Financial Cryptography and Data Security

Conference Proceedings Archive

[1] Tyler Moore and Nicolas Christin. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 25-33. Springer, 2013. [  paper | publisher ]
[2] Kwangsu Lee and Dong Hoon Lee and Moti Yung. Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 171-188. Springer, 2013. [  paper | publisher ]
[3] Thomas Schneider and Michael Zohner. GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 275-292. Springer, 2013. [  paper | publisher ]
[4] Serge Egelman and Stuart E. Schechter. The Importance of Being Earnest [In Security Warnings]. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 52-59. Springer, 2013. [  paper | publisher ]
[5] Dorit Ron and Adi Shamir. Quantitative Analysis of the Full Bitcoin Transaction Graph. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 6-24. Springer, 2013. [  paper | publisher ]
[6] N. Asokan and Jan-Erik Ekberg and Kari Kostiainen. The Untapped Potential of Trusted Execution Environments on Mobile Devices. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 293-294. Springer, 2013. [  paper | publisher ]
[7] Aaron Johnson and Rob Jansen and Paul F. Syverson. Onions for Sale: Putting Privacy on the Market. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 399-400. Springer, 2013. [  paper | publisher ]
[8] Tiffany Hyun-Jin Kim and Akira Yamada and Virgil D. Gligor and Jason I. Hong and Adrian Perrig. RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 69-77. Springer, 2013. [  paper | publisher ]
[9] Sascha Fahl and Marian Harbach and Marten Oltrogge and Thomas Muders and Matthew Smith. Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 144-161. Springer, 2013. [  paper | publisher ]
[10] Gergely Bicz{\'o}k and Pern Hui Chia. Interdependent Privacy: Let Me Share Your Data. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 338-353. Springer, 2013. [  paper | publisher ]
[11] Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun. Evaluating User Privacy in Bitcoin. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 34-51. Springer, 2013. [  paper | publisher ]
[12] Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan. PIRMAP: Efficient Private Information Retrieval for MapReduce. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 371-385. Springer, 2013. [  paper | publisher ]
[13] Johannes Buchmann and Denise Demirel and Jeroen van de Graaf. Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 197-204. Springer, 2013. [  paper | publisher ]
[14] Tarik Moataz and Abdullatif Shikfa. Searchable Encryption Supporting General Boolean Expression Queries. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 401. Springer, 2013. [  paper | publisher ]
[15] James Kasten and Eric Wustrow and J. Alex Halderman. CAge: Taming Certificate Authorities by Inferring Restricted Scopes. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 329-337. Springer, 2013. [  paper | publisher ]
[16] Tilo M{\"u}ller and Hans Spath and Richard M{\"a}ckl and Felix C. Freiling. Stark - Tamperproof Authentication to Resist Keylogging. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 295-312. Springer, 2013. [  paper | publisher ]
[17] Haruhiko Fujii and Yukio Tsuruoka. Three-Factor User Authentication Method Using Biometrics Challenge Response. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 395-396. Springer, 2013. [  paper | publisher ]
[18] Marc Joye and Beno\^{\i}t Libert. A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 111-125. Springer, 2013. [  paper | publisher ]
[19] Bingsheng Zhang and Helger Lipmaa and Cong Wang and Kui Ren. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 78-95. Springer, 2013. [  paper | publisher ]
[20] Manal Adham and Amir Azodi and Yvo Desmedt and Ioannis Karaolis. How to Attack Two-Factor Authentication Internet Banking. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 322-328. Springer, 2013. [  paper | publisher ]
[21] Tolga Acar and Sherman S. M. Chow and Lan Nguyen. Accumulators and U-Prove Revocation. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 189-196. Springer, 2013. [  paper | publisher ]
[22] Chrystel Gaber and Baptiste Hemery and Mohammed Achemlal and Marc Pasquet and Pascal Urien. Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 397-398. Springer, 2013. [  paper | publisher ]
[23] Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini. Unconditionally-Secure Robust Secret Sharing with Minimum Share Size. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 96-110. Springer, 2013. [  paper | publisher ]
[24] Aude Plateaux and Vincent Coquet and Sylvain Vernois and Patrick Lacharme and Kumar Murty and Christophe Rosenberger. A Privacy Preserving E-Payment Architecture. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 402. Springer, 2013. [  paper | publisher ]
[25] Yu Sasaki and Yang Li and Hikaru Sakamoto and Kazuo Sakiyama. Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 213-220. Springer, 2013. [  paper | publisher ]
[26] Alexander Gallego and Nitesh Saxena and Jonathan Voris. Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 60-68. Springer, 2013. [  paper | publisher ]
[27] Anupam Das and Nikita Borisov. Securing Anonymous Communication Channels under the Selective DoS Attack. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 362-370. Springer, 2013. [  paper | publisher ]
[28] Yuanyuan Zhou and Yu Yu and Fran\c{c}ois-Xavier Standaert and Jean-Jacques Quisquater. On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 230-238. Springer, 2013. [  paper | publisher ]
[29] Martin Emms and Budi Arief and Nicholas Little and Aad P. A. van Moorsel. Risks of Offline Verify PIN on Contactless Cards. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 313-321. Springer, 2013. [  paper | publisher ]
[30] Seny Kamara and Charalampos Papamanthou. Parallel and Dynamic Searchable Symmetric Encryption. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 258-274. Springer, 2013. [  paper | publisher ]
[31] David Aspinall and Mike Just. "Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 126-143. Springer, 2013. [  paper | publisher ]
[32] William H. Saito. Can Nature Help Us Solve Risk Management Issues?. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 1-5. Springer, 2013. [  paper | publisher ]
[33] Gerard Vidal and Mikel Hernaez. Communication Services Empowered with a Classical Chaos Based Cryptosystem. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 403. Springer, 2013. [  paper | publisher ]
[34] Justin Cappos. Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 386-394. Springer, 2013. [  paper | publisher ]
[35] Matthew K. Franklin and Haibin Zhang. Unique Ring Signatures: A Practical Construction. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 162-170. Springer, 2013. [  paper | publisher ]
[36] Jonas Maebe and Ronald De Keulenaer and Bjorn De Sutter and Koen De Bosschere. Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 221-229. Springer, 2013. [  paper | publisher ]
[37] Volker Roth and Benjamin G{\"u}ldenring and Eleanor G. Rieffel and Sven Dietrich and Lars Ries. A Secure Submission System for Online Whistleblowing Platforms. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 354-361. Springer, 2013. [  paper | publisher ]
[38] Abdelrahaman Aly and Edouard Cuvelier and Sophie Mawet and Olivier Pereira and Mathieu Van Vyve. Securely Solving Simple Combinatorial Graph Problems. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 239-257. Springer, 2013. [  paper | publisher ]
[39] Andy Rupp and Gesine Hinterw{\"a}lder and Foteini Baldimtsi and Christof Paar. P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems. In Ahmad-Reza Sadeghi, editor, Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, pages 205-212. Springer, 2013. [  paper | publisher ]

 

 

 

This conference is organized annually by the International Financial Cryptography Association.