


default search action
17th Financial Cryptography 2013: Okinawa, Japan
- Ahmad-Reza Sadeghi:
Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7859, Springer 2013, ISBN 978-3-642-39883-4
Keynote
- William H. Saito:
Can Nature Help Us Solve Risk Management Issues? 1-5
Electronic Payment (Bitcoin)
- Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. 6-24 - Tyler Moore
, Nicolas Christin
:
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. 25-33 - Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun:
Evaluating User Privacy in Bitcoin. 34-51
Usability Aspects
- Serge Egelman
, Stuart E. Schechter:
The Importance of Being Earnest [In Security Warnings]. 52-59 - Alexander Gallego, Nitesh Saxena, Jonathan Voris:
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing. 60-68 - Tiffany Hyun-Jin Kim, Akira Yamada, Virgil D. Gligor, Jason I. Hong
, Adrian Perrig:
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. 69-77
Secure Computation
- Bingsheng Zhang, Helger Lipmaa
, Cong Wang
, Kui Ren
:
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication. 78-95 - Mahabir Prasad Jhanwar
, Reihaneh Safavi-Naini:
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size. 96-110 - Marc Joye, Benoît Libert:
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data. 111-125
Passwords
- David Aspinall, Mike Just
:
"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks. 126-143 - Sascha Fahl, Marian Harbach
, Marten Oltrogge, Thomas Muders, Matthew Smith
:
Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers. 144-161
Privacy Primitives and Non-repudiation
- Matthew K. Franklin, Haibin Zhang:
Unique Ring Signatures: A Practical Construction. 162-170 - Kwangsu Lee
, Dong Hoon Lee, Moti Yung:
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. 171-188 - Tolga Acar, Sherman S. M. Chow
, Lan Nguyen:
Accumulators and U-Prove Revocation. 189-196
Anonymity
- Johannes Buchmann, Denise Demirel, Jeroen van de Graaf:
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy. 197-204 - Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Christof Paar:
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems. 205-212
Hardware Security
- Yu Sasaki, Yang Li, Hikaru Sakamoto, Kazuo Sakiyama:
Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections. 213-220 - Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere:
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study. 221-229 - Yuanyuan Zhou
, Yu Yu, François-Xavier Standaert
, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards. 230-238
Secure Computation and Secret Sharing
- Abdelrahaman Aly, Edouard Cuvelier, Sophie Mawet, Olivier Pereira, Mathieu Van Vyve:
Securely Solving Simple Combinatorial Graph Problems. 239-257 - Seny Kamara, Charalampos Papamanthou:
Parallel and Dynamic Searchable Symmetric Encryption. 258-274 - Thomas Schneider
, Michael Zohner:
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. 275-292
Invited Talk
- N. Asokan
, Jan-Erik Ekberg, Kari Kostiainen:
The Untapped Potential of Trusted Execution Environments on Mobile Devices. 293-294
Authentication Attacks and Countermeasures
- Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling:
Stark - Tamperproof Authentication to Resist Keylogging. 295-312 - Martin Emms, Budi Arief
, Nicholas Little, Aad P. A. van Moorsel:
Risks of Offline Verify PIN on Contactless Cards. 313-321 - Manal T. Adham, Amir Azodi, Yvo Desmedt, Ioannis Karaolis:
How to Attack Two-Factor Authentication Internet Banking. 322-328 - James Kasten, Eric Wustrow, J. Alex Halderman:
CAge: Taming Certificate Authorities by Inferring Restricted Scopes. 329-337
Privacy of Data and Communciation
- Gergely Biczók
, Pern Hui Chia:
Interdependent Privacy: Let Me Share Your Data. 338-353 - Volker Roth, Benjamin Güldenring, Eleanor Gilbert Rieffel, Sven Dietrich, Lars Ries:
A Secure Submission System for Online Whistleblowing Platforms. 354-361 - Anupam Das, Nikita Borisov:
Securing Anonymous Communication Channels under the Selective DoS Attack. 362-370
Private Data Retrieval
- Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
PIRMAP: Efficient Private Information Retrieval for MapReduce. 371-385 - Justin Cappos:
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates. 386-394
Posters
- Haruhiko Fujii, Yukio Tsuruoka:
Three-Factor User Authentication Method Using Biometrics Challenge Response. 395-396 - Chrystel Gaber, Baptiste Hemery, Mohammed Achemlal, Marc Pasquet, Pascal Urien
:
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services. 397-398 - Aaron Johnson, Rob Jansen, Paul F. Syverson:
Onions for Sale: Putting Privacy on the Market. 399-400 - Tarik Moataz, Abdullatif Shikfa
:
Searchable Encryption Supporting General Boolean Expression Queries. 401 - Aude Plateaux, Vincent Coquet, Sylvain Vernois, Patrick Lacharme, Kumar Murty, Christophe Rosenberger
:
A Privacy Preserving E-Payment Architecture. 402 - Gerard Vidal, Mikel Hernaez:
Communication Services Empowered with a Classical Chaos Based Cryptosystem. 403

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.