
*Atsuo Hazeyama
Analysis of DNS Traffic to Resolve the Same Domain for Botnet Detection
*Satoru Akimoto, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai
A Proposal of A Security Test Tool for Android Application
*Shinichi Matsumoto, Kouichi Sakurai
Optimal Construction of Graph-based Visual Secret Sharing Schemes for Multiple Secrets
*Yuji Suga
Proposal of Visualization Method and User Interface for Analyzing Traffic Observed by Long-term Malware Sandbox Analysis
*Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto
Best Poster Award
Remarks:
IWSEC 2012 List of Posters
Kenichi Abiru, Shigehiro Idani, Koichi Itoh, Tetsuya Izu, Takao Ogura, Masahiko Takenaka, Hiroshi Tsuda, *Mebae Ushida
Takayuki YAMADA, Seiichi GOHSHI, *Isao ECHIZEN
*Masaya Sato and Toshihiro Yamauchi
*Sungyoung Cho, Minsu Kim, Jongin Won, SangEun Kwon, Chae-ho Lim, Sehun Kim
*Junsang Park, Sang Geun Han
*Ros Sam Ath, Yasuhiro Nakamura
*So Ito, Yoshihiro Oyama
*Atsuo Hazeyama
*Satoru Akimoto, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai
*Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi
*Hamid Farhadi, Shogo Ando, Akihiro Nakao
*Yutaro Kiyomura, Tsuyoshi Takagi
*Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai
*Hui ZHANG, Tsuyoshi TAKAGI
*Takuma Koyama, Yu Sasaki, Noboru Kunihiro
*Yin Minn Pa Pa , Katsunari Yoshioka, Tsutomu Matsumoto
*Jun Wu, Miodrag Mihaljevic
*Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
*Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata
*Motoki KITAHRA, Takanori YASUDA, Takashi Nishide, Kouichi Sakurai
*Hisashi Takahara, Motonori Nakamura
*Takurou Hosoi, Kanta Matsuura
*Rong Hu, Kirill Morozov, Tsuyoshi Takagi
*Takahiro Sueki, Takeshi Koshiba, Tomoyuki Morimae
*Takanori Suga, Takashi Nishide, Kouichi Sakurai
*Yuta Yoneyama, Kenta Takahashi, Eisei Honbu, Masakatsu Nishigaki
*Junya Kani, Harunobu Agematsu, Masakatsu Nishigaki
*Shinichi Matsumoto, Kouichi Sakurai
*Yuji Suga
*Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto
*Kazuma Ohara, Yusuke Sakai, Mitsugu Iwamoto, Kazuo Ohta