


default search action
20th Financial Cryptography 2016: Christ Church, Barbados
- Jens Grossklags, Bart Preneel:

Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9603, Springer 2017, ISBN 978-3-662-54969-8
Fraud and Deception
- Youngsam Park, Damon McCoy, Elaine Shi:

Understanding Craigslist Rental Scams. 3-21 - Ian M. Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens, Ron van Schaik:

Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. 22-40 - Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Zhuoqing Morley Mao, Atul Prakash

:
Android UI Deception Revisited: Attacks and Defenses. 41-59 - Jassim Aljuraidan, Lujo Bauer

, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. 60-77
Payments, Auctions, and e-Voting
- Christina Garman, Matthew Green, Ian Miers:

Accountable Privacy for Decentralized Anonymous Payments. 81-98 - Amira Barki, Solenn Brunet, Nicolas Desmoulins, Sébastien Gambs, Saïd Gharout, Jacques Traoré:

Private eCash in Practice (Short Paper). 99-109 - Abdelrahaman Aly, Mathieu Van Vyve:

Practically Efficient Secure Single-Commodity Multi-market Auctions. 110-129 - Sandra Guasch, Paz Morillo:

How to Challenge and Cast Your e-Vote. 130-145
Multiparty Computation
- Aydin Abadi

, Sotirios Terzis
, Changyu Dong:
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets. 149-168 - Ivan Damgård, Kasper Damgård, Kurt Nielsen

, Peter Sebastian Nordholt, Tomas Toft:
Confidential Benchmarking Based on Multiparty Computation. 169-187 - Handan Kilinç, Alptekin Küpçü

:
Efficiently Making Secure Two-Party Computation Fair. 188-207 - Alptekin Küpçü

, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. 208-228
Mobile Malware
- Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson

, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. 231-249 - Alberto Coletta, Victor van der Veen, Federico Maggi:

DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper). 250-259 - Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi:

DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper). 260-268
Social Interaction and Policy
- Tristan Caulfield

, Christos Ioannidis, David J. Pym:
Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). 271-279
Cryptanalysis
- Abdalnaser Algwil

, Jeff Yan:
Failures of Security APIs: A New Case. 283-298 - Berry Schoenmakers:

Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal. 299-320 - Luke Valenta, Shaanan Cohney

, Alex Liao, Joshua Fried, Satya Bodduluri, Nadia Heninger:
Factoring as a Service. 321-338 - Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman:

The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper). 339-345 - S. Abhishek Anand, Nitesh Saxena:

A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds. 346-364
Surveillance and Anonymity
- Eline Vanrykel, Gunes Acar, Michael Herrmann, Claudia Díaz:

Leaky Birds: Exploiting Mobile Application Traffic for Surveillance. 367-384 - Anna Krasnova, Moritz Neikes, Peter Schwabe:

Footprint Scheduling for Dining-Cryptographer Networks. 385-402
Web Security and Data Privacy
- Radhesh Krishnan Konoth, Victor van der Veen, Herbert Bos

:
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. 405-421 - Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, Sampath Srinivas:

Security Keys: Practical Cryptographic Second Factors for the Modern Web. 422-440 - Sajjad Arshad, Amin Kharraz, William Robertson

:
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. 441-459 - Liuhua Chen, Shenghai Zhong, Li-e Wang, Xianxian Li:

A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data. 460-473
Bitcoin Mining
- Okke Schrijvers, Joseph Bonneau, Dan Boneh, Tim Roughgarden:

Incentive Compatibility of Bitcoin Mining Pool Reward Functions. 477-498 - Jason Teutsch, Sanjay Jain, Prateek Saxena:

When Cryptocurrencies Mine Their Own Business. 499-514 - Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar:

Optimal Selfish Mining Strategies in Bitcoin. 515-532
Cryptographic Protocols
- Lucjan Hanzlik, Kamil Kluczniak:

A Short Paper on Blind Signatures from Knowledge Assumptions. 535-543 - Joseph Carrigan, Paul D. Martin

, Michael Rushanan:
KBID: Kerberos Bracelet Identification (Short Paper). 544-551
Payment Use and Abuse
- Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:

The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. 555-580 - Patrick McCorry, Siamak F. Shahandashti

, Feng Hao
:
Refund Attacks on Bitcoin's Payment Protocol. 581-599 - Steven J. Murdoch

, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse
, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). 600-608 - Marie Vasek

, Joseph Bonneau, Ryan Castellucci
, Cameron Keith, Tyler Moore
:
The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. 609-618

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














