List of Posters

Best Poster Award

  • Takayuki YAMADA, Seiichi GOHSHI, *Isao ECHIZEN, "Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices"

  • *Hui ZHANG, Tsuyoshi TAKAGI, "Cryptanalysis of Multi-prime RSA with Small Prime Difference"

  • *Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro, "Bounded CCA Secure KEM from the Computational Bilinear Diffie-Hellman Assumption"

  • *Yuji Suga, "Optimal Construction of Graph-based Visual Secret Sharing Schemes for Multiple Secrets"

Remarks:

  • Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.
  • '*'=Presenter(s).

IWSEC 2012 List of Posters

  1. Privacy-Preserving Encrypted Data Masking suitable for Sensor Data
    Kenichi Abiru, Shigehiro Idani, Koichi Itoh, Tetsuya Izu, Takao Ogura, Masahiko Takenaka, Hiroshi Tsuda, *Mebae Ushida
  2. Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices
    Takayuki YAMADA, Seiichi GOHSHI, *Isao ECHIZEN
  3. Secure log transfer in virtual machine with minimal modification to library
    *Masaya Sato and Toshihiro Yamauchi
  4. An application-specific continuous authentication system using document reading behavior
    *Sungyoung Cho, Minsu Kim, Jongin Won, SangEun Kwon, Chae-ho Lim, Sehun Kim
  5. Mathematical Modeling and Theoretical Analysis of Web Crawler-Based Malicious Webpage Detection
    *Junsang Park, Sang Geun Han
  6. To Prevent Cache Poisoning in LAN By using TCP Restricted DNS
    *Ros Sam Ath, Yasuhiro Nakamura
  7. Protection against Misusing Malicious Browser Extensions in E-Voting
    *So Ito, Yoshihiro Oyama
  8. Toward Constructing a Software Security Knowledge Base for Web Applications Development
    *Atsuo Hazeyama
  9. Analysis of DNS Traffic to Resolve the Same Domain for Botnet Detection
    *Satoru Akimoto, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai
  10. Efficient algorithm for solving underdefined MQ
    *Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi
  11. Deeply Programmable Network’s Nano-logger
    *Hamid Farhadi, Shogo Ando, Akihiro Nakao
  12. Efficient Composite Order Tate Pairing using Miller's Algorithm of Precomputed Table
    *Yutaro Kiyomura, Tsuyoshi Takagi
  13. Detection of abnormal HTTP communication based on the edit distance
    *Kazuki Chiba, Yoshiaki Hori, Kouichi Sakurai
  14. Cryptanalysis of Multi-prime RSA with Small Prime Difference
    *Hui ZHANG, Tsuyoshi TAKAGI
  15. Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
    *Takuma Koyama, Yu Sasaki, Noboru Kunihiro
  16. Search Engine Based Investigation on Misconfiguration of Zone Transfer
    *Yin Minn Pa Pa , Katsunari Yoshioka, Tsutomu Matsumoto
  17. Regenerating Code based Secure Distributed Storage for Wireless Sensor Networks
    *Jun Wu, Miodrag Mihaljevic
  18. Bounded CCA Secure KEM from the Computational Bilinear Diffie-Hellman Assumption
    *Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro
  19. A simulation methodology searching side-channel leakage using capacitor charging model
    *Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata
  20. Embedding Information in a public key efficiently
    *Motoki KITAHRA, Takanori YASUDA, Takashi Nishide, Kouichi Sakurai
  21. Problems on Secure Exchange of Shared Secret for SRTP Using DTLS-SRTP
    *Hisashi Takahara, Motonori Nakamura
  22. Parameter Dependency of Malicious Packet Loss Detection Based on Queue Prediction
    *Takurou Hosoi, Kanta Matsuura
  23. Proof of Plaintext Knowledge for Niederreiter Cryptosystem
    *Rong Hu, Kirill Morozov, Tsuyoshi Takagi
  24. Ancilla-driven universal blind quantum computation
    *Takahiro Sueki, Takeshi Koshiba, Tomoyuki Morimae
  25. Character-based Symmetric Searchable Encryption
    *Takanori Suga, Takashi Nishide, Kouichi Sakurai
  26. Fuzzy Signature scheme for Biometric Digital Signature
    *Yuta Yoneyama, Kenta Takahashi, Eisei Honbu, Masakatsu Nishigaki
  27. Gamified CAPTCHA
    *Junya Kani, Harunobu Agematsu, Masakatsu Nishigaki
  28. A Proposal of A Security Test Tool for Android Application
    *Shinichi Matsumoto, Kouichi Sakurai
  29. Optimal Construction of Graph-based Visual Secret Sharing Schemes for Multiple Secrets
    *Yuji Suga
  30. Proposal of Visualization Method and User Interface for Analyzing Traffic Observed by Long-term Malware Sandbox Analysis
    *Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto
  31. A t-resilient Unconditionally Secure First-Price Auction Protocol
    *Kazuma Ohara, Yusuke Sakai, Mitsugu Iwamoto, Kazuo Ohta