Skip to main content
  • Conference proceedings
  • © 2013

Financial Cryptography and Data Security

17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers

  • Fast conference proceedings
  • State-of-the-art report
  • Up to date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7859)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FC: International Conference on Financial Cryptography and Data Security

Conference proceedings info: FC 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (39 papers)

  1. Front Matter

  2. Keynote

  3. Electronic Payment (Bitcoin)

    1. Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk

      • Tyler Moore, Nicolas Christin
      Pages 25-33
    2. Evaluating User Privacy in Bitcoin

      • Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun
      Pages 34-51
  4. Usability Aspects

    1. The Importance of Being Earnest [In Security Warnings]

      • Serge Egelman, Stuart Schechter
      Pages 52-59
    2. RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication

      • Tiffany Hyun-Jin Kim, Akira Yamada, Virgil Gligor, Jason Hong, Adrian Perrig
      Pages 69-77
  5. Secure Computation

    1. Practical Fully Simulatable Oblivious Transfer with Sublinear Communication

      • Bingsheng Zhang, Helger Lipmaa, Cong Wang, Kui Ren
      Pages 78-95
    2. Unconditionally-Secure Robust Secret Sharing with Minimum Share Size

      • Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini
      Pages 96-110
  6. Passwords

    1. Hey, You, Get Off of My Clipboard

      • Sascha Fahl, Marian Harbach, Marten Oltrogge, Thomas Muders, Matthew Smith
      Pages 144-161
  7. Privacy Primitives and Non-repudiation

    1. Unique Ring Signatures: A Practical Construction

      • Matthew Franklin, Haibin Zhang
      Pages 162-170
    2. Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency

      • Kwangsu Lee, Dong Hoon Lee, Moti Yung
      Pages 171-188
    3. Accumulators and U-Prove Revocation

      • Tolga Acar, Sherman S. M. Chow, Lan Nguyen
      Pages 189-196
  8. Anonymity

    1. Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy

      • Johannes Buchmann, Denise Demirel, Jeroen van de Graaf
      Pages 197-204
    2. P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems

      • Andy Rupp, Gesine Hinterwälder, Foteini Baldimtsi, Christof Paar
      Pages 205-212
  9. Hardware Security

    1. Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study

      • Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, Koen De Bosschere
      Pages 221-229

Other Volumes

  1. Financial Cryptography and Data Security

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Financial Cryptography and Data Security (FC 2013), held at Bankoku Shinryokan Busena Terrace Beach Resort, Okinawa, Japan, April 1-5, 2013. The 14 revised full papers and 17 short papers were carefully selected and reviewed from 125 submissions. The papers are grouped in the following topical sections: electronic payment (Bitcoin), usability aspects, secure computation, passwords, privacy primitives and non-repudiation, anonymity, hardware security, secure computation and secret sharing, authentication attacks and countermeasures, privacy of data and communication, and private data retrieval.

Reviews

From the book reviews:

“Edited by Ahmad-Reza Sadeghi from the Center for Advanced Security Research Darmstadt (CASED) in Germany, the volume contains selected papers that are categorized into 12 sections besides the keynote and nominated posters. … this volume offers something for everyone, including those in academia and industry and in various information security domains.” (Phoram Mehta, Computing Reviews, July, 2014)

Editors and Affiliations

  • Technische Universität Darmstadt, Germany

    Ahmad-Reza Sadeghi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access