[fc-announce] FC05 Preliminary Program Now Online

R.A. Hettinga rah at shipwright.com
Wed Dec 29 11:28:18 PST 2004


--- begin forwarded text


User-Agent: Microsoft-Entourage/11.1.0.040913
From: "Stuart E. Schechter" <ses at ll.mit.edu>
To: <fc-announce at ifca.ai>
Subject: [fc-announce] FC05 Preliminary Program Now Online
Sender: fc-announce-admin at ifca.ai
Date: Wed, 29 Dec 2004 11:37:27 -0500

The program and preliminary schedule can be found at:
   http://www.ifca.ai/fc05/program.html

   An official call for participation will be sent out as soon as
registration is open.  (We expect this to be early next week.)

   If you've yet to make travel arrangements, I would encourage you to stay
in Dominica on Thursday night (3/3) or longer to avoid a rush to the airport
after the morning program.  In the past, attendees who have stayed after the
conference have found that this is an excellent time to meet with others.


Keynote Speakers
================

Lynne Coventry (NCR)
Bezalel Gavish (Southern Methodist University)

Panel Sessions
==============

Financial Technology in the Developing World
    Allan Friedman (Harvard) - Organizer
    Alessandro Acquisti (CMU)
    H William Burdett, Jr. (Foley & Lardner, LLP)
    Jon Peha (CMU)

Phishing
    Steve Myers (Indiana University) - Organizer
    Drew Dean (SRI)
    Stuart Stubblebine (Stubblebine Research Labs)
    Richard Clayton (Cambridge, UK)
    Markus Jakobsson (Indiana University CACR)

Research Papers
===============

Fraud within Asymmetric Multi-Hop Cellular Networks
    Gildas Avoine (EPFL, Lausanne, Switzerland)

Information-Theoretic Security Analysis of Physical Uncloneable Functions
    P. Tuyls
    B. Skoric
    S. Stallinga
    A.H. Akkermans
    W. Ophey (Philips Research Laboratories, The Netherlands)

Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce.
    Simson L. Garfinkel
    Jeffrey I. Schiller
    Erik Nordlander (MIT)
    David Margrave (Amazon.com)
    Robert C. Miller (MIT)

Identity-based Partial Message Recovery Signatures
(or How to Shorten ID-based Signatures)
    Fangguo Zhang (Sun Yat Sen University, P.R.China)
    Yi Mu
    Willy Susilo (University of Wollongong, Australia)

How to Non-Interactively Update a Secret
    Eujin Goh (Stanford University)
    Philippe Golle (Palo Alto Research Center)

Interactive Diffie-Hellman Assumptions with Applications
to Password-Based Authentication
    Michel Abdalla
    David Pointcheval (Ecole Normale Superieure)

Achieving Fairness in Private Contract Negotiation
    Keith Frikken
    Mikhail Atallah (Purdue University)

Protecting Secret Data from Insider Attacks
    David Dagon
    Wenke Lee
    Richard Lipton (Georgia Tech)

RFID Traceability A Multilayer Problem
    Gildas Avoine
    Philippe Oechslin (EPFL Lausanne Switzerland)

A User-Friendly Approach to Human Authentication of Messages
    Jeff King
    Andre dos Santos (Georgia Tech)

Countering Identity Theft through Digital Uniqueness,
Location Cross-Checking, and Funneling
    P.C. van Oorschot (Carleton University)
    S. Stubblebine (Stubblebine Research Labs)

Policy-Based Cryptography and Applications
    Walid Bagga
    Refik Molva (Eurecom)

A Privacy Protecting Coupon System
    Liqun Chen (HP Laboratories)
    Matthias Enzmann (Fraunhofer SIT)
    Ahmad-Reza Sadeghi (University of Bochum)
    Markus Schneider (Fraunhofer SIT)
    Michael Steiner (IBM T.J. Watson)

Analysis of a Multi-Party Fair Exchange Protocol and Formal
Proof of Correctness in the Strand Space model
    Steve Kremer
    Aybek Mukhamedov
    Eike Ritter (University of Birmingham, UK)

Secure Biometric Authentication for Weak Computational Devices
    Mikhail J. Atallah
    Keith B. Frikken (Purdue)
    Michael T. Goodrich (UC Irvine)
    Roberto Tamassia (Brown)

Small Coalitions Cannot Manipulate Voting
    Edith Elkind (Princeton University)
    Helger Lipmaa (Helsinki University of Technology)

Efficient Privacy-Preserving Protocols for Multi-Unit Auctions
    Felix Brandt (Stanford)
    Tuomas Sandholm (Carnegie Mellon University)

Risk Assurance for Hedge Funds using Zero Knowledge Proofs
    Michael Szydlo (RSA Security/Independent)

Testing Disjointness of Private Datasets
    Aggelos Kiayias (University of Connecticut)
    Antonina Mitrofanova (Rutgers University)

Time Capsule Signature
    Yevgeniy Dodis (NYU)
    Dae Hyun Yum (POSTECH)

Probabilistic Escrow of Financial Transactions
with Cumulative Threshold Disclosure
    Stanislaw Jarecki (UC Irvine)
    Vitaly Shmatikov (UT Austin)

Approximation in Message Authentication
    Giovanni Di Crescenzo
    Richard Graveman (Telcordia)
    Gonzalo Arce
    Renwei Ge (U Delaware)

Systems & Applications Presentations
====================================

Securing Sensitive Data with the Ingrian DataSecure Platform
    Andrew Koyfman (Ingrian Networks)

Ciphire Mail Email Encryption
    Lars Eilebrecht (Ciphire Labs)


_______________________________________________
fc-announce mailing list
fc-announce at ifca.ai
http://mail.ifca.ai/mailman/listinfo/fc-announce

--- end forwarded text


-- 
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'





More information about the cypherpunks-legacy mailing list