List of Posters

Best Poster Awards

Disavowability on Public Key Encryption with Non-interactive Opening
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka

Card-Based Cryptographic Protocols with Unordinary Shuffle
Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone

 

IWSEC 2015 List of Posters (tentative list as of July 24, 2015)

  1. Enhancement of Image Tampering Detection using JPEG’s Quantization and Re-Interpolation Processes
    Songpon Teerakanok and Tetsutaro Uehara
  2. JavaScript-Based Web Application Vulnerability Scanning Using Cross-Origin Resource Sharing
    Yumin Sim, E Jin Kim, and Hae Young Lee
  3. Input Password Only with Four Keys
    Akane Ito and Manabu Okamoto
  4. Preserving location privacy using dynamic pseudonym scheme
    Tomoya Tanjo, Kazuhiro Minami, Ken Mano, and Hiroshi Maruyama
  5. On Rigorous Security of Password Recovery Protocols
    Satsuya Ohata, Takahiro Matsuda, and Kanta Matsuura
  6. How to steal login IDs from Chrome and Opera using autofill function (Proof of Concept)
    Kengo Teramoto and Taiichi Saito
  7. A probability model for a multivariate polynomial system to have solutions
    Yun-Ju Huang, Takanori Yasuda, and Kouichi Sakurai
  8. Portable Implementation of Lattice-based Cryptography using JavaScript
    Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, and Tsuyoshi Takagi
  9. Faster LLL Reduction to Break the Security of Fully Homomorphic Encryption and Multilinear Map over the Integers
    Atsushi Takayasu and Noboru Kunihiro
  10. Toward Secure Routing Protocols for Sensor Networks
    Kenta Muranaka, Naoto Yanai, Shingo Okamura, and Toru Fujiwara
  11. Pairings on genus 2 curves at high security level and fast implementation of the pairings on Haswell processor
    Masahiro Ishii, Atsuo Inomata, and Kazutoshi Fujikawa
  12. Bitcoin Based on Compact Proofs of Retrievability
    Binanda Sengupta, Samiran Bag, Sushmita Ruj, and Kouichi Sakurai
  13. Card-Based Cryptographic Protocols with Unordinary Shuffle
    Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
  14. Secure Payment Protocol for Charging Information over SmartGrid
    Hikaru KISHIMOTO, Shingo OKAMURA, and Naoto YANAI
  15. Disavowability on Public Key Encryption with Non-interactive Opening
    Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka
  16. GINGERALE :smart Glass of fINger GEsture Authentication Lock Enabler
    Hiroaki ISHIKAWA, Hiroya Susuki, and Rie Shigetomi Yamaguchi
  17. Comparison of Security on Coded Signs with Public/Private Code Book
    Yuto Misawa, Yuuki Tokushige, Mitsugu Iwamoto, and Kazuo Ohta
  18. Toward Reducing Shuffling in Card-based Cryptographic Protocol for Millionaire Problem
    Takeshi Nakai, Yuuki Tokushige, Mitsugu Iwamoto, and Kazuo Ohta
  19. Potential Security Vulnerabilities in Web Based Configuration Pages of Wireless Access Points
    Ji Hye Kim, Da Ran Park, Heeju Yoon, and Hae Young Lee

Remarks:

  • Posters were not rigorously refereed, and no proceedings were published regarding the posters, and hence the copyrights of any content for the poster presentations are retained by the authors; there is no restriction for the authors of the posters to submit the contents to other journals/conferences in the future.