Accepted Papers

 
Financial Cryptography and Data Security 2013

International Financial Cryptography Association logo

Seventeenth International Conference
April 1–5, 2013
Bankoku Shinryokan
Busena Terrace Beach Resort
Okinawa, Japan

 

Accepted Regular Papers

Dorit Ron and Adi Shamir
Quantitative Analysis of the Full Bitcoin Transaction Graph

Travis Mayberry, Erik-Oliver Blass and Agnes Chan
PIRMAP: Efficient Private Information Retrieval for MapReduce

Tilo Müller, Felix Freiling and Hans Spath
Stark Tamperproof Authentication to Resist Keylogging

Bingsheng Zhang, Helger Lipmaa, Cong Wang and Kui Ren
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication

Michael Zohner and Thomas Schneider
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits

Gergely Biczók and Pern Hui Chia
Interdependent Privacy: Let Me Share Your Data

Seny Kamara and Charalampos Papamanthou
Searching Dynamic Encrypted Data in Parallel

Marc Joye and Benoit Libert
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data

Kwangsu Lee, Dong Hoon Lee and Moti Yung
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency

Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer and Srdjan Capkun
Evaluating User Privacy in Bitcoin

Abdelrahaman Aly, Edouard Cuvelier, Sophie Mawet, Olivier Pereira and Van Vyve Mathieu
Securely Solving Simple Combinatorial Graph Problems

David Aspinall and Mike Just
"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks

Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders and Matthew Smith
Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers

Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini
Unconditionally-Secure Robust Secret Sharing with Optimal Share Size

 

Accepted Short papers

Martin Emms, Budi Arief, Aad van Moorsel and Nicholas Little
Risks of offline Verify PIN on Contactless Cards (Short Paper)

Yuanyuan Zhou, Yu Yu, Francois-Xavier Standaert and Jean-Jacques Quisquater
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards

Denise Demirel, Jeroen van de Graaf and Johannes Buchmann
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy

Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama
Coupon Collector's Problem for Fault Analysis --- High Tolerance for Noisy Fault Injections

Justin Cappos
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates

Andy Rupp, Gesine Hinterwalder, Foteini Baldimtsi and Christof Paar
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems

Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter and Koen De Bosschere
Mitigating smart card fault injection with link-time code rewriting: a feasibility study

James Kasten, Eric Wustrow and J. Alex Halderman
CAge: Taming Certi?cate Authorities by Inferring Restricted Scopes

Anupam Das and Nikita Borisov
Securing Anonymous Communication Channels under the Selective DoS Attack

Volker Roth, Benjamin Gueldenring, Eleanor Rieffel, Sven Dietrich and Lars Ries
A Secure Submission System for Online Whistleblowing Platforms

Tyler Moore and Nicolas Christin
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper)

Serge Egelman and Stuart Schechter
Short Paper: The Importance of Being Earnest [in Security Warnings]

Alexander Gallego, Nitesh Saxena and Jonathan Voris
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing

Yvo Desmedt, Ioannis Karaolis, Manal Adham and Amir Sadr-Azodi
How to Attack Two-Factor Authentication Internet Banking

Matthew Franklin and Haibin Zhang
A Framework for Unique Ring Signatures

Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong and Adrian Perrig
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication

Tolga Acar, Sherman S.M. Chow and Lan Nguyen
Accumulators and U-Prove Revocation

 


Accepted Posters

Aude Plateaux, Vincent Coquet, Sylvain Vernois, Patrick Lacharme, Kumar Murty and Christophe Rosenberger
A Privacy Preserving E-Payment Architecture

Chrystel Gaber, B. Hemery, Mohammed Achemlal, M. Pasquet and P. Urien
Synthetic logs generator for fraud detection in mobile transfer services

Haruhiko Fujii and Yukio Tsuruoka
Three-factor user authentication method using biometrics challenge response

Tarik Moataz and Abdullatif Shikfa
Searchable Encryption Supporting General Boolean Expression Queries

Gerard Vidal
Communication services empowered with a classical chaos based cryptosystem

Aaron Johnson, Rob Jansen and Paul Syverson
Onions for Sale: Putting Privacy on the Market

 

 

 

This conference is organized annually by the International Financial Cryptography Association.