CALL FOR PARTICIPATION CALL FOR PANELS AND POSTERS ******************************************************************** Financial Cryptography and Data Security March 3-7, 2014, Accra Beach Hotel & Spa, Barbados http://fc14.ifca.ai/ ******************************************************************** ABOUT THE CONFERENCE Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on financial, economic and commercial transaction security. 2014 will be the eighteenth year in which FC has run, and the conference has continued to grow both in terms of quality of papers and number of attendees. The conference will be a 4-day event featuring technical presentations of 19 full papers and 12 short papers, selected by rigorous peer-review from 138 submissions. Two 1-day workshops following the conference are: 2nd Workshop on Applied Homomorphic Cryptography (WAHC'14) 1st Workshop on Bitcoin Research (BITCOIN'14) More details on the workshops can be found at http://fc14.ifca.ai/workshops.html REGISTRATION EARLY REGISTRATION DEADLINE: FEBRUARY 1, 2014 Registration information is available at: http://fc14.ifca.ai/registration.html EXTENDED DEADLINE FOR PANEL PROPOSALS AND POSTERS: Deadline for submission: Jan 27 Notifications: Jan 31 LIST OF CONFERENCE ACCEPTED PAPERS -- FULL-LENGTH PAPERS -- John Ross Wallrabenstein and Chris Clifton. Privacy Preserving Tatonnement; A Cryptographic Construction of an Incentive Compatible Market Jan Stanek, Lukas Kencl, Alessandro Sorniotti and Elli Androulaki. A Secure Data Deduplication Scheme for Cloud Storage Mehdi Tibouchi. Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings Tyler Moore and Richard Clayton. The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites Kaoru Kurosawa. Garbled Searchable Symmetric Encryption Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed Sadeghian. Scaling Private Set Intersection to Billion-Element Sets Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong and N. Asokan. Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-Sensing Philip Koshy, Diana Koshy and Patrick McDaniel. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic Ittay Eyal and Emin Gun Sirer. Majority is not Enough: Bitcoin Mining is Vulnerable Julien Bringer, Hervé Chabanne, Roch Lescuyer and Alain Patey. Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents Clementine Maurice, Christoph Neumann, Olivier Heen and Aurélien Francillon. Confidentiality Issues on a GPU in a Virtualized Environment Berry Schoenmakers, Sebastiaan de Hoogh, Ping Chen and Harm Op den Akker. Practical Secure Decision Tree Learning in a Teletreatment Application Marie Vasek and Tyler Moore. Identifying Risk Factors for Webserver Compromise Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang. Efficient Non-Interactive Zero Knowledge Arguments for Set Operations Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow and Ahmad-Reza Sadeghi. When More Becomes Less: On the (In)Security of Mobile Two-Factor Authentication Rigel Gjomemo, Hafiz Malik, Nilesh Sumb, Rashid Ansari and V.N. Venkatakrishnan. Digital Check Forgery Attacks on Client Check Truncation Systems Joppe Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig and Eric Wustrow. Elliptic Curve Cryptography in Practice Aron Laszka, Benjamin Johnson, Jens Grossklags and Mark Felegyhazi. Estimating Systematic Risk in Real-World Networks Joseph Bonneau, Jeremy Clark, Joshua A. Kroll, Andrew Miller and Arvind Narayanan. Mixcoin: Anonymity for Bitcoin with accountable mixes -- SHORT PAPERS -- Steven Murdoch and Ross Anderson. Security protocols and evidence: where many payment systems fail Michele Spagnuolo, Federico Maggi and Stefano Zanero. BitIodine: Extracting Intelligence from the Bitcoin Network Henning Perl, Sascha Fahl and Matthew Smith. You Won't Be Needing These Any More: On Removing Unused Certificates From Trust Stores Lucjan Hanzlik and Kamil Kluczniak. A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates Lucjan Hanzlik, Kamil Kluczniak and Miroslaw Kutylowski. Attack on a U-Prove Revocation Scheme Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg and J. Alex Halderman. Outsmarting Proctors with Smart Watches: A Case Study on Wearable Computing Security Nicholas Hopper. Challenges in protecting Tor hidden services from botnet abuse Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser and Ahmad-Reza Sadeghi. MoP-2-MoP -- Mobile private microblogging Adam McCarthy, Ben Smyth and Elizabeth Quaglia. Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes Franziska Roesner, Brian T. Gill and Tadayoshi Kohno. Sex, Lies, or Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages Sebastian Pape. Sample or Random Security – A Security Model for Segment-Based Visual Encryption Benjamin Henne, Maximilian Koch and Matthew Smith. Now You See Me, Now You Don't: On the Awareness and Control of Photo Metadata PANEL PROPOSALS We especially would like to encourage submissions of panel proposals. These should include a very brief description of the panel topics, as well as of the prospective panelists. Accepted panel sessions will be presented at the conference. Moreover, each participant will contribute a one-page abstract to be published in the conference proceedings. Please feel free to contact us directly if you would like to further discuss the suitability of a certain topic. Panel submissions must not be anonymous and should be up to 2 pages, sent to fc14chair@ifca.ai. POSTERS The poster session is the perfect venue to share a provocative opinion, interesting established or preliminary work, or a cool idea that will spark discussion. Poster presenters will benefit from a multi-hour session to discuss their work, get exposure, and receive feedback from attendees. Poster submissions should be a 1-page abstract (in the same LNCS format) describing the poster. Please keep in mind that the poster deadline is later than the main paper submission deadline. The poster abstracts will be published in the proceedings. Poster proposals must not be anonymous and should be sent to the posters chair at fc14chair@ifca.ai. STUDENT STIPENDS We are pleased to announce the availability of enhanced financial support for students attending FC14. We anticipate awarding student stipends that would cover conference registration fees and reimburse travel expenses up to $750. Preference will be given to students who will be presenting at the conference or associated workshops, but all student participants are encouraged to apply. If you are interested in applying for stipend support, please email the FC2014 general chair at fc14general@ifca.ai with subject line "student stipend" and a letter of support from your home institution. This conference is organized annually by the International Financial Cryptography Association. Additional information about the conference can be found at: http://fc14.ifca.ai/