Financial Cryptography and Data Security 2014
Eighteenth International Conference
March 3–7, 2014
Accra Beach Hotel & Spa
Barbados
Tentative List of Accepted Papers
Full-Length Papers
John Ross Wallrabenstein and Chris Clifton. Privacy Preserving Tatonnement; A Cryptographic Construction of an Incentive Compatible Market
Jan Stanek, Lukas Kencl, Alessandro Sorniotti and Elli Androulaki. A Secure Data Deduplication Scheme for Cloud Storage
Mehdi Tibouchi. Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
Tyler Moore and Richard Clayton. The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites
Kaoru Kurosawa. Garbled Searchable Symmetric Encryption
Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed Sadeghian. Scaling Private Set Intersection to Billion-Element Sets
Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong and N. Asokan. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing
Philip Koshy, Diana Koshy and Patrick McDaniel. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
Ittay Eyal and Emin Gun Sirer. Majority is not Enough: Bitcoin Mining is Vulnerable
Julien Bringer, Hervé Chabanne, Roch Lescuyer and Alain Patey. Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents
Clementine Maurice, Christoph Neumann, Olivier Heen and Aurélien Francillon. Confidentiality Issues on a GPU in a Virtualized Environment
Berry Schoenmakers, Sebastiaan de Hoogh, Ping Chen and Harm Op den Akker. Practical Secure Decision Tree Learning in a Teletreatment Application
Marie Vasek and Tyler Moore. Identifying Risk Factors for Webserver Compromise
Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang. Efficient Non-Interactive Zero Knowledge Arguments for Set Operations
Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow and Ahmad-Reza Sadeghi. When More Becomes Less: On the (In)Security of Mobile Two-Factor Authentication
Rigel Gjomemo, Hafiz Malik, Nilesh Sumb, Rashid Ansari and V.N. Venkatakrishnan. Digital Check Forgery Attacks on Client Check Truncation Systems
Joppe Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig and Eric Wustrow. Elliptic Curve Cryptography in Practice
Aron Laszka, Benjamin Johnson, Jens Grossklags and Mark Felegyhazi. Estimating Systematic Risk in Real-World Networks
Joseph Bonneau, Jeremy Clark, Joshua A. Kroll, Andrew Miller and Arvind Narayanan. Mixcoin: Anonymity for Bitcoin with accountable mixes
Short Papers
Steven Murdoch and Ross Anderson. Security protocols and evidence: where many payment systems fail
Michele Spagnuolo, Federico Maggi and Stefano Zanero. BitIodine: Extracting Intelligence from the Bitcoin Network
Henning Perl, Sascha Fahl and Matthew Smith. You Won't Be Needing These Any More: On Removing Unused Certificates From Trust Stores
Lucjan Hanzlik and Kamil Kluczniak. A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates
Lucjan Hanzlik, Kamil Kluczniak and Miroslaw Kutylowski. Attack on a U-Prove Revocation Scheme
Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg and J. Alex Halderman. Outsmarting Proctors with Smart Watches: A Case Study on Wearable Computing Security
Nicholas Hopper. Challenges in protecting Tor hidden services from botnet abuse
Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser and Ahmad-Reza Sadeghi. MoP-2-MoP -- Mobile private microblogging
Adam McCarthy, Ben Smyth and Elizabeth Quaglia. Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
Franziska Roesner, Brian T. Gill and Tadayoshi Kohno. Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages
Sebastian Pape. Sample or Random Security – A Security Model for Segment-Based Visual Encryption
Benjamin Henne, Maximilian Koch and Matthew Smith. Now You See Me, Now You Don't: On the Awareness and Control of Photo Metadata
This conference is organized annually by the International Financial Cryptography Association.