Financial Cryptography and Data Security

Conference Proceedings Archive

[1] N. Boris Margolin and Brian Neil Levine. Quantifying Resistance to the Sybil Attack. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 1-15. Springer, 2008. [  paper | publisher ]
[2] Tyler Moore and Richard Clayton. Evaluating the Wisdom of Crowds in Assessing Phishing Websites. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 16-30. Springer, 2008. [  paper | publisher ]
[3] Jon McLachlan and Nicholas Hopper. Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 31-46. Springer, 2008. [  paper | publisher ]
[4] Shaoquan Jiang and Reihaneh Safavi-Naini. An Efficient Deniable Key Exchange Protocol (Extended Abstract). In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 47-52. Springer, 2008. [  paper | publisher ]
[5] Yvo Desmedt and Tanja Lange. Revisiting Pairing Based Group Key Exchange. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 53-68. Springer, 2008. [  paper | publisher ]
[6] Shuhua Wu and Yuefei Zhu. Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 69-82. Springer, 2008. [  paper | publisher ]
[7] Vladimir Kolesnikov and Thomas Schneider. A Practical Universal Circuit Construction and Secure Evaluation of Private Functions. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 83-97. Springer, 2008. [  paper | publisher ]
[8] Vandana Gunupudi and Stephen R. Tate. Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 98-112. Springer, 2008. [  paper | publisher ]
[9] Keith B. Frikken and Lukasz Opyrchal. PBS: Private Bartering Systems. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 113-127. Springer, 2008. [  paper | publisher ]
[10] Tim G{\"u}neysu and Christof Paar. Breaking Legacy Banking Standards with Special-Purpose Hardware. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 128-140. Springer, 2008. [  paper | publisher ]
[11] Gildas Avoine and Kassem Kalach and Jean-Jacques Quisquater. ePassport: Securing International Contacts with Contactless Chips. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 141-155. Springer, 2008. [  paper | publisher ]
[12] Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin. Good Variants of HB$^{\mbox{+}}$ Are Hard to Find. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 156-170. Springer, 2008. [  paper | publisher ]
[13] Shane Balfe and Kenneth G. Paterson. Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 171-175. Springer, 2008. [  paper | publisher ]
[14] Mohammad Mannan and Paul C. van Oorschot. Weighing Down "The Unbearable Lightness of PIN Cracking". In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 176-181. Springer, 2008. [  paper | publisher ]
[15] Debra L. Cook and Vijay K. Gurbani and Michael Daniluk. Phishwish: A Stateless Phishing Filter Using Minimal Rules. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 182-186. Springer, 2008. [  paper | publisher ]
[16] Bob Mungamuru and Stephen Weis. Competition and Fraud in Online Advertising Markets. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 187-191. Springer, 2008. [  paper | publisher ]
[17] Andr{\'e} N. Klingsheim and Kjell J{\o}rgen Hole. Identity Theft: Much Too Easy? A Study of Online Systems in Norway. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 192-196. Springer, 2008. [  paper | publisher ]
[18] Yngve Espelid and Lars-Helge Netland and Andr{\'e} N. Klingsheim and Kjell J{\o}rgen Hole. A Proof of Concept Attack against Norwegian Internet Banking Systems. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 197-201. Springer, 2008. [  paper | publisher ]
[19] S{\'e}bastien Canard and Aline Gouget and Jacques Traor{\'e}. Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 202-214. Springer, 2008. [  paper | publisher ]
[20] Stanislaw Jarecki and Josh Olsen. Proactive RSA with Non-interactive Signing. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 215-230. Springer, 2008. [  paper | publisher ]
[21] Vicente Benjumea and Seung Geol Choi and Javier Lopez and Moti Yung. Fair Traceable Multi-Group Signatures. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 231-246. Springer, 2008. [  paper | publisher ]
[22] Fuchun Guo and Yi Mu and Zhide Chen. Identity-Based Online/Offline Encryption. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 247-261. Springer, 2008. [  paper | publisher ]
[23] Alessandro Acquisti and Nicolas Christin and Bryan Parno and Adrian Perrig. Countermeasures against Government-Scale Monetary Forgery. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 262-266. Springer, 2008. [  paper | publisher ]
[24] Daniel A. Nagy and Nadzeya V. Shakel. OpenPGP-Based Financial Instruments and Dispute Arbitration. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 267-271. Springer, 2008. [  paper | publisher ]
[25] Norio Akagi and Yoshifumi Manabe and Tatsuaki Okamoto. An Efficient Anonymous Credential System. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 272-286. Springer, 2008. [  paper | publisher ]
[26] Man Ho Au and Willy Susilo and Yi Mu. Practical Anonymous Divisible E-Cash from Bounded Accumulators. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 287-301. Springer, 2008. [  paper | publisher ]
[27] Mary Ellen Zurko and Andrew S. Patrick. Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 302-306. Springer, 2008. [  paper | publisher ]
[28] Jon Callas and Yvo Desmedt and Daniel Nagy and Akira Otsuka and Jean-Jacques Quisquater and Moti Yung. Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 307-313. Springer, 2008. [  paper | publisher ]
[29] Antonio San Martino and Xavier Perramon. Securing Web Banking Applications. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 314-315. Springer, 2008. [  paper | publisher ]
[30] Peter Williams. Privacy Threats in Online Stock Quotes. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 316-317. Springer, 2008. [  paper | publisher ]
[31] N. Asokan and Jan-Erik Ekberg. A Platform for OnBoard Credentials. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 318-320. Springer, 2008. [  paper | publisher ]
[32] Ken Huang and Paul Douthit. ST{\&}E Is the Most Cost Effective Measure for Comply with Payment Card Industry (PCI) Data Security Standard. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 321-322. Springer, 2008. [  paper | publisher ]
[33] William Yurcik and Clay Woolam and Greg Hellings and Latifur Khan and Bhavani M. Thuraisingham. Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 323-324. Springer, 2008. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.