Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Mike Bond. Leaving Room for the Bad Guys. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 1. Springer, 2007. [  paper | publisher ]
[2] Thomas S. Heydt-Benjamin and Daniel V. Bailey and Kevin Fu and Ari Juels and Tom O'Hare. Vulnerabilities in First-Generation RFID-enabled Credit Cards. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 2-14. Springer, 2007. [  paper | publisher ]
[3] Larry Shi and Bogdan Carbunar and Radu Sion. Conditional E-Cash. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 15-28. Springer, 2007. [  paper | publisher ]
[4] Liqun Chen and Alberto N. Escalante and Hans L{\"o}hr and Mark Manulis and Ahmad-Reza Sadeghi. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 29-44. Springer, 2007. [  paper | publisher ]
[5] Kevin Fu. Panel: RFID Security and Privacy. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 45. Springer, 2007. [  paper | publisher ]
[6] Ross Anderson. Position Statement in RFID S{\&}P Panel: RFID and the Middleman. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 46-49. Springer, 2007. [  paper | publisher ]
[7] Jon Callas. Position Statement in RFID S{\&}P Panel: Contactless Smart Cards. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 50-52. Springer, 2007. [  paper | publisher ]
[8] Yvo Desmedt. Position Statement in RFID S{\&}P Panel: From Relative Security to Perceived Secure. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 53-56. Springer, 2007. [  paper | publisher ]
[9] Joan Feigenbaum and Aaron Johnson and Paul F. Syverson. A Model of Onion Routing with Provable Anonymity. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 57-71. Springer, 2007. [  paper | publisher ]
[10] Shouhuai Xu and Moti Yung. {\it K}-Anonymous Multi-party Secret Handshakes. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 72-87. Springer, 2007. [  paper | publisher ]
[11] Mohammad Mannan and Paul C. van Oorschot. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 88-103. Springer, 2007. [  paper | publisher ]
[12] Yvo Desmedt and Tanja Lange and Mike Burmester. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 104-118. Springer, 2007. [  paper | publisher ]
[13] Christian Rechberger and Vincent Rijmen. On Authentication with HMAC and Non-random Properties. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 119-133. Springer, 2007. [  paper | publisher ]
[14] Aggelos Kiayias and Hong-Sheng Zhou. Hidden Identity-Based Signatures. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 134-147. Springer, 2007. [  paper | publisher ]
[15] George Danezis and Claudia D\'{\i}az. Space-Efficient Private Search with Applications to Rateless Codes. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 148-162. Springer, 2007. [  paper | publisher ]
[16] Christopher Thorpe and David C. Parkes. Cryptographic Securities Exchanges. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 163-178. Springer, 2007. [  paper | publisher ]
[17] Aybek Mukhamedov and Mark Ryan. Improved Multi-party Contract Signing. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 179-191. Springer, 2007. [  paper | publisher ]
[18] N. Boris Margolin and Brian Neil Levine. Informant: Detecting Sybils Using Incentives. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 192-207. Springer, 2007. [  paper | publisher ]
[19] Ian Molloy and Jiangtao Li and Ninghui Li. Dynamic Virtual Credit Card Numbers. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 208-223. Springer, 2007. [  paper | publisher ]
[20] Omer Berkman and Odelia Moshe Ostrovsky. The Unbearable Lightness of PIN Cracking. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 224-238. Springer, 2007. [  paper | publisher ]
[21] Christopher Thorpe and Jessica Hammer and L. Jean Camp and Jon Callas and Mike Bond. Virtual Economies: Threats and Risks. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 239-244. Springer, 2007. [  paper | publisher ]
[22] Dawn N. Jutla. Usable SPACE: Security, Privacy, and Context for the Mobile User. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 245. Springer, 2007. [  paper | publisher ]
[23] Siddharth Bhatt and Bogdan Carbunar and Radu Sion and Venu Vasudevan. Personal Digital Rights Management for Mobile Cellular Devices. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 246. Springer, 2007. [  paper | publisher ]
[24] Vipul Goyal. Certificate Revocation Using Fine Grained Certificate Space Partitioning. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 247-259. Springer, 2007. [  paper | publisher ]
[25] Jun Furukawa and Hideki Imai. An Efficient Aggregate Shuffle Argument Scheme. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 260-274. Springer, 2007. [  paper | publisher ]
[26] Rachna Dhamija. Preface. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 277-279. Springer, 2007. [  paper | publisher ]
[27] Collin Jackson and Daniel R. Simon and Desney S. Tan and Adam Barth. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 281-293. Springer, 2007. [  paper | publisher ]
[28] Chris Masone and Kwang-Hyun Baek and Sean W. Smith. WSKE: Web Server Key Enabled Cookies. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 294-306. Springer, 2007. [  paper | publisher ]
[29] Ersin Uzun and Kristiina Karvonen and N. Asokan. Usability Analysis of Secure Pairing Methods. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 307-324. Springer, 2007. [  paper | publisher ]
[30] Cynthia Kuo and Jesse Walker and Adrian Perrig. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 325-340. Springer, 2007. [  paper | publisher ]
[31] Jens Grossklags and Nathan Good. Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 341-355. Springer, 2007. [  paper | publisher ]
[32] Markus Jakobsson and Alex Tsow and Ankur Shah and Eli Blevis and Youn-Kyung Lim. What Instills Trust? A Qualitative Study of Phishing. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 356-361. Springer, 2007. [  paper | publisher ]
[33] Vivek Anandpara and Andrew Dingman and Markus Jakobsson and Debin Liu and Heather Roinestad. Phishing IQ Tests Measure Fear, Not Ability. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 362-366. Springer, 2007. [  paper | publisher ]
[34] Farzaneh Asgharpour and Debin Liu and L. Jean Camp. Mental Models of Security Risks. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 367-377. Springer, 2007. [  paper | publisher ]
[35] April Slayden Mitchell and Alan H. Karp. Improving Usability by Adding Security to Video Conferencing Systems. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 378-382. Springer, 2007. [  paper | publisher ]
[36] Jakob Illeborg Pagter and Marianne Graves Petersen. A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?. In Sven Dietrich and Rachna Dhamija, editor, Financial Cryptography, volume 4886 of Lecture Notes in Computer Science, pages 383-388. Springer, 2007. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.