Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Moti Yung. Cryptographic protocols: From the abstract to the practical to the actual. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 1-2. Springer, 2011. [ bib | paper | publisher ]
[2] Ping Yu and Rui Xue. Toward real-life implementation of signature schemes from the strong rsa assumption. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 3-12. Springer, 2011. [ bib | paper | publisher ]
[3] Tetsuya Izu, Yoshitaka Morikawa, Yasuyuki Nogami, Yumi Sakemi, and Masahiko Takenaka. Detailed cost estimation of cntw attack against emv signature scheme. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 13-26. Springer, 2011. [ bib | paper | publisher ]
[4] Emilia Käsper. Fast elliptic curve cryptography in openssl. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 27-39. Springer, 2011. [ bib | paper | publisher ]
[5] Felix Günther, Mark Manulis, and Thorsten Strufe. Cryptographic treatment of private user profiles. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 40-54. Springer, 2011. [ bib | paper | publisher ]
[6] Jennia Hizver and Tzi cker Chiueh. An introspection-based memory scraper attack against virtualized point of sale systems. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 55-69. Springer, 2011. [ bib | paper | publisher ]
[7] Yoshikazu Hanatani, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama, and Kazuo Ohta. A study on computational formal verification for practical cryptographic protocol: The case of synchronous rfid authentication. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 70-87. Springer, 2011. [ bib | paper | publisher ]
[8] Daniel Hartung and Christoph Busch. Biometric transaction authentication protocol: Formal model verification and "four-eyes" principle extension. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 88-103. Springer, 2011. [ bib | paper | publisher ]
[9] Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, and Paul C. van Oorschot. Exploration and field study of a password manager using icon-based passwords. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 104-118. Springer, 2011. [ bib | paper | publisher ]
[10] David G. Robinson and J. Alex Halderman. Ethical issues in e-voting security analysis. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 119-130. Springer, 2011. [ bib | paper | publisher ]
[11] Maritza L. Johnson, Steven M. Bellovin, and Angelos D. Keromytis. Computer security research with human subjects: Risks, benefits and informed consent. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 131-137. Springer, 2011. [ bib | paper | publisher ]
[12] John Aycock, Elizabeth Buchanan, Scott Dexter, and David Dittrich. Human subjects, agents, or bots: Current issues in ethics and computer security research. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 138-145. Springer, 2011. [ bib | paper | publisher ]
[13] Christopher Soghoian. Enforced community standards for research on users of the tor anonymity network. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 146-153. Springer, 2011. [ bib | paper | publisher ]
[14] Tyler Moore and Richard Clayton. Ethical dilemmas in take-down research. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 154-168. Springer, 2011. [ bib | paper | publisher ]
[15] Darren Shou. Ethical considerations of sharing data for cybersecurity research. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 169-177. Springer, 2011. [ bib | paper | publisher ]
[16] Erin Kenneally, Angelos Stavrou, John McHugh, and Nicolas Christin. Moving forward, building an ethics community (panel statements). In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 178-183. Springer, 2011. [ bib | paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.