


default search action
19th Financial Cryptography 2015: San Juan, Puerto Rico
- Rainer Böhme, Tatsuaki Okamoto:

Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8975, Springer 2015, ISBN 978-3-662-47853-0
Invited Talk
- Gavin Andresen:

What Satoshi Did Not Know. 3-10
Cybercrime
- Olivier Thonnard, Leyla Bilge, Anand Kashyap, Martin Lee

:
Are You at Risk? Profiling Organizations and Individuals Subject to Targeted Attacks. 13-31 - Vaibhav Garg, Sadia Afroz, Rebekah Overdorf, Rachel Greenstadt:

Computer-Supported Cooperative Crime. 32-43 - Marie Vasek

, Tyler Moore
:
There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. 44-61
Sidechannels
- W. Brad Moore, Henry Tan, Micah Sherr, Marcus A. Maloof:

Multi-class Traffic Morphing for Encrypted VoIP Communication. 65-85 - Janaka Alawatugoda

, Douglas Stebila
, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. 86-106 - David Fifield, Serge Egelman

:
Fingerprinting Web Users Through Font Metrics. 107-124
Cryptography in the Cloud
- Foteini Baldimtsi, Olga Ohrimenko:

Sorting and Searching Behind the Curtain. 127-146 - Tarik Moataz, Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:

Resizable Tree-Based Oblivious RAM. 147-167 - Wouter Lueks, Ian Goldberg:

Sublinear Scaling for Multi-Client Private Information Retrieval. 168-186
Payment and Fraud Detection
- Tom Chothia, Flavio D. Garcia, Joeri de Ruiter

, Jordi van den Breekel, Matthew Thompson:
Relay Cost Bounding for Contactless EMV Payments. 189-206 - Serge Vaudenay:

Private and Secure Public-Key Distance Bounding - Application to NFC Payment. 207-216 - Sören Preibusch, Thomas Peetz, Gunes Acar, Bettina Berendt:

Purchase Details Leaked to PayPal. 217-226 - Dan Bogdanov

, Marko Jõemets, Sander Siim, Meril Vaht:
How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. 227-234
Authentication and Access Control
- Sebastian Uellenbeck, Thomas Hupperich

, Christopher Wolf, Thorsten Holz
:
Tactile One-Time Pad: Leakage-Resilient Authentication for Smartphones. 237-253 - Asadullah Al Galib, Reihaneh Safavi-Naini:

User Authentication Using Human Cognitive Abilities. 254-271 - Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, N. Asokan

:
Smart and Secure Cross-Device Apps for the Internet of Advanced Things. 272-290
Cryptographic Primitives
- Thomas Groß:

Signatures and Efficient Proofs on Committed Graphs and NP-Statements. 293-314 - Yannis Rouselakis, Brent Waters:

Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. 315-332 - Rachid El Bansarkhani, Özgür Dagdelen, Johannes Buchmann:

Augmented Learning with Errors: The Untapped Potential of the Error Term. 333-352
Mobile Security
- Ahmet Talha Ozcan, Can Gemicioglu, Kaan Onarlioglu, Michael Weissbacher, Collin Mulliner, William K. Robertson, Engin Kirda:

BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications. 355-369 - Christian Szongott, Michael Brenner, Matthew Smith:

METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points. 370-386 - Alexandra Dmitrienko, Stephan Heuser, Thien Duc Nguyen, Marcos da Silva Ramos, Andre Rein

, Ahmad-Reza Sadeghi:
Market-Driven Code Provisioning to Mobile Secure Hardware. 387-404
Privacy and Incentives
- Mathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti:

On Non-cooperative Genomic Privacy. 407-426 - Michela Chessa, Jens Grossklags, Patrick Loiseau:

A Short Paper on the Incentives to Share Private Information for Population Estimates. 427-436 - Paolo Palmieri

, Johan A. Pouwelse
:
Paying the Guard: An Entry-Guard-Based Payment System for Tor. 437-444 - Alex Biryukov

, Ivan Pustogarov:
Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay. 445-455
Applications and Attacks
- Yongjun Zhao

, Sherman S. M. Chow
:
Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding. 459-477 - Johannes Blömer, Jakob Juhnke, Christina Kolb:

Anonymous and Publicly Linkable Reputation Systems. 478-488 - Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:

Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. 489-496 - Gus Gutoski, Douglas Stebila

:
Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. 497-504
Authenticated Data Structures
- Yonatan Sompolinsky, Aviv Zohar

:
Secure High-Rate Transaction Processing in Bitcoin. 507-527 - Yoad Lewenberg, Yonatan Sompolinsky, Aviv Zohar

:
Inclusive Block Chain Protocols. 528-547 - Dominique Schröder

, Mark Simkin:
VeriStream - A Framework for Verifiable Data Streaming. 548-566

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














