Accepted Papers
Financial Cryptography and Data Security '11
Fifteenth International Conference
February 28–March 4, 2011
Bay Gardens Beach Resort
St. Lucia
Long papers
Rob Johnson, Leif Walsh and Michael Lamb. Homomorphic Signatures for Digital Photographs
Guomin Yang, Shanshan Duan, Duncan Wong, Chik-How Tan and Huaxiong Wang. Authenticated Key Exchange under Bad Randomness
Ulrich Rührmair, Christian Jaeger and Michael Algasinger. An Attack on PUF-based Session Key Exchange and a Hardware-based Countermeasure
Rainer Boehme and Stefanie Poetzsch. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data
Julien Freudiger, Reza Shokri and Hubaux Jean-Pierre. Evaluating the Privacy Risk of Location-Based Services
Femi Olumofin and Ian Goldberg. Revisiting the Computational Practicality of Private Information Retrieval
Shujun Li, Ahmad-Reza Sadeghi, Soeren Heisrath, Roland Schmitz and Junaid Jameel Ahmad. hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers
Theodoor Scholte, Davide Balzarotti and Engin Kirda. Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications
Nicolas Christin, Serge Egelman, Timothy Vidas and Jens Grossklags. It's All About The Benjamins: Fair Trade botnets and incentivizing users to ignore security advice
Pern Hui Chia and Svein Knapskog. Re-Evaluating the Wisdom of Crowds in Accessing Web Security
Jeremy Clark and Urs Hengartner. Selections: An Internet voting system with over-the-shoulder coercion-resistance
Martin Franz, Bogdan Carbunar, Radu Sion, Stefan Katzenbeisser, Miroslava Sotakova, Peter Williams and Andreas Peter. Oblivious Outsourced Storage with Delegation
Ross Anderson, Omar Choudary and Steven Murdoch. Might Financial Cryptography Kill Financial Innovation? -- The Curious Case of EMV
Mohammad Mannan, David Barrera, Carson Brown, David Lie and Paul Van Oorschot. Recovering Forgotten Passwords Using Personal Devices
Henryk Plötz and Karsten Nohl. Peeling Away Layers of an RFID Security System
Short Papers
Peter Lofgren and Nicholas Hopper. BNymble (a short paper): More anonymous blacklisting at almost no cost
Kirill Levchenko and Damon McCoy. Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies (a short paper)
Mohammed Tuhin and Reihaneh Safavi-Naini. Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper)
Martin Franz, Stefan Katzenbeisser, Bjoern Deiseroth, Kay Hamacher, Somesh Jha and Heike Schroeder. Towards Secure Bioinformatics Services
Benedikt Westermann. Redirected to Malice: The Importance of Integrity Protection
Philip Marquardt, David Dagon and Patrick Traynor. Impeding Individual User Profiling in Shopper Loyalty Programs
Jay Novak, Jonathan Stribley, Kenneth Meagher, Scott Wolchok and Alex Halderman. Absolute Pwnage: Security Risks of Remote Administration Tools
Christopher Soghoian and Sid Stamm. Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL
Ben Palmer, kris bubendorfer and Ian Welch. A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains
Debin Liu, Ninghui Li, XiaoFeng Wang and L. Jean Camp. Beyond Risk-Based Access Control: Towards Incentive-Based Access Control
Oliver Spycher, Reto König, Rolf Haenni and Michael Schläpfer. A New Approach Towards Coercion-Resistant Remote E-Voting in Linear Time (a short paper)
This conference is organized annually by the International Financial Cryptography Association.