default search action
11th Financial Cryptography 2007: Scarborough, Trinidad and Tobago
- Sven Dietrich, Rachna Dhamija:
Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers. Lecture Notes in Computer Science 4886, Springer 2008, ISBN 978-3-540-77365-8
Keynote Address
- Mike Bond:
Leaving Room for the Bad Guys. 1
Payment Systems
- Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare:
Vulnerabilities in First-Generation RFID-enabled Credit Cards. 2-14 - Larry Shi, Bogdan Carbunar, Radu Sion:
Conditional E-Cash. 15-28 - Liqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. 29-44
Panel
- Kevin Fu:
Panel: RFID Security and Privacy. 45 - Ross J. Anderson:
Position Statement in RFID S&P Panel: RFID and the Middleman. 46-49 - Jon Callas:
Position Statement in RFID S&P Panel: Contactless Smart Cards. 50-52 - Yvo Desmedt:
Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. 53-56
Anonymity
- Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:
A Model of Onion Routing with Provable Anonymity. 57-71 - Shouhuai Xu, Moti Yung:
K-Anonymous Multi-party Secret Handshakes. 72-87
Authentication
- Mohammad Mannan, Paul C. van Oorschot:
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. 88-103 - Yvo Desmedt, Tanja Lange, Mike Burmester:
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. 104-118 - Christian Rechberger, Vincent Rijmen:
On Authentication with HMAC and Non-random Properties. 119-133
Anonymity and Privacy
- Aggelos Kiayias, Hong-Sheng Zhou:
Hidden Identity-Based Signatures. 134-147 - George Danezis, Claudia Díaz:
Space-Efficient Private Search with Applications to Rateless Codes. 148-162
Cryptography and Commercial Transactions
- Christopher Thorpe, David C. Parkes:
Cryptographic Securities Exchanges. 163-178 - Aybek Mukhamedov, Mark Ryan:
Improved Multi-party Contract Signing. 179-191 - N. Boris Margolin, Brian Neil Levine:
Informant: Detecting Sybils Using Incentives. 192-207
Financial Transactions and Web Services
- Ian M. Molloy, Jiangtao Li, Ninghui Li:
Dynamic Virtual Credit Card Numbers. 208-223 - Omer Berkman, Odelia Moshe Ostrovsky:
The Unbearable Lightness of PIN Cracking. 224-238
Panel
- Christopher Thorpe, Jessica Hammer, L. Jean Camp, Jon Callas, Mike Bond:
Virtual Economies: Threats and Risks. 239-244
Invited Talk
- Dawn N. Jutla:
Usable SPACE: Security, Privacy, and Context for the Mobile User. 245
System Presentation
- Siddharth Bhatt, Bogdan Carbunar, Radu Sion, Venu Vasudevan:
Personal Digital Rights Management for Mobile Cellular Devices. 246
Cryptography
- Vipul Goyal:
Certificate Revocation Using Fine Grained Certificate Space Partitioning. 247-259 - Jun Furukawa, Hideki Imai:
An Efficient Aggregate Shuffle Argument Scheme. 260-274
Usable Security Workshop
- Rachna Dhamija:
Preface. 277-279
Full Papers
- Collin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth:
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. 281-293 - Chris Masone, Kwang-Hyun Baek, Sean W. Smith:
WSKE: Web Server Key Enabled Cookies. 294-306 - Ersin Uzun, Kristiina Karvonen, N. Asokan:
Usability Analysis of Secure Pairing Methods. 307-324 - Cynthia Kuo, Jesse Walker, Adrian Perrig:
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. 325-340 - Jens Grossklags, Nathan Good:
Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. 341-355
Short Papers
- Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis, Youn-Kyung Lim:
What Instills Trust? A Qualitative Study of Phishing. 356-361 - Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad:
Phishing IQ Tests Measure Fear, Not Ability. 362-366 - Farzaneh Asgharpour, Debin Liu, L. Jean Camp:
Mental Models of Security Risks. 367-377 - April Slayden Mitchell, Alan H. Karp:
Improving Usability by Adding Security to Video Conferencing Systems. 378-382 - Jakob Illeborg Pagter, Marianne Graves Petersen:
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed? 383-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.