Skip to main content
  • Conference proceedings
  • © 2005

Financial Cryptography and Data Security

9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3570)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FC: International Conference on Financial Cryptography and Data Security

Conference proceedings info: FC 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Threat and Attacks

    1. Protecting Secret Data from Insider Attacks

      • David Dagon, Wenke Lee, Richard Lipton
      Pages 16-30
  3. Invited Speaker

    1. Trust and Swindling on the Internet

      • Bezalel Gavish
      Pages 44-44
  4. Digital Signing Methods

    1. Time Capsule Signature

      • Yevgeniy Dodis, Dae Hyun Yum
      Pages 57-71
    2. Policy-Based Cryptography and Applications

      • Walid Bagga, Refik Molva
      Pages 72-87
  5. Panel

    1. A Chat at the Old Phishin’ Hole

      • Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart Stubblebine, Michael Szydlo
      Pages 88-88
    2. Modeling and Preventing Phishing Attacks

      • Markus Jakobsson
      Pages 89-89
    3. Helping the Phish Detect the Lure

      • Steven Myers
      Pages 90-90
  6. Privacy

    1. A Privacy-Protecting Coupon System

      • Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner
      Pages 93-108
    2. Testing Disjointness of Private Datasets

      • Aggelos Kiayias, Antonina Mitrofanova
      Pages 109-124
  7. Hardware Oriented Mechanisms

    1. RFID Traceability: A Multilayer Problem

      • Gildas Avoine, Philippe Oechslin
      Pages 125-140
    2. Information-Theoretic Security Analysis of Physical Uncloneable Functions

      • P. Tuyls, B. Å korić, S. Stallinga, A. H. M. Akkermans, W. Ophey
      Pages 141-155
  8. Supporting Financial Transactions

    1. Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure

      • StanisÅ‚aw Jarecki, Vitaly Shmatikov
      Pages 172-187
  9. Systems, Applications, and Experiences

    1. Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce

      • Simson L. Garfinkel, Jeffrey I. Schiller, Erik Nordlander, David Margrave, Robert C. Miller
      Pages 188-202

Other Volumes

  1. Financial Cryptography and Data Security

About this book

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005. This conference, organized by the International Financial Cryptography Association (IFCA), continues to be the premier international forum for research, exploration, and debate regarding security in the context of finance and commerce. The conference title and scope was expanded this year to cover all aspects of securing transactions and systems. The goal is to build an interdisciplinary meeting, bringing together cryptographers, data-security specialists, business and economy researchers, as well as economists, IT professionals, implementers, and policy makers. We think that this goal was met this year. The conference received 90 submissions and 24 papers were accepted, 22 in the Research track and 2 in the Systems and Applications track. In addition, the conference featured two distinguished invited speakers, Bezalel Gavish and Lynne Coventry, and two interesting panel sessions, one on phishing and the other on economics and information security. Also, for the first time, some of the papers that were judged to be very strong but did not make the final program were selected for special invitation to our Works in Progress (Rump) Session that took place on Wednesday evening. Three papers were highlighted in this forum this year, and short versions of the papers are included here. As always, other conference attendees were also invited to make presentations during the rump session, and the evening lived up to its colorful reputation.

Editors and Affiliations

  • National Research Council of Canada, Ottawa, Canada

    Andrew S. Patrick

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access