default search action
21st Financial Cryptography 2017: Sliema, Malta
- Aggelos Kiayias:
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10322, Springer 2017, ISBN 978-3-319-70971-0
Privacy and Identity Management
- Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:
An Efficient Self-blindable Attribute-Based Credential Scheme. 3-20 - Sherman S. M. Chow, Haibin Zhang, Tao Zhang:
Real Hidden Identity-Based Signatures. 21-38 - Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, Mohamed Ali Kâafar:
BehavioCog: An Observation Resistant Authentication Scheme. 39-58 - Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann:
Updatable Tokenization: Formal Definitions and Provably Secure Constructions. 59-75
Privacy and Data Processing
- Qian Wang, Kui Ren, Minxin Du, Qi Li, Aziz Mohaisen:
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. 79-97 - Gabriel Kaptchuk, Matthew Green, Aviel D. Rubin:
Outsourcing Medical Dataset Analysis: A Possible Solution. 98-123 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. 124-142
Cryptographic Primitives and API's
- Ryan Stanley-Oakes:
A Provably Secure PKCS#11 Configuration Without Authenticated Attributes. 145-162 - Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao, Vladimir Soukharev:
A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies. 163-181 - Helger Lipmaa:
Optimally Sound Sigma Protocols Under DCRA. 182-203 - Reihaneh Safavi-Naini, Viliam Lisý, Yvo Desmedt:
Economically Optimal Variable Tag Length Message Authentication. 204-223
Vulnerabilities and Exploits
- Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena:
PEEP: Passively Eavesdropping Private Input via Brainwave Signals. 227-246 - Michael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard:
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. 247-267 - Gunnar Hartung:
Attacks on Secure Logging Schemes. 268-284 - Matthew Smith, Daniel Moser, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS. 285-301 - Vincent F. Taylor, Ivan Martinovic:
Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store. 302-309 - Markus Jakobsson:
Short Paper: Addressing Sophisticated Email Attacks. 310-317
Blockchain Technology
- Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan:
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin. 321-339 - Orfeas Stefanos Thyfronitis Litos, Dionysis Zindros:
Trust Is Risk: A Decentralized Financial Trust Platform. 340-356 - Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. 357-375 - Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov:
Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies. 376-392 - Adem Efe Gencer, Robbert van Renesse, Emin Gün Sirer:
Short Paper: Service-Oriented Sharding for Blockchains. 393-401
Security of Internet Protocols
- Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg:
The Security of NTP's Datagram Protocol. 405-423 - Pawel Szalachowski, Adrian Perrig:
Short Paper: On Deployment of DNS-Based Security Enhancements. 424-433
Blind Signatures
- Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed:
A Practical Multivariate Blind Signature Scheme. 437-454 - Essam Ghadafi:
Efficient Round-Optimal Blind Signatures in the Standard Model. 455-473
Searching and Processing Private Data
- Raad Bahmani, Manuel Barbosa, Ferdinand Brasser, Bernardo Portela, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi:
Secure Multiparty Computation from SGX. 477-497 - Wakaha Ogata, Kaoru Kurosawa:
Efficient No-dictionary Verifiable Searchable Symmetric Encryption. 498-516 - Anamaria Costache, Nigel P. Smart, Srinivas Vivek:
Faster Homomorphic Evaluation of Discrete Fourier Transforms. 517-529
Secure Channel Protocols
- Nayanamana Samarasinghe, Mohammad Mannan:
Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers. 533-541 - Yevgeniy Dodis, Dario Fiore:
Unilaterally-Authenticated Key Exchange. 542-560 - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Nadim Kobeissi:
Formal Modeling and Verification for Domain Validation and ACME. 561-578 - Tom Chothia, Flavio D. Garcia, Chris Heppel, Chris McMahon Stone:
Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps. 579-597
Privacy in Data Storage and Retrieval
- Cecylia Bocovich, John A. Doucette, Ian Goldberg:
Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage. 601-620 - Helger Lipmaa, Kateryna Pavlyk:
A Simpler Rate-Optimal CPIR Protocol. 621-638
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.