default search action
18th Financial Cryptography 2014: Christ Church, Barbados
- Nicolas Christin, Reihaneh Safavi-Naini:
Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8437, Springer 2014, ISBN 978-3-662-45471-8
Payment Systems
- Rigel Gjomemo, Hafiz Malik, Nilesh Sumb, V. N. Venkatakrishnan, Rashid Ansari:
Digital Check Forgery Attacks on Client Check Truncation Systems. 3-20 - Steven J. Murdoch, Ross J. Anderson:
Security Protocols and Evidence: Where Many Payment Systems Fail. 21-32 - Tyler Moore, Richard Clayton:
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites. 33-48
Case Studies
- Adam McCarthy, Ben Smyth, Elizabeth A. Quaglia:
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes. 51-63 - Franziska Roesner, Brian T. Gill, Tadayoshi Kohno:
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages. 64-76 - Benjamin Henne, Maximilian Koch, Matthew Smith:
On the Awareness, Control and Privacy of Shared Photo Metadata. 77-88 - Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg, J. Alex Halderman:
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security. 89-96
Cloud and Virtualization
- Jan Stanek, Alessandro Sorniotti, Elli Androulaki, Lukas Kencl:
A Secure Data Deduplication Scheme for Cloud Storage. 99-118 - Clémentine Maurice, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Confidentiality Issues on a GPU in a Virtualized Environment. 119-135
Elliptic Curve Cryptography
- Mehdi Tibouchi:
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings. 139-156 - Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:
Elliptic Curve Cryptography in Practice. 157-175
Privacy-Preserving Systems
- Sebastiaan de Hoogh, Berry Schoenmakers, Ping Chen, Harm op den Akker:
Practical Secure Decision Tree Learning in a Teletreatment Application. 179-194 - Seny Kamara, Payman Mohassel, Mariana Raykova, Seyed Saeed Sadeghian:
Scaling Private Set Intersection to Billion-Element Sets. 195-215 - Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang:
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations. 216-233 - Kaoru Kurosawa:
Garbled Searchable Symmetric Encryption. 234-251
Authentication and Visual Encryption
- Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey:
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. 255-272 - Lucjan Hanzlik, Kamil Kluczniak:
A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates. 273-282 - Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users. 283-290 - Sebastian Pape:
Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. 291-303
Network Security
- Henning Perl, Sascha Fahl, Matthew Smith:
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores. 307-315 - Nicholas Hopper:
Challenges in Protecting Tor Hidden Services from Botnet Abuse. 316-325 - Marie Vasek, Tyler Moore:
Identifying Risk Factors for Webserver Compromise. 326-345
Mobile System Security
- Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan:
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. 349-364 - Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi:
On the (In)Security of Mobile Two-Factor Authentication. 365-383 - Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
MoP-2-MoP - Mobile Private Microblogging. 384-396
Incentives, Game Theory and Risk
- John Ross Wallrabenstein, Chris Clifton:
Privacy Preserving Tâtonnement - A Cryptographic Construction of an Incentive Compatible Market. 399-416 - Aron Laszka, Benjamin Johnson, Jens Grossklags, Márk Félegyházi:
Estimating Systematic Risk in Real-World Networks. 417-435 - Ittay Eyal, Emin Gün Sirer:
Majority Is Not Enough: Bitcoin Mining Is Vulnerable. 436-454
Bitcoin Anonymity
- Michele Spagnuolo, Federico Maggi, Stefano Zanero:
BitIodine: Extracting Intelligence from the Bitcoin Network. 457-468 - Philip Koshy, Diana Koshy, Patrick D. McDaniel:
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. 469-485 - Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with Accountable Mixes. 486-504
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.