Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Ueli Maurer. Constructive Cryptography - A Primer. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 1. Springer, 2010. [  paper | publisher ]
[2] Jean-Pierre Hubaux. Security Mechanisms with Selfish Players in Wireless Networks. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 2. Springer, 2010. [  paper | publisher ]
[3] Lorrie Faith Cranor. Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 3. Springer, 2010. [  paper | publisher ]
[4] Frank Stajano and Ford-Long Wong and Bruce Christianson. Multichannel Protocols to Prevent Relay Attacks. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 4-19. Springer, 2010. [  paper | publisher ]
[5] Tom Chothia and Vitaliy Smirnov. A Traceability Attack against e-Passports. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 20-34. Springer, 2010. [  paper | publisher ]
[6] Octavian Catrina and Amitabh Saxena. Secure Computation with Fixed-Point Numbers. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 35-50. Springer, 2010. [  paper | publisher ]
[7] Paul A. Karger and David C. Toll and Elaine R. Palmer and Suzanne McIntosh and Samuel Weber and Jonathan W. Edwards. Implementing a High-Assurance Smart-Card OS. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 51-65. Springer, 2010. [  paper | publisher ]
[8] Jan Camenisch and Maria Dubovitskaya and Gregory Neven. Unlinkable Priced Oblivious Transfer with Rechargeable Wallets. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 66-81. Springer, 2010. [  paper | publisher ]
[9] S{\'e}bastien Canard and Aline Gouget. Multiple Denominations in E-cash with Compact Transaction Data. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 82-97. Springer, 2010. [  paper | publisher ]
[10] Joseph Bonneau and Mike Just and Greg Matthews. What's in a Name?. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 98-113. Springer, 2010. [  paper | publisher ]
[11] Benedikt Westermann and Rolf Wendolsky and Lexi Pimenidis and Dogan Kesdogan. Cryptographic Protocol Analysis of AN.ON. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 114-128. Springer, 2010. [  paper | publisher ]
[12] Sven Sch{\"a}ge and J{\"o}rg Schwenk. A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 129-142. Springer, 2010. [  paper | publisher ]
[13] Emiliano De Cristofaro and Gene Tsudik. Practical Private Set Intersection Protocols with Linear Complexity. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 143-159. Springer, 2010. [  paper | publisher ]
[14] Mathias Bj{\"o}rkqvist and Christian Cachin and Robert Haas and Xiao-Yu Hu and Anil Kurmus and Ren{\'e} Pawlitzek and Marko Vukolic. Design and Implementation of a Key-Lifecycle Management System. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 160-174. Springer, 2010. [  paper | publisher ]
[15] Tyler Moore and Benjamin Edelman. Measuring the Perpetrators and Funders of Typosquatting. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 175-191. Springer, 2010. [  paper | publisher ]
[16] Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett. A Learning-Based Approach to Reactive Security. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 192-206. Springer, 2010. [  paper | publisher ]
[17] Kimmo J{\"a}rvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider. Embedded SFE: Offloading Server and Network Using Hardware Tokens. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 207-221. Springer, 2010. [  paper | publisher ]
[18] Tal Moran and Tyler Moore. The Phish-Market Protocol: Securely Sharing Attack Data between Competitors. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 222-237. Springer, 2010. [  paper | publisher ]
[19] Tsuen-Wan Ngan and Roger Dingledine and Dan S. Wallach. Building Incentives into Tor. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 238-256. Springer, 2010. [  paper | publisher ]
[20] Aggelos Kiayias and Moti Yung. Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 257-271. Springer, 2010. [  paper | publisher ]
[21] Prithvi Bisht and A. Prasad Sistla and V. N. Venkatakrishnan. Automatically Preparing Safe SQL Queries. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 272-288. Springer, 2010. [  paper | publisher ]
[22] Dan Kaminsky and Meredith L. Patterson and Len Sassaman. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 289-303. Springer, 2010. [  paper | publisher ]
[23] Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Qianhong Wu and Yi Mu and Jangseong Kim and Kwangjo Kim. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 304-311. Springer, 2010. [  paper | publisher ]
[24] Ryan W. Gardner and Sujata Garera and Aviel D. Rubin. Designing for Audit: A Voting Machine with a Tiny TCB. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 312-319. Springer, 2010. [  paper | publisher ]
[25] Daniel Bu{\ss}meyer and Felix Gr{\"o}bert and J{\"o}rg Schwenk and Christoph Wegener. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 320-327. Springer, 2010. [  paper | publisher ]
[26] Ulrich R{\"u}hrmair and Christian Jaeger and Christian Hilgers and Michael Algasinger and Gy{\"o}rgy Csaba and Martin Stutzmann. Security Applications of Diodes with Unique Current-Voltage Characteristics. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 328-335. Springer, 2010. [  paper | publisher ]
[27] Steven J. Murdoch and Ross J. Anderson. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 336-342. Springer, 2010. [  paper | publisher ]
[28] Timo Kasper and Michael Silbermann and Christof Paar. All You Can Eat or Breaking a Real-World Contactless Payment System. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 343-350. Springer, 2010. [  paper | publisher ]
[29] Toni Perkovic and Mario Cagalj and Nitesh Saxena. Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 351-358. Springer, 2010. [  paper | publisher ]
[30] Aniket Kate and Ian Goldberg. Using Sphinx to Improve Onion Routing Circuit Construction. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 359-366. Springer, 2010. [  paper | publisher ]
[31] Ivan Damg{\aa}rd and Marcel Keller. Secure Multiparty AES. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 367-374. Springer, 2010. [  paper | publisher ]
[32] Jorge Guajardo and Bart Mennink and Berry Schoenmakers. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 375-382. Springer, 2010. [  paper | publisher ]
[33] Feng Hao. On Robust Key Agreement Based on Public Key Authentication. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 383-390. Springer, 2010. [  paper | publisher ]
[34] Bogdan Groza and Marius Minea. A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 391-399. Springer, 2010. [  paper | publisher ]
[35] John Bethencourt and Elaine Shi and Dawn Song. Signatures of Reputation. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 400-407. Springer, 2010. [  paper | publisher ]
[36] William Yuen and Paul F. Syverson and Zhenming Liu and Christopher Thorpe. Intention-Disguised Algorithmic Trading. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 408-415. Springer, 2010. [  paper | publisher ]
[37] Jens Grossklags and Benjamin Johnson and Nicolas Christin. When Information Improves Information Security. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 416-423. Springer, 2010. [  paper | publisher ]
[38] Teik Guan Tan. BetterThanPin: Empowering Users to Fight Phishing (Poster). In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 424. Springer, 2010. [  paper | publisher ]
[39] Pern Hui Chia. Certification Intermediaries and the Alternative (Poster). In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 425. Springer, 2010. [  paper | publisher ]
[40] Slawomir Grzonkowski. SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 426. Springer, 2010. [  paper | publisher ]
[41] Pino Caballero-Gil and Jezabel Molina-Gil and C{\'a}ndido Caballero-Gil and Candelaria Hern{\'a}ndez-Goya. Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 427. Springer, 2010. [  paper | publisher ]
[42] Lilia Georgieva. Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 428. Springer, 2010. [  paper | publisher ]
[43] Shujun Li and Ahmad-Reza Sadeghi and Roland Schmitz. hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 429. Springer, 2010. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.