FC'05
Financial Cryptography
and Data Security
Preliminary Program
The following is a tentative schedule.
Sunday, February 27 | |
6:00PM |
|
6:00- 8:00 |
|
Monday, February 28 | |
8:30 |
|
7:00 |
|
9:00 |
|
9:30 |
Fraud within Asymmetric Multi-Hop Cellular Networks Protecting Secret Data from Insider Attacks Countering Identity Theft through Digital Uniqueness, Location Cross-Checking, and Funneling |
11:00 |
|
11:30 |
Trust and Swindling on the Internet Professor Gavish will present preliminary survey results to counter claims by online auction site operators that fraudulent activity is negligible and to make a case for more extensive research on Internet fraud. (abstract) |
12:30 |
|
1:30 |
Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures) Time Capsule Signature Policy-Based Cryptography and Applications |
3:00 |
|
3:30 |
Tentative panelists: Drew Dean, Stuart Stubblebine, Richard Clayton, Steve Myers, Mike Szydlo |
5:00 |
|
Tuesday, March 1 | |
7:00 |
|
9:00 |
A Privacy Protecting Coupon System Testing Disjointness of Private Datasets |
10:00 |
|
10:30 |
RFID Traceability A Multilayer Problem Information-Theoretic Security Analysis of Physical Uncloneable Functions |
11:30 |
Risk Assurance for Hedge Funds using Zero Knowledge Proofs Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure |
12:30 |
|
1:30 |
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce Securing Sensitive Data with the Ingrian DataSecure Platform Ciphire Mail Email Encryption and Authentication |
3:00 |
|
7:00 |
|
8:00 |
|
Wednesday, March 2 | |
7:00 |
|
9:00 |
Usable Security: A conundrum? |
10:00 |
|
10:30 |
A User-Friendly Approach to Human Authentication of Messages Approximation in Message Authentication and Biometric Entity Authentication |
11:30 |
Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model Achieving Fairness in Private Contract Negotiation |
12:30 |
|
1:30 |
Small Coalitions Cannot Manipulate Voting Efficient Privacy-Preserving Protocols for Multi-Unit Auctions Event Driven Private Counters |
3:00 |
|
8:30 (PM) |
Works in Progress Papers: Secure Distributed Human Computation Secure Multi-Attribute Procurement Auction Audit File Reduction Using N-Gram Models |
Thursday, March 3 | |
7:00 |
|
9:00 |
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication Secure Biometric Authentication for Weak Computational Devices |
10:00 |
|
10:30 |
Tentative panelists: H William Burdett, Jr., Allan Friedman |
12:00 |
|
12:30 |
|
1:30 |
|