Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Debin Liu and XiaoFeng Wang and L. Jean Camp. Mitigating Inadvertent Insider Threats with Incentives. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 1-16. Springer, 2009. [  paper | publisher ]
[2] Benjamin Edelman. Deterring Online Advertising Fraud through Optimal Payment in Arrears. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 17-31. Springer, 2009. [  paper | publisher ]
[3] Aggelos Kiayias and B{\"u}lent Yener and Moti Yung. Privacy-Preserving Information Markets for Computing Statistical Data. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 32-50. Springer, 2009. [  paper | publisher ]
[4] Susan Landau and Hubert L{\^e} Van G{\^o}ng and Robin Wilton. Achieving Privacy in a Federated Identity Management System. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 51-70. Springer, 2009. [  paper | publisher ]
[5] M. Eric Johnson. Data Hemorrhages in the Health-Care Sector. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 71-89. Springer, 2009. [  paper | publisher ]
[6] Tomas Toft. Solving Linear Programs Using Multiparty Computation. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 90-107. Springer, 2009. [  paper | publisher ]
[7] Jan Camenisch and Gregory M. Zaverucha. Private Intersection of Certified Sets. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 108-127. Springer, 2009. [  paper | publisher ]
[8] Justin Brickell and Vitaly Shmatikov. Privacy-Preserving Classifier Learning. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 128-147. Springer, 2009. [  paper | publisher ]
[9] Christos Ioannidis and David J. Pym and Julian Williams. Investments and Trade-offs in the Economics of Information Security. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 148-166. Springer, 2009. [  paper | publisher ]
[10] Neal Fultz and Jens Grossklags. Blue versus Red: Towards a Model of Distributed Security Attacks. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 167-183. Springer, 2009. [  paper | publisher ]
[11] Saar Drimer and Steven J. Murdoch and Ross J. Anderson. Optimised to Fail: Card Readers for Online Banking. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 184-200. Springer, 2009. [  paper | publisher ]
[12] Shouhuai Xu and Moti Yung. Expecting the Unexpected: Towards Robust Credential Infrastructure. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 201-221. Springer, 2009. [  paper | publisher ]
[13] Deepak Vijaywargi and Dave Lewis and Darko Kirovski. Optical DNA. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 222-229. Springer, 2009. [  paper | publisher ]
[14] Cormac Herley and Paul C. van Oorschot and Andrew S. Patrick. Passwords: If We're So Smart, Why Are We Still Using Them?. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 230-237. Springer, 2009. [  paper | publisher ]
[15] Ziqing Mao and Ninghui Li and Ian Molloy. Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 238-255. Springer, 2009. [  paper | publisher ]
[16] Tyler Moore and Richard Clayton. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 256-272. Springer, 2009. [  paper | publisher ]
[17] Norman Danner and Danny Krizanc and Marc Liberatore. Detecting Denial of Service Attacks in Tor. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 273-284. Springer, 2009. [  paper | publisher ]
[18] Christopher Thorpe and David C. Parkes. Cryptographic Combinatorial Securities Exchanges. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 285-304. Springer, 2009. [  paper | publisher ]
[19] David C. Parkes and Michael O. Rabin and Christopher Thorpe. Cryptographic Combinatorial Clock-Proxy Auctions. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 305-324. Springer, 2009. [  paper | publisher ]
[20] Peter Bogetoft and Dan Lund Christensen and Ivan Damg{\aa}rd and Martin Geisler and Thomas P. Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael I. Schwartzbach and Tomas Toft. Secure Multiparty Computation Goes Live. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 325-343. Springer, 2009. [  paper | publisher ]
[21] Ryan W. Gardner and Sujata Garera and Aviel D. Rubin. Coercion Resistant End-to-end Voting. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 344-361. Springer, 2009. [  paper | publisher ]
[22] Jens-Matthias Bohli and Andreas Pashalidis. Relations Among Privacy Notions. In Roger Dingledine and Philippe Golle, editor, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 362-380. Springer, 2009. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.