[fc-announce] FC'04: Call for Participation
Hinde ten Berge
hinde@xs4all.nl
Tue, 16 Dec 2003 19:56:27 +0100
Financial Cryptography '04
9-12 February 2004
Key West, Florida, USA
Call for Participation
Financial Cryptography is the premier international
forum for education, exploration, and debate at the
heart of one theme: Money and trust in the digital
world. Dedicated to the relationship between cryptography
and data security and cutting-edge financial and payment
technologies and trends, the conference brings together
top data-security specialists and scientists with
economists, bankers, implementers, and policy makers.
Financial Cryptography includes a program of invited
talks, academic presentations, technical demonstrations,
and panel discussions. These explore a range of topics
in their full technical and interdisciplinary complexity:
Emerging financial instruments and trends, legal
regulation of financial technologies and privacy issues,
encryption and authentication techologies, digital cash,
and smartcard payment systems -- among many others.
The conference proceedings containing all accepted
submissions will be published in the Springer-Verlag
Lecture Notes in Computer Science (LNCS) series after
the conference. A pre-proceedings containing preliminary
versions of the papers will be distributed at the
conference.
More information on the invited speakers is available
on the web site, as well as the list of accepted papers
and the preliminary schedule (see below as well).
Registration for Financial Cryptography 2004 is now open;
details and online registration can be found at
http://fc04.ifca.ai along with information about
discounted hotel accommodation and travel.
Financial Cryptography is organized by the International
Financial Cryptography Association (IFCA). More
information can be obtained from the IFCA web site at
http://www.ifca.ai or by contacting the conference
general chair, Hinde ten Berge, at hinde@xs4all.nl.
Financial Cryptography '04
Preliminary Schedule
Sunday February 8
[tba] Registration and Welcome Reception
Monday February 9
08:45-09:00 Opening Remarks
09:00-10:00 Keynote Speaker: Jack Selby
10:00-11:00 Keynote Speaker: Ron Rivest
11:00-11:30 Coffee Break
11:30-12:30 Loyalty and Micropayment Systems
Microcredits for Verifiable Foreign Service
Provider Metering
Craig Gentry and Zulfikar Ramzan
A Privacy-Friendly Loyalty System Based on Discrete
Logarithms over Elliptic Curves
Matthias Enzmann, Marc Fischlin, and Markus Schneider
12:30-14:00 Lunch
14:00-15:00 User Authentication
Addressing Online Dictionary Attacks with Login
Histories and Humans-in-the-Loop
S. Stubblebine and P.C. van Oorschot
Call Center Customer Verification by Query-Directed
Passwords
Lawrence O’Gorman, Smit Begga, and John Bentley
Tuesday February 10
09:00-10:00 Keynote Speaker: Jacques Stern
(Session Chair: Moti Yung)
10:00-11:00 Keynote Speaker: Simon Pugh
(Session Chair: Moti Yung)
11:00–11:30 Coffee Break
11:30-12:30 E-voting
(Session Chair: Helger Lipmaa)
The Vector-Ballot E-Voting Approach
Aggelos Kiayias and Moti Yung
Efficient Maximal Privacy in Voting and Anonymous
Broadcast
Jens Groth
12:30-14:00 Lunch
14:00-15:00 Panel: Building Usable Security Systems
Moderator: Andrew Patrick
Usability and Acceptablity of Biometric Security
Systems
Andrew Patrick, National Research Council of Canada
Risk Perception Failures in Computer Security
L. Jean Camp, Harvard University
Visualization Tools for Security Administrators
Bill Yurcik, NCSA, Univeristy of Illinois
20:00-21:00 General meeting
21:00- Rump session
Wednesday February 11
09:00-10:00 Keynote Speaker: Jon Peha
10:00-10:30 Coffee Break
10:30-12:30 Auctions and Lotteries
(Session Chair: Roger Dingledine)
Interleaving Cryptography and Mechanism Design: The
Case of Online Auctions
Edith Elkind and Helger Lipmaa
Secure Generalized Vickrey Auction without Third-Party
Servers
Makoto Yokoo and Koutarou Suzuki
Electronic National Lotteries
Elisavet Konstantinou, Vasiliki Liagokou, Paul
Spirakis, Yannis C. Stamatiou, and Moti Yung
Identity-based Chameleon Hash and Applications
Giuseppe Ateniese and Breno de Medeiros
12:30-14:00 Lunch
Thursday February 12
09:00–10:30 Game Theoretic and Cryptographic Tools
Selecting Correlated Random Actions
Vanessa Teague
An Efficient and Usable Multi-Show Non-Transferable
Anonymous Credential System
Pino Persiano and Ivan Visconti
The Ephemeral Pairing Problem
Jaap-Henk Hoepman
10:30–11:00 Coffee Break
11:00–13:00 Mix Networks and Anonymous Communications
(Session Chair: Masayuki Abe)
Mixminion: Strong Anonymity for Financial Cryptography
Nick Mathewson and Roger Dingledine
Practical Anonymity for the Masses with MorphMix
Marc Rennhard and Bernhard Plattner
Stopping Timing Attacks in Low-Latency Mix-Based
Systems
Brian N. Levine, Michael K. Reiter, and Chenxi Wang
Provable Unlinkability Against Traffic Analysis
Ron Berman, Amos Fiat, and Amnon Ta-Shma