default search action
12th Financial Cryptography 2008: Cozumel, Mexico
- Gene Tsudik:
Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5143, Springer 2008, ISBN 978-3-540-85229-2
Attacks and Counter Measures I
- N. Boris Margolin, Brian Neil Levine:
Quantifying Resistance to the Sybil Attack. 1-15 - Tyler Moore, Richard Clayton:
Evaluating the Wisdom of Crowds in Assessing Phishing Websites. 16-30 - Jon McLachlan, Nicholas Hopper:
Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes. 31-46
Protocols
- Shaoquan Jiang, Reihaneh Safavi-Naini:
An Efficient Deniable Key Exchange Protocol (Extended Abstract). 47-52 - Yvo Desmedt, Tanja Lange:
Revisiting Pairing Based Group Key Exchange. 53-68 - Shuhua Wu, Yuefei Zhu:
Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. 69-82
Theory
- Vladimir Kolesnikov, Thomas Schneider:
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions. 83-97 - Vandana Gunupudi, Stephen R. Tate:
Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents. 98-112 - Keith B. Frikken, Lukasz Opyrchal:
PBS: Private Bartering Systems. 113-127
Hardware, Chips and Tags
- Tim Güneysu, Christof Paar:
Breaking Legacy Banking Standards with Special-Purpose Hardware. 128-140 - Gildas Avoine, Kassem Kalach, Jean-Jacques Quisquater:
ePassport: Securing International Contacts with Contactless Chips. 141-155 - Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:
Good Variants of HB+ Are Hard to Find. 156-170 - Shane Balfe, Kenneth G. Paterson:
Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). 171-175
Attacks and Counter-Measures II
- Mohammad Mannan, Paul C. van Oorschot:
Weighing Down "The Unbearable Lightness of PIN Cracking". 176-181 - Debra L. Cook, Vijay K. Gurbani, Michael Daniluk:
Phishwish: A Stateless Phishing Filter Using Minimal Rules. 182-186 - Bob Mungamuru, Stephen A. Weis:
Competition and Fraud in Online Advertising Markets. 187-191 - André N. Klingsheim, Kjell Jørgen Hole:
Identity Theft: Much Too Easy? A Study of Online Systems in Norway. 192-196 - Yngve Espelid, Lars-Helge Netland, André N. Klingsheim, Kjell Jørgen Hole:
A Proof of Concept Attack against Norwegian Internet Banking Systems. 197-201 - Sébastien Canard, Aline Gouget, Jacques Traoré:
Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash. 202-214
Signatures and Encryption
- Stanislaw Jarecki, Josh Olsen:
Proactive RSA with Non-interactive Signing. 215-230 - Vicente Benjumea, Seung Geol Choi, Javier López, Moti Yung:
Fair Traceable Multi-Group Signatures. 231-246 - Fuchun Guo, Yi Mu, Zhide Chen:
Identity-Based Online/Offline Encryption. 247-261
Anonymity and E-Cash
- Alessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig:
Countermeasures against Government-Scale Monetary Forgery. 262-266 - Daniel A. Nagy, Nadzeya V. Shakel:
OpenPGP-Based Financial Instruments and Dispute Arbitration. 267-271 - Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto:
An Efficient Anonymous Credential System. 272-286 - Man Ho Au, Willy Susilo, Yi Mu:
Practical Anonymous Divisible E-Cash from Bounded Accumulators. 287-301
Miscellaneous
- Mary Ellen Zurko, Andrew S. Patrick:
Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. 302-306 - Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung:
Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). 307-313 - Antonio San Martino, Xavier Perramon:
Securing Web Banking Applications. 314-315 - Peter Williams:
Privacy Threats in Online Stock Quotes. 316-317 - N. Asokan, Jan-Erik Ekberg:
A Platform for OnBoard Credentials. 318-320 - Ken Huang, Paul Douthit:
ST&E Is the Most Cost Effective Measure for Comply with Payment Card Industry (PCI) Data Security Standard. 321-322 - William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. 323-324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.