Financial Cryptography 2008: Accepted Papers / Preliminary Program
R.A.Hettinga
rah at shipwright.com
Mon Dec 10 12:51:01 PST 2007
<http://fc08.ifca.ai/program.html>
Financial Cryptography and Data Security 2008
Twelfth International Conference
28-31 January 2008
El Cozumeleno Beach Resort, Cozumel, Mexico
Home
Accepted Papers / Preliminary Program
Accepted Full Papers
A Practical Universal Circuit Construction and Secure Evaluation
of Private Functions, Vladimir Kolesnikov (Bell laboratories), Thomas
Schneider (Dept. of Comp. Sci., University of Erlangen-Nuremberg,
Germany)
An Efficient Anonymous Credential System Norio Akagi (Kyoto
University, Japan), Yoshifumi Manabe (NTT), Tatsuaki Okamoto (NTT)
Breaking Legacy Banking Standards with Special-Purpose Hardware
Tim Geysu (Ruhr-University Bochum), Christof Paar (Horst Gtz
Institute for IT Security, Ruhr University Bochum, Germany)
Constant-Round Password-Based Authenticated Key Exchange Protocol
for Dynamic Groups Sh W (IEU)
Don't clog the queue! Circuit clogging and mitigation in P2P
anonymity schemes Jon McLachlan (University of Minnesota), Nicholas
Hopper (University of minnesota)
ePassport: Securing International Contacts with Contactless Chips
Gildas Avoine (UCL, Louvain-la-Neuve,Belgium), Kassem Kalach (UCL,
Louvain-la-Neuve, Belgium), Jean-Jacques Quisquater (UCL, Louvain-la-
Neuve, Belgium)
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Tyler Moore (University of Cambridge), Richard Clayton (University of
Cambridge)
Fair Traceable Multi-Group Signatures Vicente Benjumea (University
of Malaga), Seung Geol Choi (Columbia University), Javier Lopez
(University of Malaga), Moti Yung (Google and Columbia U)
Generalized Non-interactive Oblivious Transfer using Count-Limited
Objects with Applications to Secure Mobile Agents Stephen Tate (UNC
Greensboro), Vandana Gunupudi (University of North Texas)
Good Variants of HB+ are Hard to Find Yannick Seurin (France
Telecom R&D), Henri Gilbert (France Telecom R&D), Matthew Robshaw
(France Telecom R&D)
Identity-Based Online/Offline Encryption Fuchun Guo (Fujian Normal
University,China), Yi Mu (University of Wollongong), Zhide Chen
Improvement of Efficiency in (Unconditional) Anonymous
Transferable E-Cash Sebastien Canard (Orange Labs), Aline Gouget
(Gemalto), Jacques Traore (Orange Labs)
PBS: Private Bartering Systems Keith Frikken (Miami University),
Lukasz Opyrchal (Miami University)
Practical Anonymous Divisible E-Cash From Bounded Accumulators Man
Ho Au (University of Wollongong), Willy Susilo (University of
Wollongong), Yi Mu (University of Wollongong)
Proactive RSA Signatures with Non-Interactive Signing Stanislaw
Jarecki (UC Irvine), Josh Olsen (UC Irvine)
Quantifying Resistance to the Sybil Attack N. Boris Margolin
(UMass Amherst), Brian Levine (UMass Amherst)
Revisiting pairing based group key exchange Yvo Desmedt , Tanja
Lange (Technische Universiteit Eindho)
Accepted Short Papers
On the Security of Next Generation E-Commerce in Norway-a Red Team
Approach Yngve Espelid (University of Bergen), Lars-Helge Netland
(University of Bergen), AndrKlingsheim (University of Bergen), Kjell
Jgen Hole (University of Bergen)
Countermeasures against Government-Scale Monetary Forgery
Alessandro Acquisti , Nicolas Christin (Carnegie Mellon University),
Bryan Parno , Adrian Perrig
An Efficient Fully Deniable Key Exchange Protocol Shaoquan Jiang
(University of Calgary), Rei Safavi-Naini (University of Calgary)
Augmenting Internet-based Card Not Present Transactions with
Trusted Computing Shane Balfe (Royal Holoway ), Kenneth Paterson
(Royal Holloway)
Competition and Fraud in Online Advertising Markets Bob Mungamuru
(Stanford University), Stephen Weis (Google)
Identity Theft: Much too Easy? A Study of Online Systems in Norway
AndrKlingsheim (University of Bergen), Kjell Jgen Hole (University of
Bergen)
OpenPGP-based Financial Instruments and Dispute Arbitration Daniel
Nagy (ELTECRYPT), Nadzeya Shakel (Belarusian State University)
Phishwish: A Stateless Phishing Filter Using Minimal Rules Vijay
Gurbani (Bell Labs/Alcatel-Lucent), Debra Cook (Bell Labs), Michael
Daniluk
Weighing Down The Unbearable Lightness of PIN Cracking Mohammad
Mannan (Carleton University), Paul Van Oorschot (Carleton University)
Preliminary Program
Monday (1/28)
----------------------
Session 1: 09:30-11:00 Introduction/Opening + Invited talk 1
Break
Session 2: 11:30-01:00 3 full papers
Lunch:
Session 3: 02:30-04:00 3 full papers
Tuesday (1/29)
----------------------
Session 1: 09:30-11:00 3 full papers
Break
Session 2: 11:30-01:00 3 full papers
Lunch
FREE AFTERNOON:
Session 3: 07:00-08:00 Posters
Session 4: 08:00-09:00 RUMP Session
IFCA General Meeting: 09:00-10:00
Wednesday (1/30)
---------------------
Session 1: 09:30-10:30 Invited Talk 2
Break
Session 2: 11:00-12:45 7 short papers
Lunch
Session 3: 02:30-04:00 2 short + 2 full papers
Thursday (1/31)
---------------------
Session 1: 09:30-11:00 Panel
Break
Session 2: 11:30-01:00 3 full papers
Conference END
This conference is organized annually by the International Financial
Cryptography Association.
More information about the Testlist
mailing list