Front cover image for Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers

Financial Cryptography and Data Security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval
eBook, English, 2013
Springer Berlin Heidelberg : Imprint : Springer, Berlin, Heidelberg, 2013
1 online resource (XVI, 406 pages 70 illustrations) : online resource
9783642398841, 3642398847
964893632
Printed edition:
Keynote
Can Nature Help Us Solve Risk Management Issues? Position Paper
Electronic Payment (Bitcoin)
Quantitative Analysis of the Full Bitcoin Transaction Graph
Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk (Short Paper)
Evaluating User Privacy in Bitcoin
Usability Aspects
The Importance of Being Earnest [In Security Warnings] (Short Paper)
Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing (Short Paper)
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication (Short Paper)
Secure Computation
Practical Fully Simulatable Oblivious Transfer with Sublinear Communication
Unconditionally-Secure Robust Secret Sharing with Minimum Share Size
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
Passwords
"Give Me Letters 2, 3 and 6!": Partial Password Implementations and Attacks
Hey, You, Get Off of My Clipboard: On How Usability Trumps Security in Android Password Managers
Privacy Primitives and Non-repudiation
Unique Ring Signatures: A Practical Construction (Short Paper)
Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency
Accumulators and U-Prove Revocation (Short Paper)
Anonymity
Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy (Short Paper)
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems (Short Paper)
Hardware Security
Coupon Collector's Problem for Fault Analysis against AES
High Tolerance for Noisy Fault Injections (Short Paper)
Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study (Short Paper)
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards (Short Paper)
Secure Computation and Secret Sharing
Securely Solving Simple Combinatorial Graph Problems
Parallel and Dynamic Searchable Symmetric Encryption
GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits
Invited Talk
The Untapped Potential of Trusted Execution Environments on Mobile Devices: Extended Abstract
Authentication Attacks and Countermeasures
Stark: Tamperproof Authentication to Resist Keylogging
Risks of Offline Verify PIN on Contactless Cards (Short Paper)
How to Attack Two-Factor Authentication Internet Banking (Short Paper)
CAge: Taming Certificate Authorities by Inferring Restricted Scopes (Short Paper)
Privacy of Data and Communication
Interdependent Privacy: Let Me Share Your Data
A Secure Submission System for Online Whistle blowing Platforms (Short Paper)
Securing Anonymous Communication Channels under the Selective DoS Attack (Short Paper)
Private Data Retrieval
PIRMAP: Efficient Private Information Retrieval for MapReduce
Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (Short Paper)
Posters
Three-Factor User Authentication Method Using Biometrics Challenge Response
Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services
Onions for Sale: Putting Privacy on the Market
Searchable Encryption Supporting General Boolean Expression Queries
A Privacy Preserving E-Payment Architecture
Communication Services Empowered with a Classical Chaos Based Cryptosystem