Financial Cryptography and Data Security 2013 April 1, 2013 to April 5, 2013, Bonaire,Netherlands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Address:Analytic Techniques for Combating Financial Fraud Scott m Zoldi Effective detection and prevention of financial transaction fraud requires analytic techniques capable of characterizing the ...
Social Authentication: Harder than it Looks Ross Anderson , Hyoungshick Kim , John Tang N/A
The MVP Web-based Authentication Framework (Short Paper) Sonia Chiasson , Robert Biddle , Nicholas Wright , Chris Deschamps , Elizabeth Stobert , Max Hlywa , Bruna freitas Machado , Alain Forget , Gerry Chan N/A
A birthday present every eleven wallets? The security of customer-chosen banking PINs Ross Anderson , Joseph Bonneau , Sren Preibusch N/A
Securing the Stock Markets Sonia Chiasson N/A Security
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs Tyler Moore , Richard Clayton , Jie Han N/A
Deploying secure multi-party computation for financial data analysis (Short Paper) Dan Bogdanov , Riivo Talviste , Jan Willemson N/A
Cryptographic Rule-Based Trading (Short Paper) Christopher Thorpe , Steven Willis N/A
Efficient Private Proximity Testing with GSM Location Sketches Denis foo Kune , Zi Lin , Nicholas Hopper N/A
Metrics for Measuring ISP Badness: The Case of Spam (Short Paper) Nicolas Christin , Jens Grossklags , Benjamin Johnson , John Chuang N/A
Congestion-aware Path Selection for Tor Ian Goldberg , Tao Wang , Kevin Bauer , Clara Forero N/A
Attacking the Washington, D.C. Internet Voting System Scott Wolchok , J. Alex Halderman , Eric Wustrow , Dawn Isabel N/A
Security Audits Revisited Rainer Boehme N/A Security
Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Peng Ning , Attila a. Yavuz , Mike Reiter N/A
On Secure Two-party Integer Division Morten Dahl , Chao Ning , Tomas Toft N/A
A Non-Interactive Range Proof with Constant Communication Helger Lipmaa , Rafik Chaabouni , Bingsheng Zhang N/A
Privacy-Preserving Stream Aggregation with Fault Tolerance Dawn Song , Elaine Shi , T-h. hubert Chan N/A
Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig N/A Security
Privacy Enhanced Access Control for Outsourced Data Sharing Steven M. Bellovin , Mariana Raykova , Hang Zhao N/A
Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers Kevin Fu , George Danezis , Andres Molina-markham , Prashant Shenoy , David Irwin N/A
Memory Efficient Garbled Circuit Generation for Mobile Devices Kevin Butler , Benjamin Mood , Lara Letaw N/A
Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions Payman Mohassel , Salman Niksefat N/A
UC-Secure Searchable Symmetric Encryption Kaoru Kurosawa , Yasuhiro Ohtaki N/A
CommitCoin: Carbon Dating Commitments with Bitcoin (Short Paper) Jeremy Clark , Aleksander Essex N/A
Bitter to Better — How to Make Bitcoin a Better Currency Xavier Boyen , Elaine Shi , Ersin Uzun , Simon Barber N/A
Laws against adopting PETs (Privacy Enhancing Technologies) Peter Swire , Stuart Shapiro , Travis Breaux "As organizations look to mitigate their privacy risks, they are increasing being encouraged by regulatory ...
The PACE|AA Protocol for Machine Readable Travel Documents, and its Security Marc Fischlin , Jens Bender , Dagdelen , Dennis Kbcgler N/A
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-enabled RFIDs Ingrid Verbauwhede , Stefan Katzenbeisser , Ahmad-reza Sadeghi , Roel Peeters , Christian Wachsmann , Anthony van Herrewege , Roel Maes N/A
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm Ahmad-reza Sadeghi , Thomas Schneider , Junaid jameel Ahmad , Shujun Li N/A
A Cache Timing Attack on AES in Virtualization Environments Michael Wei\xc3\x9f , Benedikt Heinz , Frederic Stumpf N/A
The Importance of Being Earnest [in Security Warnings] Serge Egelman , Stuart Schechter Phishing IncludeThinkstScapes Defence UI
Quantitative Analysis of the Full Bitcoin Transaction Graph Adi Shamir , Dorit Ron IncludeThinkstScapes BitCoin