![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
17th Financial Cryptography 2013: Okinawa, Japan
- Ahmad-Reza Sadeghi:
Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7859, Springer 2013, ISBN 978-3-642-39883-4
Keynote
- William H. Saito:
Can Nature Help Us Solve Risk Management Issues? 1-5
Electronic Payment (Bitcoin)
- Dorit Ron, Adi Shamir:
Quantitative Analysis of the Full Bitcoin Transaction Graph. 6-24 - Tyler Moore, Nicolas Christin
:
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk. 25-33 - Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun:
Evaluating User Privacy in Bitcoin. 34-51
Usability Aspects
- Serge Egelman
, Stuart E. Schechter:
The Importance of Being Earnest [In Security Warnings]. 52-59 - Alexander Gallego, Nitesh Saxena, Jonathan Voris:
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing. 60-68 - Tiffany Hyun-Jin Kim, Akira Yamada, Virgil D. Gligor, Jason I. Hong
, Adrian Perrig:
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. 69-77
Secure Computation
- Bingsheng Zhang, Helger Lipmaa
, Cong Wang
, Kui Ren
:
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication. 78-95 - Mahabir Prasad Jhanwar
, Reihaneh Safavi-Naini:
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size. 96-110 - Marc Joye, Benoît Libert:
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data. 111-125
Passwords
- David Aspinall, Mike Just
:
"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks. 126-143 - Sascha Fahl, Marian Harbach
, Marten Oltrogge, Thomas Muders, Matthew Smith:
Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers. 144-161
Privacy Primitives and Non-repudiation
- Matthew K. Franklin, Haibin Zhang:
Unique Ring Signatures: A Practical Construction. 162-170 - Kwangsu Lee
, Dong Hoon Lee, Moti Yung:
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency. 171-188 - Tolga Acar, Sherman S. M. Chow
, Lan Nguyen:
Accumulators and U-Prove Revocation. 189-196
Anonymity
- Johannes Buchmann, Denise Demirel, Jeroen van de Graaf:
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy. 197-204 - Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Christof Paar:
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems. 205-212
Hardware Security
- Yu Sasaki, Yang Li, Hikaru Sakamoto, Kazuo Sakiyama:
Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections. 213-220 - Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere:
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study. 221-229 - Yuanyuan Zhou
, Yu Yu, François-Xavier Standaert
, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards. 230-238
Secure Computation and Secret Sharing
- Abdelrahaman Aly, Edouard Cuvelier, Sophie Mawet, Olivier Pereira, Mathieu Van Vyve:
Securely Solving Simple Combinatorial Graph Problems. 239-257 - Seny Kamara, Charalampos Papamanthou:
Parallel and Dynamic Searchable Symmetric Encryption. 258-274 - Thomas Schneider
, Michael Zohner:
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits. 275-292
Invited Talk
- N. Asokan
, Jan-Erik Ekberg, Kari Kostiainen:
The Untapped Potential of Trusted Execution Environments on Mobile Devices. 293-294
Authentication Attacks and Countermeasures
- Tilo Müller, Hans Spath, Richard Mäckl, Felix C. Freiling:
Stark - Tamperproof Authentication to Resist Keylogging. 295-312 - Martin Emms, Budi Arief
, Nicholas Little, Aad P. A. van Moorsel:
Risks of Offline Verify PIN on Contactless Cards. 313-321 - Manal T. Adham, Amir Azodi, Yvo Desmedt, Ioannis Karaolis:
How to Attack Two-Factor Authentication Internet Banking. 322-328 - James Kasten, Eric Wustrow, J. Alex Halderman:
CAge: Taming Certificate Authorities by Inferring Restricted Scopes. 329-337
Privacy of Data and Communciation
- Gergely Biczók
, Pern Hui Chia:
Interdependent Privacy: Let Me Share Your Data. 338-353 - Volker Roth, Benjamin Güldenring, Eleanor Gilbert Rieffel, Sven Dietrich, Lars Ries:
A Secure Submission System for Online Whistleblowing Platforms. 354-361 - Anupam Das, Nikita Borisov:
Securing Anonymous Communication Channels under the Selective DoS Attack. 362-370
Private Data Retrieval
- Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
PIRMAP: Efficient Private Information Retrieval for MapReduce. 371-385 - Justin Cappos:
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates. 386-394
Posters
- Haruhiko Fujii, Yukio Tsuruoka:
Three-Factor User Authentication Method Using Biometrics Challenge Response. 395-396 - Chrystel Gaber, Baptiste Hemery, Mohammed Achemlal, Marc Pasquet, Pascal Urien
:
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services. 397-398 - Aaron Johnson, Rob Jansen, Paul F. Syverson:
Onions for Sale: Putting Privacy on the Market. 399-400 - Tarik Moataz, Abdullatif Shikfa
:
Searchable Encryption Supporting General Boolean Expression Queries. 401 - Aude Plateaux, Vincent Coquet, Sylvain Vernois, Patrick Lacharme, Kumar Murty, Christophe Rosenberger
:
A Privacy Preserving E-Payment Architecture. 402 - Gerard Vidal, Mikel Hernaez:
Communication Services Empowered with a Classical Chaos Based Cryptosystem. 403
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.