Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Josep M. Miret and Francesc Sebé. Wlc preface. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 1. Springer, 2010. [ bib | paper | publisher ]
[2] Daniel W. Engels, Xinxin Fan, Guang Gong, Honggang Hu, and Eric M. Smith. Hummingbird: Ultra-lightweight cryptography for resource-constrained devices. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 3-18. Springer, 2010. [ bib | paper | publisher ]
[3] Sébastien Canard, Iwen Coisel, and Jonathan Etrog. Lighten encryption schemes for secure and private rfid systems. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 19-33. Springer, 2010. [ bib | paper | publisher ]
[4] J. Melia-Segui, Joaquín García-Alfaro, and Jordi Herrera-Joancomartí. Analysis and improvement of a pseudorandom number generator for epc gen2 tags. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 34-46. Springer, 2010. [ bib | paper | publisher ]
[5] Jin Tamura, Kazukuni Kobara, Hanane Fathi, and Hideki Imai. A note on a fatal error of optimized lfc private information retrieval scheme and its corrected results. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 47-56. Springer, 2010. [ bib | paper | publisher ]
[6] Guillermo Azuara, José Luis Salazar, José L. Tornos, and Joan Josep Piles. Reliable food traceability using rfid tagging. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 57-67. Springer, 2010. [ bib | paper | publisher ]
[7] Amir Moradi and Axel Poschmann. Lightweight cryptography and dpa countermeasures: A survey. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 68-79. Springer, 2010. [ bib | paper | publisher ]
[8] Santi Martínez, Concepció Roig, and Magda Valls. Securing the use of rfid-enabled banknotes. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 80-93. Springer, 2010. [ bib | paper | publisher ]
[9] Vincenzo Auletta, Carlo Blundo, Angelo De Caro, Emiliano De Cristofaro, Giuseppe Persiano, and Ivan Visconti. Increasing privacy threats in the cyberspace: The case of italian e-passports. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 94-104. Springer, 2010. [ bib | paper | publisher ]
[10] Aggelos Kiayias and Kazue Sako. Rlcps preface. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 105. Springer, 2010. [ bib | paper | publisher ]
[11] Jean-Sébastien Coron, Aline Gouget, Pascal Paillier, and Karine Villegas. Spake: A single-party public-key authenticated key exchange protocol for contact-less applications. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 107-122. Springer, 2010. [ bib | paper | publisher ]
[12] Elli Androulaki and Steven M. Bellovin. A secure and privacy-preserving targeted ad-system. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 123-135. Springer, 2010. [ bib | paper | publisher ]
[13] Seny Kamara and Kristin Lauter. Cryptographic cloud storage. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 136-149. Springer, 2010. [ bib | paper | publisher ]
[14] Ahmad-Reza Sadeghi and Steffen Schulz. Extending ipsec for efficient remote attestation. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 150-165. Springer, 2010. [ bib | paper | publisher ]
[15] David W. Kravitz. Open mobile alliance secure content exchange: Introducing key management constructs and protocols for compromise-resilient easing of drm restrictions. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 166-181. Springer, 2010. [ bib | paper | publisher ]
[16] Shin'ichiro Matsuo, Kunihiko Miyazaki, Akira Otsuka, and David A. Basin. How to evaluate the security of real-life cryptographic protocols? - the cases of iso/iec 29128 and cryptrec. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 182-194. Springer, 2010. [ bib | paper | publisher ]
[17] Sven Dietrich. Wecsr preface. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 195. Springer, 2010. [ bib | paper | publisher ]
[18] Kenneth R. Fleischmann. Preaching what we practice: Teaching ethical decision-making to computer security professionals. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 197-202. Springer, 2010. [ bib | paper | publisher ]
[19] Karsten Loesing, Steven J. Murdoch, and Roger Dingledine. A case study on measuring statistical data in the tor anonymity network. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 203-215. Springer, 2010. [ bib | paper | publisher ]
[20] David Dittrich, Felix Leder, and Tillmann Werner. A case study in ethical decision making regarding remote mitigation of botnets. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 216-230. Springer, 2010. [ bib | paper | publisher ]
[21] John Aycock and John Sullins. Ethical proactive threat research. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 231-239. Springer, 2010. [ bib | paper | publisher ]
[22] Erin Kenneally, Michael Bailey, and Douglas Maughan. A framework for understanding and applying ethical principles in network and security research. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 240-246. Springer, 2010. [ bib | paper | publisher ]
[23] Lorrie Faith Cranor. Ethical concerns in computer security and privacy research involving human subjects. In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 247-249. Springer, 2010. [ bib | paper | publisher ]
[24] Len Sassaman. Ethical guidelines for computer security researchers: "be reasonable". In Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, and Francesc Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 250-255. Springer, 2010. [ bib | paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.