Accepted Papers

 
Financial Cryptography and Data Security '11

International Financial Cryptography Association logo

Fifteenth International Conference
February 28–March 4, 2011
Bay Gardens Beach Resort
St. Lucia

Long papers

Rob Johnson, Leif Walsh and Michael Lamb. Homomorphic Signatures for Digital Photographs

Guomin Yang, Shanshan Duan, Duncan Wong, Chik-How Tan and Huaxiong Wang. Authenticated Key Exchange under Bad Randomness

Ulrich Rührmair, Christian Jaeger and Michael Algasinger. An Attack on PUF-based Session Key Exchange and a Hardware-based Countermeasure

Rainer Boehme and Stefanie Poetzsch. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data

Julien Freudiger, Reza Shokri and Hubaux Jean-Pierre. Evaluating the Privacy Risk of Location-Based Services

Femi Olumofin and Ian Goldberg. Revisiting the Computational Practicality of Private Information Retrieval

Shujun Li, Ahmad-Reza Sadeghi, Soeren Heisrath, Roland Schmitz and Junaid Jameel Ahmad. hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers

Theodoor Scholte, Davide Balzarotti and Engin Kirda. Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications

Nicolas Christin, Serge Egelman, Timothy Vidas and Jens Grossklags. It's All About The Benjamins: Fair Trade botnets and incentivizing users to ignore security advice

Pern Hui Chia and Svein Knapskog. Re-Evaluating the Wisdom of Crowds in Accessing Web Security

Jeremy Clark and Urs Hengartner. Selections: An Internet voting system with over-the-shoulder coercion-resistance

Martin Franz, Bogdan Carbunar, Radu Sion, Stefan Katzenbeisser, Miroslava Sotakova, Peter Williams and Andreas Peter. Oblivious Outsourced Storage with Delegation

Ross Anderson, Omar Choudary and Steven Murdoch. Might Financial Cryptography Kill Financial Innovation? -- The Curious Case of EMV

Mohammad Mannan, David Barrera, Carson Brown, David Lie and Paul Van Oorschot. Recovering Forgotten Passwords Using Personal Devices

Henryk Plötz and Karsten Nohl. Peeling Away Layers of an RFID Security System

Short Papers

Peter Lofgren and Nicholas Hopper. BNymble (a short paper): More anonymous blacklisting at almost no cost

Kirill Levchenko and Damon McCoy. Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies (a short paper)

Mohammed Tuhin and Reihaneh Safavi-Naini. Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)

Martin Franz, Stefan Katzenbeisser, Bjoern Deiseroth, Kay Hamacher, Somesh Jha and Heike Schroeder. Towards Secure Bioinformatics Services

Benedikt Westermann. Redirected to Malice: The Importance of Integrity Protection

Philip Marquardt, David Dagon and Patrick Traynor. Impeding Individual User Profiling in Shopper Loyalty Programs

Jay Novak, Jonathan Stribley, Kenneth Meagher, Scott Wolchok and Alex Halderman. Absolute Pwnage: Security Risks of Remote Administration Tools

Christopher Soghoian and Sid Stamm. Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL

Ben Palmer, kris bubendorfer and Ian Welch. A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains

Debin Liu, Ninghui Li, XiaoFeng Wang and L. Jean Camp. Beyond Risk-Based Access Control: Towards Incentive-Based Access Control

Oliver Spycher, Reto König, Rolf Haenni and Michael Schläpfer. A New Approach Towards Coercion-Resistant Remote E-Voting in Linear Time (a short paper)

 

 

 

This conference is organized annually by the International Financial Cryptography Association.