default search action
20th Financial Cryptography 2016: Christ Church, Barbados
- Jens Grossklags, Bart Preneel:
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9603, Springer 2017, ISBN 978-3-662-54969-8
Fraud and Deception
- Youngsam Park, Damon McCoy, Elaine Shi:
Understanding Craigslist Rental Scams. 3-21 - Ian M. Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens, Ron van Schaik:
Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. 22-40 - Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Zhuoqing Morley Mao, Atul Prakash:
Android UI Deception Revisited: Attacks and Defenses. 41-59 - Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. 60-77
Payments, Auctions, and e-Voting
- Christina Garman, Matthew Green, Ian Miers:
Accountable Privacy for Decentralized Anonymous Payments. 81-98 - Amira Barki, Solenn Brunet, Nicolas Desmoulins, Sébastien Gambs, Saïd Gharout, Jacques Traoré:
Private eCash in Practice (Short Paper). 99-109 - Abdelrahaman Aly, Mathieu Van Vyve:
Practically Efficient Secure Single-Commodity Multi-market Auctions. 110-129 - Sandra Guasch, Paz Morillo:
How to Challenge and Cast Your e-Vote. 130-145
Multiparty Computation
- Aydin Abadi, Sotirios Terzis, Changyu Dong:
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets. 149-168 - Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft:
Confidential Benchmarking Based on Multiparty Computation. 169-187 - Handan Kilinç, Alptekin Küpçü:
Efficiently Making Secure Two-Party Computation Fair. 188-207 - Alptekin Küpçü, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. 208-228
Mobile Malware
- Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. 231-249 - Alberto Coletta, Victor van der Veen, Federico Maggi:
DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper). 250-259 - Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi:
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper). 260-268
Social Interaction and Policy
- Tristan Caulfield, Christos Ioannidis, David J. Pym:
Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). 271-279
Cryptanalysis
- Abdalnaser Algwil, Jeff Yan:
Failures of Security APIs: A New Case. 283-298 - Berry Schoenmakers:
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal. 299-320 - Luke Valenta, Shaanan Cohney, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger:
Factoring as a Service. 321-338 - Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman:
The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper). 339-345 - S. Abhishek Anand, Nitesh Saxena:
A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds. 346-364
Surveillance and Anonymity
- Eline Vanrykel, Gunes Acar, Michael Herrmann, Claudia Díaz:
Leaky Birds: Exploiting Mobile Application Traffic for Surveillance. 367-384 - Anna Krasnova, Moritz Neikes, Peter Schwabe:
Footprint Scheduling for Dining-Cryptographer Networks. 385-402
Web Security and Data Privacy
- Radhesh Krishnan Konoth, Victor van der Veen, Herbert Bos:
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. 405-421 - Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, Sampath Srinivas:
Security Keys: Practical Cryptographic Second Factors for the Modern Web. 422-440 - Sajjad Arshad, Amin Kharraz, William Robertson:
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. 441-459 - Liuhua Chen, Shenghai Zhong, Li-e Wang, Xianxian Li:
A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data. 460-473
Bitcoin Mining
- Okke Schrijvers, Joseph Bonneau, Dan Boneh, Tim Roughgarden:
Incentive Compatibility of Bitcoin Mining Pool Reward Functions. 477-498 - Jason Teutsch, Sanjay Jain, Prateek Saxena:
When Cryptocurrencies Mine Their Own Business. 499-514 - Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar:
Optimal Selfish Mining Strategies in Bitcoin. 515-532
Cryptographic Protocols
- Lucjan Hanzlik, Kamil Kluczniak:
A Short Paper on Blind Signatures from Knowledge Assumptions. 535-543 - Joseph Carrigan, Paul D. Martin, Michael Rushanan:
KBID: Kerberos Bracelet Identification (Short Paper). 544-551
Payment Use and Abuse
- Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. 555-580 - Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
Refund Attacks on Bitcoin's Payment Protocol. 581-599 - Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). 600-608 - Marie Vasek, Joseph Bonneau, Ryan Castellucci, Cameron Keith, Tyler Moore:
The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. 609-618
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.