Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Jack R. Selby. Analyzing the Success and Failure of Recent e-Payment Schemes (Abstract). In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 1. Springer, 2004. [  paper | publisher ]
[2] Ronald L. Rivest. Peppercoin Micropayments. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 2-8. Springer, 2004. [  paper | publisher ]
[3] Craig Gentry and Zulfikar Ramzan. Microcredits for Verifiable Foreign Service Provider Metering. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 9-23. Springer, 2004. [  paper | publisher ]
[4] Matthias Enzmann and Marc Fischlin and Markus Schneider. A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 24-38. Springer, 2004. [  paper | publisher ]
[5] Stuart G. Stubblebine and Paul C. van Oorschot. Addressing Online Dictionary Attacks with Login Histories and Humans-in-the-Loop (Extended Abstract). In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 39-53. Springer, 2004. [  paper | publisher ]
[6] Lawrence O'Gorman and Amit Bagga and Jon Louis Bentley. Call Center Customer Verification by Query-Directed Passwords. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 54-67. Springer, 2004. [  paper | publisher ]
[7] Jacques Stern. Cryptography and the French Banking Cards: Past, Present, Future. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 68-69. Springer, 2004. [  paper | publisher ]
[8] Simon Pugh. PayPass Security and Risk (Abstract). In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 70-71. Springer, 2004. [  paper | publisher ]
[9] Aggelos Kiayias and Moti Yung. The Vector-Ballot e-Voting Approach. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 72-89. Springer, 2004. [  paper | publisher ]
[10] Jens Groth. Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 90-104. Springer, 2004. [  paper | publisher ]
[11] Andrew S. Patrick. Usability and Acceptability of Biometric Security Systems. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 105. Springer, 2004. [  paper | publisher ]
[12] L. Jean Camp. Mental Models of Computer Security. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 106-111. Springer, 2004. [  paper | publisher ]
[13] William Yurcik. Visualization Tools for Security Administrators. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 112-113. Springer, 2004. [  paper | publisher ]
[14] Ka-Ping Yee. Secure Interaction Design. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 114-115. Springer, 2004. [  paper | publisher ]
[15] Jon M. Peha. Bringing Payment Technology to the Unbanked (Abstract). In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 116. Springer, 2004. [  paper | publisher ]
[16] Edith Elkind and Helger Lipmaa. Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 117-131. Springer, 2004. [  paper | publisher ]
[17] Makoto Yokoo and Koutarou Suzuki. Secure Generalized Vickrey Auction without Third-party Servers. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 132-146. Springer, 2004. [  paper | publisher ]
[18] Elisavet Konstantinou and Vasiliki Liagkou and Paul G. Spirakis and Yannis C. Stamatiou and Moti Yung. Electronic National Lotteries. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 147-163. Springer, 2004. [  paper | publisher ]
[19] Giuseppe Ateniese and Breno de Medeiros. Identity-Based Chameleon Hash and Applications. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 164-180. Springer, 2004. [  paper | publisher ]
[20] Vanessa Teague. Selecting Correlated Random Actions. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 181-195. Springer, 2004. [  paper | publisher ]
[21] Giuseppe Persiano and Ivan Visconti. An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 196-211. Springer, 2004. [  paper | publisher ]
[22] Jaap-Henk Hoepman. The Ephemeral Pairing Problem. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 212-226. Springer, 2004. [  paper | publisher ]
[23] Nick Mathewson and Roger Dingledine. Mixminion: Strong Anonymity for Financial Cryptography. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 227-232. Springer, 2004. [  paper | publisher ]
[24] Marc Rennhard and Bernhard Plattner. Practical Anonymity for the Masses with MorphMix. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 233-250. Springer, 2004. [  paper | publisher ]
[25] Brian Neil Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright. Timing Attacks in Low-Latency Mix Systems (Extended Abstract). In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 251-265. Springer, 2004. [  paper | publisher ]
[26] Ron Berman and Amos Fiat and Amnon Ta-Shma. Provable Unlinkability against Traffic Analysis. In Ari Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 266-280. Springer, 2004. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.