Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Rainer B{\"o}hme and Stefanie P{\"o}tzsch. Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 1-15. Springer, 2011. [  paper | publisher ]
[2] Nicolas Christin and Serge Egelman and Timothy Vidas and Jens Grossklags. It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 16-30. Springer, 2011. [  paper | publisher ]
[3] Julien Freudiger and Reza Shokri and Jean-Pierre Hubaux. Evaluating the Privacy Risk of Location-Based Services. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 31-46. Springer, 2011. [  paper | publisher ]
[4] Jeremy Clark and Urs Hengartner. Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 47-61. Springer, 2011. [  paper | publisher ]
[5] Benedikt Westermann and Dogan Kesdogan. Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 62-76. Springer, 2011. [  paper | publisher ]
[6] Jay Novak and Jonathan Stribley and Kenneth Meagher and J. Alex Halderman. Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 77-84. Springer, 2011. [  paper | publisher ]
[7] Ben Palmer and Kris Bubendorfer and Ian Welch. A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper). In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 85-92. Springer, 2011. [  paper | publisher ]
[8] Philip Marquardt and David Dagon and Patrick Traynor. Impeding Individual User Profiling in Shopper Loyalty Programs. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 93-101. Springer, 2011. [  paper | publisher ]
[9] Debin Liu and Ninghui Li and XiaoFeng Wang and L. Jean Camp. Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 102-112. Springer, 2011. [  paper | publisher ]
[10] Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang. Authenticated Key Exchange under Bad Randomness. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 113-126. Springer, 2011. [  paper | publisher ]
[11] Martin Franz and Peter Williams and Bogdan Carbunar and Stefan Katzenbeisser and Andreas Peter and Radu Sion and Miroslava Sot{\'a}kov{\'a}. Oblivious Outsourced Storage with Delegation. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 127-140. Springer, 2011. [  paper | publisher ]
[12] Rob Johnson and Leif Walsh and Michael Lamb. Homomorphic Signatures for Digital Photographs. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 141-157. Springer, 2011. [  paper | publisher ]
[13] Femi G. Olumofin and Ian Goldberg. Revisiting the Computational Practicality of Private Information Retrieval. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 158-172. Springer, 2011. [  paper | publisher ]
[14] Mohammed Ashraful Tuhin and Reihaneh Safavi-Naini. Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper). In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 173-181. Springer, 2011. [  paper | publisher ]
[15] Oliver Spycher and Reto E. Koenig and Rolf Haenni and Michael Schl{\"a}pfer. A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 182-189. Springer, 2011. [  paper | publisher ]
[16] Ulrich R{\"u}hrmair and Christian Jaeger and Michael Algasinger. An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 190-204. Springer, 2011. [  paper | publisher ]
[17] Henryk Pl{\"o}tz and Karsten Nohl. Peeling Away Layers of an RFID Security System. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 205-219. Springer, 2011. [  paper | publisher ]
[18] Ross J. Anderson and Mike Bond and Omar Choudary and Steven J. Murdoch and Frank Stajano. Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 220-234. Springer, 2011. [  paper | publisher ]
[19] Shujun Li and Ahmad-Reza Sadeghi and S{\"o}ren Heisrath and Roland Schmitz and Junaid Jameel Ahmad. hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 235-249. Springer, 2011. [  paper | publisher ]
[20] Christopher Soghoian and Sid Stamm. Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper). In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 250-259. Springer, 2011. [  paper | publisher ]
[21] Damon McCoy and Jose Andre Morales and Kirill Levchenko. Proximax: Measurement-Driven Proxy Dissemination (Short Paper). In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 260-267. Springer, 2011. [  paper | publisher ]
[22] Peter Lofgren and Nicholas Hopper. BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper). In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 268-275. Springer, 2011. [  paper | publisher ]
[23] Martin Franz and Bj{\"o}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"o}der. Towards Secure Bioinformatics Services (Short Paper). In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 276-283. Springer, 2011. [  paper | publisher ]
[24] Theodoor Scholte and Davide Balzarotti and Engin Kirda. Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 284-298. Springer, 2011. [  paper | publisher ]
[25] Pern Hui Chia and Svein Johan Knapskog. Re-evaluating the Wisdom of Crowds in Assessing Web Security. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 299-314. Springer, 2011. [  paper | publisher ]
[26] Mohammad Mannan and David Barrera and Carson D. Brown and David Lie and Paul C. van Oorschot. Mercury: Recovering Forgotten Passwords Using Personal Devices. In George Danezis, editor, Financial Cryptography, volume 7035 of Lecture Notes in Computer Science, pages 315-330. Springer, 2011. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.