Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Seny Kamara and Lei Wei. Garbled circuits via structured encryption. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 177-188. Springer, 2013. [ bib | paper | publisher ]
[2] Benjamin Henne and Matthew Smith. Awareness about photos on the web and how privacy-privacy-tradeoffs could help. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 131-148. Springer, 2013. [ bib | paper | publisher ]
[3] Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. The impact of length and mathematical operators on the usability and security of system-assigned one-time pins. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 34-51. Springer, 2013. [ bib | paper | publisher ]
[4] Julien Bringer, Hervé Chabanne, and Alain Patey. Shade: Secure hamming distance computation from oblivious transfer. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 164-176. Springer, 2013. [ bib | paper | publisher ]
[5] Shigeo Tsujii, Hiroshi Doi, Ryou Fujita, Masahito Gotaishi, Yukiyasu Tsunoo, and Takahiko Syouji. Privacy preserving data processing with collaboration of homomorphic cryptosystems. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 201-212. Springer, 2013. [ bib | paper | publisher ]
[6] Ciara Moore, Neil Hanley, John McAllister, Máire O'Neill, Elizabeth O'Sullivan, and Xiaolin Cao. Targeting fpga dsp slices for a large integer multiplier for integer based fhe. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 226-237. Springer, 2013. [ bib | paper | publisher ]
[7] Ping Fan Ke, Kai Lung Hui, and Wei T. Yue. Information security as a credence good. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 83-93. Springer, 2013. [ bib | paper | publisher ]
[8] Tancrède Lepoint and Pascal Paillier. On the minimal number of bootstrappings in homomorphic circuits. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 189-200. Springer, 2013. [ bib | paper | publisher ]
[9] Marian Harbach, Sascha Fahl, Polina Yakovleva, and Matthew Smith. Sorry, i don't get it: An analysis of warning message texts. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 94-111. Springer, 2013. [ bib | paper | publisher ]
[10] Iacovos Kirlappos, Adam Beautement, and Martina Angela Sasse. "comply or die" is dead: Long live security-aware principal agents. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 70-82. Springer, 2013. [ bib | paper | publisher ]
[11] Tiffany Hyun-Jin Kim, Virgil D. Gligor, Jorge Guajardo, Jason I. Hong, and Adrian Perrig. Soulmate or acquaintance? visualizing tie strength for trust inference. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 112-130. Springer, 2013. [ bib | paper | publisher ]
[12] Majid Arianezhad, Douglas Stebila, and Behzad Mozaffari. Usability and security of gaze-based graphical grid passwords. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 17-33. Springer, 2013. [ bib | paper | publisher ]
[13] John C.-I. Chuang, Hamilton Nguyen, Charles Wang, and Benjamin Johnson. I think, therefore i am: Usability and security of authentication using brainwaves. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 1-16. Springer, 2013. [ bib | paper | publisher ]
[14] Seny Kamara and Mariana Raykova. Parallel homomorphic encryption. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 213-225. Springer, 2013. [ bib | paper | publisher ]
[15] Gregory Norcie, Emiliano De Cristofaro, and Victoria Bellotti. Bootstrapping trust in online dating: Social verification of online dating profiles. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 149-163. Springer, 2013. [ bib | paper | publisher ]
[16] Timothy Vidas, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor, and Nicolas Christin. Qrishing: The susceptibility of smartphone users to qr code phishing attacks. In Andrew A. Adams, Michael Brenner, and Matthew Smith, editors, Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, pages 52-69. Springer, 2013. [ bib | paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.