


default search action
21st Financial Cryptography 2017: Sliema, Malta
- Aggelos Kiayias:

Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10322, Springer 2017, ISBN 978-3-319-70971-0
Privacy and Identity Management
- Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:

An Efficient Self-blindable Attribute-Based Credential Scheme. 3-20 - Sherman S. M. Chow

, Haibin Zhang, Tao Zhang:
Real Hidden Identity-Based Signatures. 21-38 - Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar

, Jonathan Chan, Mohamed Ali Kâafar
:
BehavioCog: An Observation Resistant Authentication Scheme. 39-58 - Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann:

Updatable Tokenization: Formal Definitions and Provably Secure Constructions. 59-75
Privacy and Data Processing
- Qian Wang

, Kui Ren, Minxin Du
, Qi Li
, Aziz Mohaisen:
SecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient Updates. 79-97 - Gabriel Kaptchuk, Matthew Green, Aviel D. Rubin:

Outsourcing Medical Dataset Analysis: A Possible Solution. 98-123 - David Derler

, Sebastian Ramacher
, Daniel Slamanig
:
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. 124-142
Cryptographic Primitives and API's
- Ryan Stanley-Oakes:

A Provably Secure PKCS#11 Configuration Without Authenticated Attributes. 145-162 - Youngho Yoo, Reza Azarderakhsh, Amir Jalali, David Jao

, Vladimir Soukharev:
A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies. 163-181 - Helger Lipmaa:

Optimally Sound Sigma Protocols Under DCRA. 182-203 - Reihaneh Safavi-Naini, Viliam Lisý, Yvo Desmedt:

Economically Optimal Variable Tag Length Message Authentication. 204-223
Vulnerabilities and Exploits
- Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena:

PEEP: Passively Eavesdropping Private Input via Brainwave Signals. 227-246 - Michael Schwarz, Clémentine Maurice, Daniel Gruss

, Stefan Mangard
:
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. 247-267 - Gunnar Hartung:

Attacks on Secure Logging Schemes. 268-284 - Matthew Smith, Daniel Moser, Martin Strohmeier

, Vincent Lenders
, Ivan Martinovic:
Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS. 285-301 - Vincent F. Taylor, Ivan Martinovic:

Short Paper: A Longitudinal Study of Financial Apps in the Google Play Store. 302-309 - Markus Jakobsson:

Short Paper: Addressing Sophisticated Email Attacks. 310-317
Blockchain Technology
- Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan:

Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin. 321-339 - Orfeas Stefanos Thyfronitis Litos

, Dionysis Zindros:
Trust Is Risk: A Decentralized Financial Trust Platform. 340-356 - Patrick McCorry, Siamak F. Shahandashti

, Feng Hao
:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. 357-375 - Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, Sasha Ivanov:

Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies. 376-392 - Adem Efe Gencer, Robbert van Renesse, Emin Gün Sirer:

Short Paper: Service-Oriented Sharding for Blockchains. 393-401
Security of Internet Protocols
- Aanchal Malhotra, Matthew Van Gundy, Mayank Varia, Haydn Kennedy, Jonathan Gardner, Sharon Goldberg:

The Security of NTP's Datagram Protocol. 405-423 - Pawel Szalachowski, Adrian Perrig:

Short Paper: On Deployment of DNS-Based Security Enhancements. 424-433
Blind Signatures
- Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed:

A Practical Multivariate Blind Signature Scheme. 437-454 - Essam Ghadafi

:
Efficient Round-Optimal Blind Signatures in the Standard Model. 455-473
Searching and Processing Private Data
- Raad Bahmani, Manuel Barbosa

, Ferdinand Brasser, Bernardo Portela
, Ahmad-Reza Sadeghi, Guillaume Scerri, Bogdan Warinschi:
Secure Multiparty Computation from SGX. 477-497 - Wakaha Ogata, Kaoru Kurosawa:

Efficient No-dictionary Verifiable Searchable Symmetric Encryption. 498-516 - Anamaria Costache, Nigel P. Smart, Srinivas Vivek

:
Faster Homomorphic Evaluation of Discrete Fourier Transforms. 517-529
Secure Channel Protocols
- Nayanamana Samarasinghe, Mohammad Mannan:

Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers. 533-541 - Yevgeniy Dodis, Dario Fiore:

Unilaterally-Authenticated Key Exchange. 542-560 - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Nadim Kobeissi:

Formal Modeling and Verification for Domain Validation and ACME. 561-578 - Tom Chothia, Flavio D. Garcia, Chris Heppel, Chris McMahon Stone:

Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps. 579-597
Privacy in Data Storage and Retrieval
- Cecylia Bocovich, John A. Doucette, Ian Goldberg:

Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage. 601-620 - Helger Lipmaa, Kateryna Pavlyk:

A Simpler Rate-Optimal CPIR Protocol. 621-638

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














