Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Gavin Andresen. What Satoshi Did Not Know. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 3-10. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[2] Olivier Thonnard, Leyla Bilge, Anand Kashyap, and Martin Lee. Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 13-31. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[3] Vaibhav Garg, Sadia Afroz, Rebekah Overdorf, and Rachel Greenstadt. Computer-Supported Cooperative Crime. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 32-43. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[4] Marie Vasek and Tyler Moore. There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 44-61. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[5] W. Brad Moore, Henry Tan, Micah Sherr, and Marcus A. Maloof. Multi-class Traffic Morphing for Encrypted VoIP Communication. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 65-85. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[6] Janaka Alawatugoda, Douglas Stebila, and Colin Boyd. Protecting Encrypted Cookies from Compression Side-Channel Attacks. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 86-106. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[7] David Fifield and Serge Egelman. Fingerprinting Web Users Through Font Metrics. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 107-124. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[8] Foteini Baldimtsi and Olga Ohrimenko. Sorting and Searching Behind the Curtain. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 127-146. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[9] Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, and Agnes Hui Chan. Resizable Tree-Based Oblivious RAM. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 147-167. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[10] Wouter Lueks and Ian Goldberg. Sublinear Scaling for Multi-Client Private Information Retrieval. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 168-186. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[11] Tom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel, and Matthew Thompson. Relay Cost Bounding for Contactless EMV Payments. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 189-206. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[12] Serge Vaudenay. Private and Secure Public-Key Distance Bounding. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 207-216. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[13] Sören Preibusch, Thomas Peetz, Gunes Acar, and Bettina Berendt. Purchase Details Leaked to PayPal. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 217-226. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[14] Dan Bogdanov, Marko Joemets, Sander Siim, and Meril Vaht. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 227-234. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[15] Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, and Thorsten Holz. Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 237-253. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[16] Asadullah Al Galib and Reihaneh Safavi-Naini. User Authentication Using Human Cognitive Abilities. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 254-271. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[17] Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, and N. Asokan. Smart and Secure Cross-Device Apps for the Internet of Advanced Things. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages . Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[18] Thomas Gross. Signatures and Efficient Proofs on Committed Graphs and NP-Statements. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 293-314. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[19] Yannis Rouselakis and Brent Waters. Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 315-332. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[20] Rachid El Bansarkhani, özgür Dagdelen, and Johannes Buchmann. Augmented Learning with Errors: The Untapped Potential of the Error Term. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 333-352. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[21] Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William Robertson, and Engin Kirda. BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 355-369. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[22] Christian Szongott, Michael Brenner, and Matthew Smith. METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 370-386. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[23] Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein, and Ahmad-Reza Sadeghi. Market-Driven Code Provisioning to Mobile Secure Hardware. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 387-404. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[24] Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, and Amalio Telenti. On Non-cooperative Genomic Privacy. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 407-426. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[25] Michela Chessa, Jens Grossklags, and Patrick Loiseau. A Short Paper on the Incentives to Share Private Information for Population Estimates. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 427-436. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[26] Paolo Palmieri and Johan Pouwelse. Paying the Guard: An Entry-Guard-Based Payment System for Tor. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 437-444. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[27] Alex Biryukov and Ivan Pustogarov. Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 445-455. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[28] Yongjun Zhao and Sherman S.M. Chow. Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 459-477. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[29] Johannes Blömer, Jakob Juhnke, and Christina Kolb. Anonymous and Publicly Linkable Reputation Systems. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 478-488. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[30] Sebastian Biedermann, Stefan Katzenbeisser, and Jakub Szefer. Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 489-496. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[31] Gus Gutoski and Douglas Stebila. Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 497-504. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[32] Yonatan Sompolinsky and Aviv Zohar. Secure High-Rate Transaction Processing in Bitcoin. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 507-527. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[33] Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. Inclusive Block Chain Protocols. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 528-547. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[34] Dominique Schöder and Mark Simkin. VeriStream - A Framework for Verifiable Data Streaming. In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 548-566. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[35] Mohsen Toorani. Cryptanalysis of a Protocol from FC'10 (Poster Abstract). In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 567. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[36] Arvo Sulakatko and Alex Norta. Web Application Security with Contactless Identity Cards Using Near Field Communication (Poster Abstract). In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 568. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]
[37] Pascal Paillier and Tancrede Lepoint. Open Card (Poster Abstract). In Rainer Böhme Tatsuaki Okamoto, editor, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 569. Springer-Verlag Berlin Heidelberg, 2015. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.