Skip to main content
  • Conference proceedings
  • © 2017

Financial Cryptography and Data Security

20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9603)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FC: International Conference on Financial Cryptography and Data Security

Conference proceedings info: FC 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages I-XIV
  2. Fraud and Deception

    1. Front Matter

      Pages 1-1
    2. Understanding Craigslist Rental Scams

      • Youngsam Park, Damon McCoy, Elaine Shi
      Pages 3-21
    3. Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud

      • Ian Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck et al.
      Pages 22-40
    4. Android UI Deception Revisited: Attacks and Defenses

      • Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Z. Morley Mao et al.
      Pages 41-59
    5. Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers

      • Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle
      Pages 60-77
  3. Payments, Auctions, and e-Voting

    1. Front Matter

      Pages 79-79
    2. Accountable Privacy for Decentralized Anonymous Payments

      • Christina Garman, Matthew Green, Ian Miers
      Pages 81-98
    3. Private eCash in Practice (Short Paper)

      • Amira Barki, Solenn Brunet, Nicolas Desmoulins, Sébastien Gambs, Saïd Gharout, Jacques Traoré
      Pages 99-109
    4. Practically Efficient Secure Single-Commodity Multi-market Auctions

      • Abdelrahaman Aly, Mathieu Van Vyve
      Pages 110-129
    5. How to Challenge and Cast Your e-Vote

      • Sandra Guasch, Paz Morillo
      Pages 130-145
  4. Multiparty Computation

    1. Front Matter

      Pages 147-147
    2. VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets

      • Aydin Abadi, Sotirios Terzis, Changyu Dong
      Pages 149-168
    3. Confidential Benchmarking Based on Multiparty Computation

      • Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft
      Pages 169-187
    4. Efficiently Making Secure Two-Party Computation Fair

      • Handan Kılınç, Alptekin Küpçü
      Pages 188-207
    5. Fast Optimistically Fair Cut-and-Choose 2PC

      • Alptekin Küpçü, Payman Mohassel
      Pages 208-228
  5. Mobile Malware

    1. Front Matter

      Pages 229-229
    2. CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes

      • Patrick Carter, Collin Mulliner, Martina Lindorfer, William Robertson, Engin Kirda
      Pages 231-249
    3. DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper)

      • Alberto Coletta, Victor van der Veen, Federico Maggi
      Pages 250-259
    4. DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)

      • Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi
      Pages 260-268

Other Volumes

  1. Financial Cryptography and Data Security

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016.

The 27 revised full papers and 9 short papers were carefully selected and reviewed from 137 full papers submissions. The papers are grouped in the following topical sections: fraud and deception; payments, auctions, and e-voting; multiparty computation; mobile malware; social interaction and policy; cryptanalysis; surveillance and anonymity; Web security and data privacy; Bitcoin mining; cryptographic protocols; payment use and abuse.

Editors and Affiliations

  • Technical University Munich, Garching, Germany

    Jens Grossklags

  • Department of Electrical Engineering-ESAT, KU Leuven, Leuven, Belgium

    Bart Preneel

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access