Financial Cryptography and Data Security
Conference Proceedings Archive
[1] | Tyler Moore and Nicolas Christin. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 25-33. Springer, 2013. [ paper | publisher ] |
[2] | Kwangsu Lee and Dong Hoon Lee and Moti Yung. Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 171-188. Springer, 2013. [ paper | publisher ] |
[3] | Thomas Schneider and Michael Zohner. GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 275-292. Springer, 2013. [ paper | publisher ] |
[4] | Serge Egelman and Stuart E. Schechter. The Importance of Being Earnest [In Security Warnings]. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 52-59. Springer, 2013. [ paper | publisher ] |
[5] | Dorit Ron and Adi Shamir. Quantitative Analysis of the Full Bitcoin Transaction Graph. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 6-24. Springer, 2013. [ paper | publisher ] |
[6] | N. Asokan and Jan-Erik Ekberg and Kari Kostiainen. The Untapped Potential of Trusted Execution Environments on Mobile Devices. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 293-294. Springer, 2013. [ paper | publisher ] |
[7] | Aaron Johnson and Rob Jansen and Paul F. Syverson. Onions for Sale: Putting Privacy on the Market. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 399-400. Springer, 2013. [ paper | publisher ] |
[8] | Tiffany Hyun-Jin Kim and Akira Yamada and Virgil D. Gligor and Jason I. Hong and Adrian Perrig. RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 69-77. Springer, 2013. [ paper | publisher ] |
[9] | Sascha Fahl and Marian Harbach and Marten Oltrogge and Thomas Muders and Matthew Smith. Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 144-161. Springer, 2013. [ paper | publisher ] |
[10] | Gergely Bicz{\'o}k and Pern Hui Chia. Interdependent Privacy: Let Me Share Your Data. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 338-353. Springer, 2013. [ paper | publisher ] |
[11] | Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun. Evaluating User Privacy in Bitcoin. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 34-51. Springer, 2013. [ paper | publisher ] |
[12] | Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan. PIRMAP: Efficient Private Information Retrieval for MapReduce. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 371-385. Springer, 2013. [ paper | publisher ] |
[13] | Johannes Buchmann and Denise Demirel and Jeroen van de Graaf. Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 197-204. Springer, 2013. [ paper | publisher ] |
[14] | Tarik Moataz and Abdullatif Shikfa. Searchable Encryption Supporting General Boolean Expression Queries. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 401. Springer, 2013. [ paper | publisher ] |
[15] | James Kasten and Eric Wustrow and J. Alex Halderman. CAge: Taming Certificate Authorities by Inferring Restricted Scopes. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 329-337. Springer, 2013. [ paper | publisher ] |
[16] | Tilo M{\"u}ller and Hans Spath and Richard M{\"a}ckl and Felix C. Freiling. Stark - Tamperproof Authentication to Resist Keylogging. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 295-312. Springer, 2013. [ paper | publisher ] |
[17] | Haruhiko Fujii and Yukio Tsuruoka. Three-Factor User Authentication Method Using Biometrics Challenge Response. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 395-396. Springer, 2013. [ paper | publisher ] |
[18] | Marc Joye and Beno\^{\i}t Libert. A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 111-125. Springer, 2013. [ paper | publisher ] |
[19] | Bingsheng Zhang and Helger Lipmaa and Cong Wang and Kui Ren. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 78-95. Springer, 2013. [ paper | publisher ] |
[20] | Manal Adham and Amir Azodi and Yvo Desmedt and Ioannis Karaolis. How to Attack Two-Factor Authentication Internet Banking. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 322-328. Springer, 2013. [ paper | publisher ] |
[21] | Tolga Acar and Sherman S. M. Chow and Lan Nguyen. Accumulators and U-Prove Revocation. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 189-196. Springer, 2013. [ paper | publisher ] |
[22] | Chrystel Gaber and Baptiste Hemery and Mohammed Achemlal and Marc Pasquet and Pascal Urien. Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 397-398. Springer, 2013. [ paper | publisher ] |
[23] | Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini. Unconditionally-Secure Robust Secret Sharing with Minimum Share Size. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 96-110. Springer, 2013. [ paper | publisher ] |
[24] | Aude Plateaux and Vincent Coquet and Sylvain Vernois and Patrick Lacharme and Kumar Murty and Christophe Rosenberger. A Privacy Preserving E-Payment Architecture. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 402. Springer, 2013. [ paper | publisher ] |
[25] | Yu Sasaki and Yang Li and Hikaru Sakamoto and Kazuo Sakiyama. Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 213-220. Springer, 2013. [ paper | publisher ] |
[26] | Alexander Gallego and Nitesh Saxena and Jonathan Voris. Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 60-68. Springer, 2013. [ paper | publisher ] |
[27] | Anupam Das and Nikita Borisov. Securing Anonymous Communication Channels under the Selective DoS Attack. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 362-370. Springer, 2013. [ paper | publisher ] |
[28] | Yuanyuan Zhou and Yu Yu and Fran\c{c}ois-Xavier Standaert and Jean-Jacques Quisquater. On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 230-238. Springer, 2013. [ paper | publisher ] |
[29] | Martin Emms and Budi Arief and Nicholas Little and Aad P. A. van Moorsel. Risks of Offline Verify PIN on Contactless Cards. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 313-321. Springer, 2013. [ paper | publisher ] |
[30] | Seny Kamara and Charalampos Papamanthou. Parallel and Dynamic Searchable Symmetric Encryption. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 258-274. Springer, 2013. [ paper | publisher ] |
[31] | David Aspinall and Mike Just. "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 126-143. Springer, 2013. [ paper | publisher ] |
[32] | William H. Saito. Can Nature Help Us Solve Risk Management Issues?. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 1-5. Springer, 2013. [ paper | publisher ] |
[33] | Gerard Vidal and Mikel Hernaez. Communication Services Empowered with a Classical Chaos Based Cryptosystem. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 403. Springer, 2013. [ paper | publisher ] |
[34] | Justin Cappos. Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 386-394. Springer, 2013. [ paper | publisher ] |
[35] | Matthew K. Franklin and Haibin Zhang. Unique Ring Signatures: A Practical Construction. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 162-170. Springer, 2013. [ paper | publisher ] |
[36] | Jonas Maebe and Ronald De Keulenaer and Bjorn De Sutter and Koen De Bosschere. Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 221-229. Springer, 2013. [ paper | publisher ] |
[37] | Volker Roth and Benjamin G{\"u}ldenring and Eleanor G. Rieffel and Sven Dietrich and Lars Ries. A Secure Submission System for Online Whistleblowing Platforms. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 354-361. Springer, 2013. [ paper | publisher ] |
[38] | Abdelrahaman Aly and Edouard Cuvelier and Sophie Mawet and Olivier Pereira and Mathieu Van Vyve. Securely Solving Simple Combinatorial Graph Problems. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 239-257. Springer, 2013. [ paper | publisher ] |
[39] | Andy Rupp and Gesine Hinterw{\"a}lder and Foteini Baldimtsi and Christof Paar. P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 205-212. Springer, 2013. [ paper | publisher ] |
This conference is organized annually by the International Financial Cryptography Association.