Accepted Papers
Financial Cryptography and Data Security 2013
Seventeenth International Conference
April 1–5, 2013
Bankoku Shinryokan
Busena Terrace Beach Resort
Okinawa, Japan
Accepted Regular Papers
Dorit Ron and Adi Shamir
Quantitative Analysis of the Full Bitcoin Transaction Graph
Travis Mayberry, Erik-Oliver Blass and Agnes Chan
PIRMAP: Efficient Private Information Retrieval for MapReduce
Tilo Müller, Felix Freiling and Hans Spath
Stark Tamperproof Authentication to Resist Keylogging
Bingsheng Zhang, Helger Lipmaa, Cong Wang and Kui Ren
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication
Michael Zohner and Thomas Schneider
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits
Gergely Biczók and Pern Hui Chia
Interdependent Privacy: Let Me Share Your Data
Seny Kamara and Charalampos Papamanthou
Searching Dynamic Encrypted Data in Parallel
Marc Joye and Benoit Libert
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
Kwangsu Lee, Dong Hoon Lee and Moti Yung
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer and Srdjan Capkun
Evaluating User Privacy in Bitcoin
Abdelrahaman Aly, Edouard Cuvelier, Sophie Mawet, Olivier Pereira and Van Vyve Mathieu
Securely Solving Simple Combinatorial Graph Problems
David Aspinall and Mike Just
"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks
Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders and Matthew Smith
Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers
Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini
Unconditionally-Secure Robust Secret Sharing with Optimal Share Size
Accepted Short papers
Martin Emms, Budi Arief, Aad van Moorsel and Nicholas Little
Risks of offline Verify PIN on Contactless Cards (Short Paper)
Yuanyuan Zhou, Yu Yu, Francois-Xavier Standaert and Jean-Jacques Quisquater
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards
Denise Demirel, Jeroen van de Graaf and Johannes Buchmann
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy
Yu Sasaki, Yang Li, Hikaru Sakamoto and Kazuo Sakiyama
Coupon Collector's Problem for Fault Analysis --- High Tolerance for Noisy Fault Injections
Justin Cappos
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates
Andy Rupp, Gesine Hinterwalder, Foteini Baldimtsi and Christof Paar
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems
Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter and Koen De Bosschere
Mitigating smart card fault injection with link-time code rewriting: a feasibility study
James Kasten, Eric Wustrow and J. Alex Halderman
CAge: Taming Certi?cate Authorities by Inferring Restricted Scopes
Anupam Das and Nikita Borisov
Securing Anonymous Communication Channels under the Selective DoS Attack
Volker Roth, Benjamin Gueldenring, Eleanor Rieffel, Sven Dietrich and Lars Ries
A Secure Submission System for Online Whistleblowing Platforms
Tyler Moore and Nicolas Christin
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper)
Serge Egelman and Stuart Schechter
Short Paper: The Importance of Being Earnest [in Security Warnings]
Alexander Gallego, Nitesh Saxena and Jonathan Voris
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing
Yvo Desmedt, Ioannis Karaolis, Manal Adham and Amir Sadr-Azodi
How to Attack Two-Factor Authentication Internet Banking
Matthew Franklin and Haibin Zhang
A Framework for Unique Ring Signatures
Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong and Adrian Perrig
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication
Tolga Acar, Sherman S.M. Chow and Lan Nguyen
Accumulators and U-Prove Revocation
Accepted Posters
Aude Plateaux, Vincent Coquet, Sylvain Vernois, Patrick Lacharme, Kumar Murty and Christophe Rosenberger
A Privacy Preserving E-Payment Architecture
Chrystel Gaber, B. Hemery, Mohammed Achemlal, M. Pasquet and P. Urien
Synthetic logs generator for fraud detection in mobile transfer services
Haruhiko Fujii and Yukio Tsuruoka
Three-factor user authentication method using biometrics challenge response
Tarik Moataz and Abdullatif Shikfa
Searchable Encryption Supporting General Boolean Expression Queries
Gerard Vidal
Communication services empowered with a classical chaos based cryptosystem
Aaron Johnson, Rob Jansen and Paul Syverson
Onions for Sale: Putting Privacy on the Market
This conference is organized annually by the International Financial Cryptography Association.