Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Hyoungshick Kim and John Tang and Ross Anderson. Social Authentication: Harder Than It Looks. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 1-15. Springer, 2012. [  paper | publisher ]
[2] Sonia Chiasson and Chris Deschamps and Elizabeth Stobert and Max Hlywa and Bruna Freitas Machado and Alain Forget and Nicholas Wright and Gerry Chan and Robert Biddle. The MVP Web-Based Authentication Framework - (Short Paper). In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 16-24. Springer, 2012. [  paper | publisher ]
[3] Joseph Bonneau and S{\"o}ren Preibusch and Ross Anderson. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 25-40. Springer, 2012. [  paper | publisher ]
[4] Tyler Moore and Jie Han and Richard Clayton. The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 41-56. Springer, 2012. [  paper | publisher ]
[5] Dan Bogdanov and Riivo Talviste and Jan Willemson. Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper). In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 57-64. Springer, 2012. [  paper | publisher ]
[6] Christopher Thorpe and Steven R. Willis. Cryptographic Rule-Based Trading - (Short Paper). In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 65-72. Springer, 2012. [  paper | publisher ]
[7] Zi Lin and Denis Foo Kune and Nicholas Hopper. Efficient Private Proximity Testing with GSM Location Sketches. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 73-88. Springer, 2012. [  paper | publisher ]
[8] Benjamin Johnson and John Chuang and Jens Grossklags and Nicolas Christin. Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper). In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 89-97. Springer, 2012. [  paper | publisher ]
[9] Tao Wang and Kevin S. Bauer and Clara Forero and Ian Goldberg. Congestion-Aware Path Selection for Tor. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 98-113. Springer, 2012. [  paper | publisher ]
[10] Scott Wolchok and Eric Wustrow and Dawn Isabel and J. Alex Halderman. Attacking the Washington, D.C. Internet Voting System. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 114-128. Springer, 2012. [  paper | publisher ]
[11] Rainer B{\"o}hme. Security Audits Revisited. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 129-147. Springer, 2012. [  paper | publisher ]
[12] Attila Altay Yavuz and Peng Ning and Michael K. Reiter. Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 148-163. Springer, 2012. [  paper | publisher ]
[13] Morten Dahl and Chao Ning and Tomas Toft. On Secure Two-Party Integer Division. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 164-178. Springer, 2012. [  paper | publisher ]
[14] Rafik Chaabouni and Helger Lipmaa and Bingsheng Zhang. A Non-interactive Range Proof with Constant Communication. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 179-199. Springer, 2012. [  paper | publisher ]
[15] T.-H. Hubert Chan and Elaine Shi and Dawn Song. Privacy-Preserving Stream Aggregation with Fault Tolerance. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 200-214. Springer, 2012. [  paper | publisher ]
[16] Daniel Slamanig. Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper). In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 215-222. Springer, 2012. [  paper | publisher ]
[17] Mariana Raykova and Hang Zhao and Steven M. Bellovin. Privacy Enhanced Access Control for Outsourced Data Sharing. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 223-238. Springer, 2012. [  paper | publisher ]
[18] Andres Molina-Markham and George Danezis and Kevin Fu and Prashant J. Shenoy and David E. Irwin. Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 239-253. Springer, 2012. [  paper | publisher ]
[19] Benjamin Mood and Lara Letaw and Kevin R. B. Butler. Memory-Efficient Garbled Circuit Generation for Mobile Devices. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 254-268. Springer, 2012. [  paper | publisher ]
[20] Payman Mohassel and Salman Niksefat. Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 269-284. Springer, 2012. [  paper | publisher ]
[21] Kaoru Kurosawa and Yasuhiro Ohtaki. UC-Secure Searchable Symmetric Encryption. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 285-298. Springer, 2012. [  paper | publisher ]
[22] Junaid Jameel Ahmad and Shujun Li and Ahmad-Reza Sadeghi and Thomas Schneider. CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 299-313. Springer, 2012. [  paper | publisher ]
[23] Michael Wei{\ss} and Benedikt Heinz and Frederic Stumpf. A Cache Timing Attack on AES in Virtualization Environments. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 314-328. Springer, 2012. [  paper | publisher ]
[24] Franz Ferdinand Brasser and Sven Bugiel and Atanas Filyanov and Ahmad-Reza Sadeghi and Steffen Schulz. Softer Smartcards - Usable Cryptographic Tokens with Secure Execution. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 329-343. Springer, 2012. [  paper | publisher ]
[25] Jens Bender and {\"O}zg{\"u}r Dagdelen and Marc Fischlin and Dennis K{\"u}gler. The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 344-358. Springer, 2012. [  paper | publisher ]
[26] Aleksander Essex and Urs Hengartner. Oblivious Printing of Secret Messages in a Multi-party Setting. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 359-373. Springer, 2012. [  paper | publisher ]
[27] Anthony Van Herrewege and Stefan Katzenbeisser and Roel Maes and Roel Peeters and Ahmad-Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann. Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 374-389. Springer, 2012. [  paper | publisher ]
[28] Jeremy Clark and Aleksander Essex. CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper). In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 390-398. Springer, 2012. [  paper | publisher ]
[29] Simon Barber and Xavier Boyen and Elaine Shi and Ersin Uzun. Bitter to Better - How to Make Bitcoin a Better Currency. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 399-414. Springer, 2012. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.