default search action
19th Financial Cryptography 2015: San Juan, Puerto Rico
- Rainer Böhme, Tatsuaki Okamoto:
Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8975, Springer 2015, ISBN 978-3-662-47853-0
Invited Talk
- Gavin Andresen:
What Satoshi Did Not Know. 3-10
Cybercrime
- Olivier Thonnard, Leyla Bilge, Anand Kashyap, Martin Lee:
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks. 13-31 - Vaibhav Garg, Sadia Afroz, Rebekah Overdorf, Rachel Greenstadt:
Computer-Supported Cooperative Crime. 32-43 - Marie Vasek, Tyler Moore:
There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. 44-61
Sidechannels
- W. Brad Moore, Henry Tan, Micah Sherr, Marcus A. Maloof:
Multi-class Traffic Morphing for Encrypted VoIP Communication. 65-85 - Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. 86-106 - David Fifield, Serge Egelman:
Fingerprinting Web Users Through Font Metrics. 107-124
Cryptography in the Cloud
- Foteini Baldimtsi, Olga Ohrimenko:
Sorting and Searching Behind the Curtain. 127-146 - Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Resizable Tree-Based Oblivious RAM. 147-167 - Wouter Lueks, Ian Goldberg:
Sublinear Scaling for Multi-Client Private Information Retrieval. 168-186
Payment and Fraud Detection
- Tom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel, Matthew Thompson:
Relay Cost Bounding for Contactless EMV Payments. 189-206 - Serge Vaudenay:
Private and Secure Public-Key Distance Bounding - Application to NFC Payment. 207-216 - Sören Preibusch, Thomas Peetz, Gunes Acar, Bettina Berendt:
Purchase Details Leaked to PayPal. 217-226 - Dan Bogdanov, Marko Jõemets, Sander Siim, Meril Vaht:
How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. 227-234
Authentication and Access Control
- Sebastian Uellenbeck, Thomas Hupperich, Christopher Wolf, Thorsten Holz:
Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones. 237-253 - Asadullah Al Galib, Reihaneh Safavi-Naini:
User Authentication Using Human Cognitive Abilities. 254-271 - Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, N. Asokan:
Smart and Secure Cross-Device Apps for the Internet of Advanced Things. 272-290
Cryptographic Primitives
- Thomas Groß:
Signatures and Efficient Proofs on Committed Graphs and NP-Statements. 293-314 - Yannis Rouselakis, Brent Waters:
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. 315-332 - Rachid El Bansarkhani, Özgür Dagdelen, Johannes Buchmann:
Augmented Learning with Errors: The Untapped Potential of the Error Term. 333-352
Mobile Security
- Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda:
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. 355-369 - Christian Szongott, Michael Brenner, Matthew Smith:
METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points. 370-386 - Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein, Ahmad-Reza Sadeghi:
Market-Driven Code Provisioning to Mobile Secure Hardware. 387-404
Privacy and Incentives
- Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:
On Non-cooperative Genomic Privacy. 407-426 - Michela Chessa, Jens Grossklags, Patrick Loiseau:
A Short Paper on the Incentives to Share Private Information for Population Estimates. 427-436 - Paolo Palmieri, Johan A. Pouwelse:
Paying the Guard: An Entry-Guard-Based Payment System for Tor. 437-444 - Alex Biryukov, Ivan Pustogarov:
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. 445-455
Applications and Attacks
- Yongjun Zhao, Sherman S. M. Chow:
Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding. 459-477 - Johannes Blömer, Jakob Juhnke, Christina Kolb:
Anonymous and Publicly Linkable Reputation Systems. 478-488 - Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. 489-496 - Gus Gutoski, Douglas Stebila:
Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. 497-504
Authenticated Data Structures
- Yonatan Sompolinsky, Aviv Zohar:
Secure High-Rate Transaction Processing in Bitcoin. 507-527 - Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar:
Inclusive Block Chain Protocols. 528-547 - Dominique Schröder, Mark Simkin:
VeriStream - A Framework for Verifiable Data Streaming. 548-566
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.