


default search action
12th Financial Cryptography 2008: Cozumel, Mexico
- Gene Tsudik:

Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5143, Springer 2008, ISBN 978-3-540-85229-2
Attacks and Counter Measures I
- N. Boris Margolin, Brian Neil Levine:

Quantifying Resistance to the Sybil Attack. 1-15 - Tyler Moore

, Richard Clayton:
Evaluating the Wisdom of Crowds in Assessing Phishing Websites. 16-30 - Jon McLachlan, Nicholas Hopper:

Don't Clog the Queue! Circuit Clogging and Mitigation in P2P Anonymity Schemes. 31-46
Protocols
- Shaoquan Jiang, Reihaneh Safavi-Naini:

An Efficient Deniable Key Exchange Protocol (Extended Abstract). 47-52 - Yvo Desmedt, Tanja Lange:

Revisiting Pairing Based Group Key Exchange. 53-68 - Shuhua Wu, Yuefei Zhu:

Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. 69-82
Theory
- Vladimir Kolesnikov, Thomas Schneider

:
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions. 83-97 - Vandana Gunupudi, Stephen R. Tate:

Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents. 98-112 - Keith B. Frikken, Lukasz Opyrchal:

PBS: Private Bartering Systems. 113-127
Hardware, Chips and Tags
- Tim Güneysu

, Christof Paar:
Breaking Legacy Banking Standards with Special-Purpose Hardware. 128-140 - Gildas Avoine, Kassem Kalach, Jean-Jacques Quisquater:

ePassport: Securing International Contacts with Contactless Chips. 141-155 - Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin:

Good Variants of HB+ Are Hard to Find. 156-170 - Shane Balfe, Kenneth G. Paterson:

Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). 171-175
Attacks and Counter-Measures II
- Mohammad Mannan, Paul C. van Oorschot

:
Weighing Down "The Unbearable Lightness of PIN Cracking". 176-181 - Debra L. Cook, Vijay K. Gurbani, Michael Daniluk:

Phishwish: A Stateless Phishing Filter Using Minimal Rules. 182-186 - Bob Mungamuru, Stephen A. Weis

:
Competition and Fraud in Online Advertising Markets. 187-191 - André N. Klingsheim, Kjell Jørgen Hole:

Identity Theft: Much Too Easy? A Study of Online Systems in Norway. 192-196 - Yngve Espelid, Lars-Helge Netland, André N. Klingsheim, Kjell Jørgen Hole:

A Proof of Concept Attack against Norwegian Internet Banking Systems. 197-201 - Sébastien Canard, Aline Gouget, Jacques Traoré:

Improvement of Efficiency in (Unconditional) Anonymous Transferable E-Cash. 202-214
Signatures and Encryption
- Stanislaw Jarecki, Josh Olsen:

Proactive RSA with Non-interactive Signing. 215-230 - Vicente Benjumea

, Seung Geol Choi, Javier López
, Moti Yung:
Fair Traceable Multi-Group Signatures. 231-246 - Fuchun Guo

, Yi Mu, Zhide Chen:
Identity-Based Online/Offline Encryption. 247-261
Anonymity and E-Cash
- Alessandro Acquisti, Nicolas Christin

, Bryan Parno, Adrian Perrig:
Countermeasures against Government-Scale Monetary Forgery. 262-266 - Daniel A. Nagy, Nadzeya V. Shakel

:
OpenPGP-Based Financial Instruments and Dispute Arbitration. 267-271 - Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto:

An Efficient Anonymous Credential System. 272-286 - Man Ho Au

, Willy Susilo
, Yi Mu:
Practical Anonymous Divisible E-Cash from Bounded Accumulators. 287-301
Miscellaneous
- Mary Ellen Zurko, Andrew S. Patrick:

Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. 302-306 - Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti Yung:

Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report). 307-313 - Antonio San Martino, Xavier Perramon

:
Securing Web Banking Applications. 314-315 - Peter Williams:

Privacy Threats in Online Stock Quotes. 316-317 - N. Asokan

, Jan-Erik Ekberg:
A Platform for OnBoard Credentials. 318-320 - Ken Huang, Paul Douthit:

ST&E Is the Most Cost Effective Measure for Comply with Payment Card Industry (PCI) Data Security Standard. 321-322 - William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan

, Bhavani Thuraisingham:
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. 323-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














