Financial Cryptography 2008: Accepted Papers / Preliminary Program

R.A.Hettinga rah at shipwright.com
Mon Dec 10 12:51:01 PST 2007


<http://fc08.ifca.ai/program.html>

   Financial Cryptography and Data Security 2008
   Twelfth International Conference
   28-31 January 2008
   El Cozumeleno Beach Resort, Cozumel, Mexico
Home

Accepted Papers / Preliminary Program


Accepted Full Papers
		A Practical Universal Circuit Construction and Secure Evaluation  
of Private Functions, Vladimir Kolesnikov (Bell laboratories), Thomas  
Schneider (Dept. of Comp. Sci., University of Erlangen-Nuremberg,  
Germany)

		An Efficient Anonymous Credential System Norio Akagi (Kyoto  
University, Japan), Yoshifumi Manabe (NTT), Tatsuaki Okamoto (NTT)

		Breaking Legacy Banking Standards with Special-Purpose Hardware  
Tim Geysu (Ruhr-University Bochum), Christof Paar (Horst Gtz  
Institute for IT Security, Ruhr University Bochum, Germany)

		Constant-Round Password-Based Authenticated Key Exchange Protocol  
for Dynamic Groups Sh W (IEU)

		Don't clog the queue! Circuit clogging and mitigation in P2P  
anonymity schemes Jon McLachlan (University of Minnesota), Nicholas  
Hopper (University of minnesota)

		ePassport: Securing International Contacts with Contactless Chips  
Gildas Avoine (UCL, Louvain-la-Neuve,Belgium), Kassem Kalach (UCL,  
Louvain-la-Neuve, Belgium), Jean-Jacques Quisquater (UCL, Louvain-la- 
Neuve, Belgium)

		Evaluating the Wisdom of Crowds in Assessing Phishing Websites  
Tyler Moore (University of Cambridge), Richard Clayton (University of  
Cambridge)

		Fair Traceable Multi-Group Signatures Vicente Benjumea (University  
of Malaga), Seung Geol Choi (Columbia University), Javier Lopez  
(University of Malaga), Moti Yung (Google and Columbia U)

		Generalized Non-interactive Oblivious Transfer using Count-Limited  
Objects with Applications to Secure Mobile Agents Stephen Tate (UNC  
Greensboro), Vandana Gunupudi (University of North Texas)

		Good Variants of HB+ are Hard to Find Yannick Seurin (France  
Telecom R&D), Henri Gilbert (France Telecom R&D), Matthew Robshaw  
(France Telecom R&D)

		Identity-Based Online/Offline Encryption Fuchun Guo (Fujian Normal  
University,China), Yi Mu (University of Wollongong), Zhide Chen

		Improvement of Efficiency in (Unconditional) Anonymous  
Transferable E-Cash Sebastien Canard (Orange Labs), Aline Gouget  
(Gemalto), Jacques Traore (Orange Labs)

		PBS: Private Bartering Systems Keith Frikken (Miami University),  
Lukasz Opyrchal (Miami University)

		Practical Anonymous Divisible E-Cash From Bounded Accumulators Man  
Ho Au (University of Wollongong), Willy Susilo (University of  
Wollongong), Yi Mu (University of Wollongong)

		Proactive RSA Signatures with Non-Interactive Signing Stanislaw  
Jarecki (UC Irvine), Josh Olsen (UC Irvine)

		Quantifying Resistance to the Sybil Attack N. Boris Margolin  
(UMass Amherst), Brian Levine (UMass Amherst)

		Revisiting pairing based group key exchange Yvo Desmedt , Tanja  
Lange (Technische Universiteit Eindho)


Accepted Short Papers
		On the Security of Next Generation E-Commerce in Norway-a Red Team  
Approach Yngve Espelid (University of Bergen), Lars-Helge Netland  
(University of Bergen), AndrKlingsheim (University of Bergen), Kjell  
Jgen Hole (University of Bergen)

		Countermeasures against Government-Scale Monetary Forgery  
Alessandro Acquisti , Nicolas Christin (Carnegie Mellon University),  
Bryan Parno , Adrian Perrig

		An Efficient Fully Deniable Key Exchange Protocol Shaoquan Jiang  
(University of Calgary), Rei Safavi-Naini (University of Calgary)

		Augmenting Internet-based Card Not Present Transactions with  
Trusted Computing Shane Balfe (Royal Holoway ), Kenneth Paterson  
(Royal Holloway)

		Competition and Fraud in Online Advertising Markets Bob Mungamuru  
(Stanford University), Stephen Weis (Google)

		Identity Theft: Much too Easy? A Study of Online Systems in Norway  
AndrKlingsheim (University of Bergen), Kjell Jgen Hole (University of  
Bergen)

		OpenPGP-based Financial Instruments and Dispute Arbitration Daniel  
Nagy (ELTECRYPT), Nadzeya Shakel (Belarusian State University)

		Phishwish: A Stateless Phishing Filter Using Minimal Rules Vijay  
Gurbani (Bell Labs/Alcatel-Lucent), Debra Cook (Bell Labs), Michael  
Daniluk

		Weighing Down The Unbearable Lightness of PIN Cracking Mohammad  
Mannan (Carleton University), Paul Van Oorschot (Carleton University)

Preliminary Program
Monday (1/28)
----------------------
Session 1:   09:30-11:00   Introduction/Opening + Invited talk 1
Break
Session 2:   11:30-01:00   3 full papers
Lunch:
Session 3:   02:30-04:00   3 full papers


Tuesday (1/29)
----------------------
Session 1:   09:30-11:00   3 full papers
Break
Session 2:   11:30-01:00   3 full papers
Lunch
FREE AFTERNOON:
Session 3:   07:00-08:00  Posters
Session 4:   08:00-09:00  RUMP Session
IFCA General Meeting:  09:00-10:00


Wednesday (1/30)
---------------------
Session 1:   09:30-10:30  Invited Talk 2
Break
Session 2:   11:00-12:45  7 short papers
Lunch
Session 3:   02:30-04:00  2 short + 2 full papers


Thursday (1/31)
---------------------
Session 1:   09:30-11:00 Panel
Break
Session 2:   11:30-01:00 3 full papers
Conference END

This conference is organized annually by the International Financial  
Cryptography Association.





More information about the cypherpunks-legacy mailing list