Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Rigel Gjomemo, Hafiz Malik, Nilesh Sumb, V.N. Venkatakrishnan, and Rashid Ansari. Digital Check Forgery Attacks on Client Check Truncation Systems. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 3-20. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[2] Steven J. Murdoch and Ross Anderson. Security Protocols and Evidence: Where Many Payment Systems Fail. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 21-32. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[3] Tyler Moore and Richard Clayton. The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 33-48. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[4] Adam McCarthy, Ben Smyth, and Elizabeth A. Quaglia. Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 51-63. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[5] Franziska Roesner, Brian T. Gill, and Tadayoshi Kohno. Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 64-76. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[6] Benjamin Henne, Maximilian Koch, and Matthew Smith. On the Awareness, Control and Privacy of Shared Photo Metadata. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 77-88. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[7] Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg, and J. Alex Halderman. Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 89-96. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[8] Jan Stanek, Alessandro Sorniotti, Elli Androulaki, and Lukas Kencl. A Secure Data Deduplication Scheme for Cloud Storage. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 99-118. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[9] Clementine Maurice, Christoph Neumann, Olivier Heen, and Aurelien Francillon. Confidentiality Issues on a GPU in a Virtualized Environment. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 119-135. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[10] Mehdi Tibouchi. Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 139-156. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[11] Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, and Eric Wustrow. Elliptic Curve Cryptography in Practice. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 157-175. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[12] Sebastiaan de Hoogh, Berry Schoenmakers, Ping Chen, and Harm op den Akker. Practical Secure Decision Tree Learning in a Teletreatment Application. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 179-194. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[13] Seny Kamara, Payman Mohassel, Mariana Raykova, and Saeed Sadeghian. Scaling Private Set Intersection to Billion-Element Sets. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 195-215. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[14] Prastudy Fauzi, Helger Lipmaa, and Bingsheng Zhang. Efficient Non-Interactive Zero Knowledge Arguments for Set Operations. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 216-233. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[15] Kaoru Kurosawa. Garbled Searchable Symmetric Encryption. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 234-251. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[16] Julien Bringer, Herve Chabanne, Roch Lescuyer, and Alain Patey. Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 255-272. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[17] Lucjan Hanzlik and Kamil Kluczniak. A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 273-282. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[18] Lucjan Hanzlik, Kamil Kluczniak, and Miroslaw Kutylowski. Attack on U-Prove Revocation Scheme from FC13 - Passing Verification by Revoked Users. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 283-290. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[19] Sebastian Pape. Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 291-303. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[20] Henning Perl, Sascha Fahl, and Matthew Smith. You Wont Be Needing These Any More: On Removing Unused Certificates from Trust Stores. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 307-315. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[21] Nicholas Hopper. Challenges in Protecting Tor Hidden Services from Botnet Abuse. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 316-325. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[22] Marie Vasek and Tyler Moore. Identifying Risk Factors for Webserver Compromise. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 326-345. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[23] Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, and N. Asokan. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 349-364. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[24] Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, and Ahmad-Reza Sadeghi. On the (In)Security of Mobile Two-Factor Authentication. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 265-383. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[25] Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser, and Ahmad-Reza Sadeghi. MoP-2-MoP - Mobile Private Microblogging. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 384-396. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[26] John Ross Wallrabenstein and Chris Clifton. Privacy Preserving Tatonnement. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 399-416. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[27] Aron Laszka, Benjamin Johnson, Jens Grossklags, and Mark Felegyhazi. Estimating Systematic Risk in Real-World Networks. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 417-435. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[28] Ittay Eyal and Emin G{\"u}n Sirer. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 436-454. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[29] Michele Spagnuolo, Federico Maggi, and Stefano Zanero. BitIodine: Extracting Intelligence from the Bitcoin Network. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 457-468. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[30] Philip Koshy, Diana Koshy, and Patrick McDaniel. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 469-485. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]
[31] Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, and Edward W. Felten. Mixcoin: Anonymity for Bitcoin with Accountable Mixes. In Nicolas Christin Reihaneh Safavi-Naini, editor, Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 486-504. Springer-Verlag Berlin Heidelberg, 2014. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.