Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Gildas Avoine. Fraud Within Asymmetric Multi-hop Cellular Networks. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 1-15. Springer, 2005. [  paper | publisher ]
[2] David Dagon and Wenke Lee and Richard J. Lipton. Protecting Secret Data from Insider Attacks. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 16-30. Springer, 2005. [  paper | publisher ]
[3] Paul C. van Oorschot and Stuart G. Stubblebine. Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 31-43. Springer, 2005. [  paper | publisher ]
[4] Bezalel Gavish. Trust and Swindling on the Internet. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 44. Springer, 2005. [  paper | publisher ]
[5] Fangguo Zhang and Willy Susilo and Yi Mu. Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 45-56. Springer, 2005. [  paper | publisher ]
[6] Yevgeniy Dodis and Dae Hyun Yum. Time Capsule Signature. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 57-71. Springer, 2005. [  paper | publisher ]
[7] Walid Bagga and Refik Molva. Policy-Based Cryptography and Applications. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 72-87. Springer, 2005. [  paper | publisher ]
[8] Richard Clayton and Drew Dean and Markus Jakobsson and Steven Myers and Stuart G. Stubblebine and Michael Szydlo. A Chat at the Old Phishin' Hole. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 88. Springer, 2005. [  paper | publisher ]
[9] Markus Jakobsson. Modeling and Preventing Phishing Attacks. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 89. Springer, 2005. [  paper | publisher ]
[10] Steven Myers. Helping the Phish Detect the Lure. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 90. Springer, 2005. [  paper | publisher ]
[11] Richard Clayton. Who'd Phish from the Summit of Kilimanjaro?. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 91-92. Springer, 2005. [  paper | publisher ]
[12] Liqun Chen and Matthias Enzmann and Ahmad-Reza Sadeghi and Markus Schneider and Michael Steiner. A Privacy-Protecting Coupon System. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 93-108. Springer, 2005. [  paper | publisher ]
[13] Aggelos Kiayias and Antonina Mitrofanova. Testing Disjointness of Private Datasets. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 109-124. Springer, 2005. [  paper | publisher ]
[14] Gildas Avoine and Philippe Oechslin. RFID Traceability: A Multilayer Problem. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 125-140. Springer, 2005. [  paper | publisher ]
[15] Pim Tuyls and Boris Skoric and S. Stallinga and Anton H. M. Akkermans and W. Ophey. Information-Theoretic Security Analysis of Physical Uncloneable Functions. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 141-155. Springer, 2005. [  paper | publisher ]
[16] Michael Szydlo. Risk Assurance for Hedge Funds Using Zero Knowledge Proofs. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 156-171. Springer, 2005. [  paper | publisher ]
[17] Stanislaw Jarecki and Vitaly Shmatikov. Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 172-187. Springer, 2005. [  paper | publisher ]
[18] Simson L. Garfinkel and Jeffrey I. Schiller and Erik Nordlander and David Margrave and Robert C. Miller. Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 188-202. Springer, 2005. [  paper | publisher ]
[19] Andrew Koyfman. Securing Sensitive Data with the Ingrian DataSecure Platform. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 203-210. Springer, 2005. [  paper | publisher ]
[20] Lars Eilebrecht. Ciphire Mail Email Encryption and Authentication. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 211-224. Springer, 2005. [  paper | publisher ]
[21] Jeff King and Andr{\'e} L. M. dos Santos. A User-Friendly Approach to Human Authentication of Messages. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 225-239. Springer, 2005. [  paper | publisher ]
[22] Giovanni Di Crescenzo and R. F. Graveman and Renwei Ge and Gonzalo R. Arce. Approximate Message Authentication and Biometric Entity Authentication. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 240-254. Springer, 2005. [  paper | publisher ]
[23] Aybek Mukhamedov and Steve Kremer and Eike Ritter. Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 255-269. Springer, 2005. [  paper | publisher ]
[24] Keith B. Frikken and Mikhail J. Atallah. Achieving Fairness in Private Contract Negotiation. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 270-284. Springer, 2005. [  paper | publisher ]
[25] Edith Elkind and Helger Lipmaa. Small Coalitions Cannot Manipulate Voting. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 285-297. Springer, 2005. [  paper | publisher ]
[26] Felix Brandt and Tuomas Sandholm. Efficient Privacy-Preserving Protocols for Multi-unit Auctions. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 298-312. Springer, 2005. [  paper | publisher ]
[27] Eu-Jin Goh and Philippe Golle. Event Driven Private Counters. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 313-327. Springer, 2005. [  paper | publisher ]
[28] Craig Gentry and Zulfikar Ramzan and Stuart G. Stubblebine. Secure Distributed {\it Human} Computation. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 328-332. Springer, 2005. [  paper | publisher ]
[29] Koutarou Suzuki and Makoto Yokoo. Secure Multi-attribute Procurement Auction. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 333-335. Springer, 2005. [  paper | publisher ]
[30] Fernando God\'{\i}nez and Dieter Hutter and Raul Monroy. Audit File Reduction Using N-Gram Models. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 336-340. Springer, 2005. [  paper | publisher ]
[31] Michel Abdalla and David Pointcheval. Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 341-356. Springer, 2005. [  paper | publisher ]
[32] Mikhail J. Atallah and Keith B. Frikken and Michael T. Goodrich and Roberto Tamassia. Secure Biometric Authentication for Weak Computational Devices. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 357-371. Springer, 2005. [  paper | publisher ]
[33] Allan Friedman. Panel Summary: Incentives, Markets and Information Security. In Andrew S. Patrick and Moti Yung, editor, Financial Cryptography, volume 3570 of Lecture Notes in Computer Science, pages 372-373. Springer, 2005. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.