


default search action
18th Financial Cryptography 2014: Christ Church, Barbados
- Nicolas Christin

, Reihaneh Safavi-Naini:
Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8437, Springer 2014, ISBN 978-3-662-45471-8
Payment Systems
- Rigel Gjomemo, Hafiz Malik

, Nilesh Sumb, V. N. Venkatakrishnan, Rashid Ansari:
Digital Check Forgery Attacks on Client Check Truncation Systems. 3-20 - Steven J. Murdoch

, Ross J. Anderson:
Security Protocols and Evidence: Where Many Payment Systems Fail. 21-32 - Tyler Moore

, Richard Clayton:
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites. 33-48
Case Studies
- Adam McCarthy, Ben Smyth, Elizabeth A. Quaglia

:
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes. 51-63 - Franziska Roesner, Brian T. Gill, Tadayoshi Kohno:

Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages. 64-76 - Benjamin Henne, Maximilian Koch, Matthew Smith

:
On the Awareness, Control and Privacy of Shared Photo Metadata. 77-88 - Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg, J. Alex Halderman:

Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security. 89-96
Cloud and Virtualization
- Jan Stanek, Alessandro Sorniotti, Elli Androulaki, Lukas Kencl

:
A Secure Data Deduplication Scheme for Cloud Storage. 99-118 - Clémentine Maurice

, Christoph Neumann, Olivier Heen, Aurélien Francillon
:
Confidentiality Issues on a GPU in a Virtualized Environment. 119-135
Elliptic Curve Cryptography
- Mehdi Tibouchi

:
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings. 139-156 - Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:

Elliptic Curve Cryptography in Practice. 157-175
Privacy-Preserving Systems
- Sebastiaan de Hoogh, Berry Schoenmakers, Ping Chen, Harm op den Akker

:
Practical Secure Decision Tree Learning in a Teletreatment Application. 179-194 - Seny Kamara, Payman Mohassel, Mariana Raykova, Seyed Saeed Sadeghian:

Scaling Private Set Intersection to Billion-Element Sets. 195-215 - Prastudy Fauzi

, Helger Lipmaa
, Bingsheng Zhang:
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations. 216-233 - Kaoru Kurosawa:

Garbled Searchable Symmetric Encryption. 234-251
Authentication and Visual Encryption
- Julien Bringer, Hervé Chabanne

, Roch Lescuyer, Alain Patey:
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. 255-272 - Lucjan Hanzlik, Kamil Kluczniak:

A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates. 273-282 - Lucjan Hanzlik, Kamil Kluczniak, Miroslaw Kutylowski:

Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users. 283-290 - Sebastian Pape

:
Sample or Random Security - A Security Model for Segment-Based Visual Cryptography. 291-303
Network Security
- Henning Perl, Sascha Fahl, Matthew Smith

:
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores. 307-315 - Nicholas Hopper:

Challenges in Protecting Tor Hidden Services from Botnet Abuse. 316-325 - Marie Vasek

, Tyler Moore
:
Identifying Risk Factors for Webserver Compromise. 326-345
Mobile System Security
- Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan

:
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing. 349-364 - Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow, Ahmad-Reza Sadeghi:

On the (In)Security of Mobile Two-Factor Authentication. 365-383 - Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht

, Stefan Katzenbeisser, Ahmad-Reza Sadeghi:
MoP-2-MoP - Mobile Private Microblogging. 384-396
Incentives, Game Theory and Risk
- John Ross Wallrabenstein

, Chris Clifton:
Privacy Preserving Tâtonnement - A Cryptographic Construction of an Incentive Compatible Market. 399-416 - Aron Laszka

, Benjamin Johnson, Jens Grossklags, Márk Félegyházi:
Estimating Systematic Risk in Real-World Networks. 417-435 - Ittay Eyal, Emin Gün Sirer:

Majority Is Not Enough: Bitcoin Mining Is Vulnerable. 436-454
Bitcoin Anonymity
- Michele Spagnuolo, Federico Maggi

, Stefano Zanero
:
BitIodine: Extracting Intelligence from the Bitcoin Network. 457-468 - Philip Koshy, Diana Koshy, Patrick D. McDaniel:

An Analysis of Anonymity in Bitcoin Using P2P Network Traffic. 469-485 - Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:

Mixcoin: Anonymity for Bitcoin with Accountable Mixes. 486-504

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














