FC'05
Financial Cryptography
and Data Security
Preliminary Program
The following is a tentative schedule.
|
Sunday, February 27 | |
| 6:00PM |
|
| 6:00- 8:00 |
|
|
Monday, February 28 | |
| 8:30 |
|
| 7:00 |
|
| 9:00 |
|
| 9:30 |
Fraud within Asymmetric Multi-Hop Cellular Networks Protecting Secret Data from Insider Attacks Countering Identity Theft through Digital Uniqueness, Location Cross-Checking, and Funneling |
| 11:00 |
|
| 11:30 |
Trust and Swindling on the Internet Professor Gavish will present preliminary survey results to counter claims by online auction site operators that fraudulent activity is negligible and to make a case for more extensive research on Internet fraud. (abstract) |
| 12:30 |
|
| 1:30 |
Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures) Time Capsule Signature Policy-Based Cryptography and Applications |
| 3:00 |
|
| 3:30 |
Tentative panelists: Drew Dean, Stuart Stubblebine, Richard Clayton, Steve Myers, Mike Szydlo |
| 5:00 |
|
|
Tuesday, March 1 | |
| 7:00 |
|
| 9:00 |
A Privacy Protecting Coupon System Testing Disjointness of Private Datasets |
| 10:00 |
|
| 10:30 |
RFID Traceability A Multilayer Problem Information-Theoretic Security Analysis of Physical Uncloneable Functions |
| 11:30 |
Risk Assurance for Hedge Funds using Zero Knowledge Proofs Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure |
| 12:30 |
|
| 1:30 |
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce Securing Sensitive Data with the Ingrian DataSecure Platform Ciphire Mail Email Encryption and Authentication |
| 3:00 |
|
| 7:00 |
|
| 8:00 |
![]() |
|
Wednesday, March 2 | |
| 7:00 |
|
| 9:00 |
Usable Security: A conundrum? |
| 10:00 |
|
| 10:30 |
A User-Friendly Approach to Human Authentication of Messages Approximation in Message Authentication and Biometric Entity Authentication |
| 11:30 |
Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model Achieving Fairness in Private Contract Negotiation |
| 12:30 |
|
| 1:30 |
Small Coalitions Cannot Manipulate Voting Efficient Privacy-Preserving Protocols for Multi-Unit Auctions Event Driven Private Counters |
| 3:00 |
|
| 8:30 (PM) |
Works in Progress Papers: Secure Distributed Human Computation Secure Multi-Attribute Procurement Auction Audit File Reduction Using N-Gram Models |
|
Thursday, March 3 | |
| 7:00 |
|
| 9:00 |
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication Secure Biometric Authentication for Weak Computational Devices |
| 10:00 |
|
| 10:30 |
Tentative panelists: H William Burdett, Jr., Allan Friedman |
| 12:00 |
|
| 12:30 |
|
| 1:30 |
|






