[fc-announce] FC'05 - Registration Now Open

Stuart E. Schechter ses@ll.mit.edu
Wed, 12 Jan 2005 21:29:22 -0500

Registration now open at

                     Call for Participation

            Financial Cryptography and Data Security
                  February 28 -> March 3, 2005
                       Roseau, Dominica

                  * Registration is now open *

   Financial Cryptography and Data Security (FC'05) is the premier
international forum for research, advanced development, education,
exploration, and debate regarding security in the context of finance and
commerce.  We have augmented our conference title and expanded our scope
to cover all aspects of securing transactions and systems. These aspects
include a range of technical areas such as: cryptography, payment
systems, secure transaction architectures, software systems and tools,
user and operator interfaces, fraud prevention, secure IT
infrastructure, and analysis methodologies.

   FC'05 brings together top cryptographers, data-security specialists,
and scientists with economists, bankers, implementers, and policy
makers. Intimate and colorful by tradition, the FC'05 program will
features invited talks (to be announced), academic presentations,
technical demonstrations, and panel discussions. This conference is
organized annually by the International Financial Cryptography
Association (IFCA).

Keynote Speakers

Lynne Coventry (NCR)
   Usable Security: A conundrum?
Bezalel Gavish (Southern Methodist University)
   Trust and Swindling on the Internet
Panel Sessions

Financial Technology in the Developing World
    Allan Friedman (Harvard) - Organizer
    Alessandro Acquisti (CMU)
    H William Burdett, Jr. (Foley & Lardner, LLP)
    Jon Peha (CMU)

    Steve Myers (Indiana University) - Organizer
    Drew Dean (SRI)
    Stuart Stubblebine (Stubblebine Research Labs)
    Richard Clayton (Cambridge, UK)
    Markus Jakobsson (Indiana University CACR)

Research Papers

Fraud within Asymmetric Multi-Hop Cellular Networks
    Gildas Avoine (EPFL, Lausanne, Switzerland)

Information-Theoretic Security Analysis of Physical Uncloneable Functions
    P. Tuyls
    B. Skoric
    S. Stallinga
    A.H. Akkermans
    W. Ophey (Philips Research Laboratories, The Netherlands)
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce.
    Simson L. Garfinkel
    Jeffrey I. Schiller
    Erik Nordlander (MIT)
    David Margrave (Amazon.com)
    Robert C. Miller (MIT)

Identity-based Partial Message Recovery Signatures
(or How to Shorten ID-based Signatures)
    Fangguo Zhang (Sun Yat Sen University, P.R.China)
    Yi Mu
    Willy Susilo (University of Wollongong, Australia)

How to Non-Interactively Update a Secret
    Eujin Goh (Stanford University)
    Philippe Golle (Palo Alto Research Center)

Interactive Diffie-Hellman Assumptions with Applications
to Password-Based Authentication
    Michel Abdalla
    David Pointcheval (Ecole Normale Superieure)

Achieving Fairness in Private Contract Negotiation
    Keith Frikken
    Mikhail Atallah (Purdue University)

Protecting Secret Data from Insider Attacks
    David Dagon
    Wenke Lee
    Richard Lipton (Georgia Tech)

RFID Traceability A Multilayer Problem
    Gildas Avoine
    Philippe Oechslin (EPFL Lausanne Switzerland)

A User-Friendly Approach to Human Authentication of Messages
    Jeff King
    Andre dos Santos (Georgia Tech)

Countering Identity Theft through Digital Uniqueness,
Location Cross-Checking, and Funneling
    P.C. van Oorschot (Carleton University)
    S. Stubblebine (Stubblebine Research Labs)

Policy-Based Cryptography and Applications
    Walid Bagga
    Refik Molva (Eurecom)

A Privacy Protecting Coupon System
    Liqun Chen (HP Laboratories)
    Matthias Enzmann (Fraunhofer SIT)
    Ahmad-Reza Sadeghi (University of Bochum)
    Markus Schneider (Fraunhofer SIT)
    Michael Steiner (IBM T.J. Watson)

Analysis of a Multi-Party Fair Exchange Protocol and Formal
Proof of Correctness in the Strand Space model
    Steve Kremer
    Aybek Mukhamedov
    Eike Ritter (University of Birmingham, UK)

Secure Biometric Authentication for Weak Computational Devices
    Mikhail J. Atallah
    Keith B. Frikken (Purdue)
    Michael T. Goodrich (UC Irvine)
    Roberto Tamassia (Brown)

Small Coalitions Cannot Manipulate Voting
    Edith Elkind (Princeton University)
    Helger Lipmaa (Helsinki University of Technology)

Efficient Privacy-Preserving Protocols for Multi-Unit Auctions
    Felix Brandt (Stanford)
    Tuomas Sandholm (Carnegie Mellon University)

Risk Assurance for Hedge Funds using Zero Knowledge Proofs
    Michael Szydlo (RSA Security/Independent)

Testing Disjointness of Private Datasets
    Aggelos Kiayias (University of Connecticut)
    Antonina Mitrofanova (Rutgers University)
Time Capsule Signature
    Yevgeniy Dodis (NYU)
    Dae Hyun Yum (POSTECH)

Probabilistic Escrow of Financial Transactions
with Cumulative Threshold Disclosure
    Stanislaw Jarecki (UC Irvine)
    Vitaly Shmatikov (UT Austin)

Approximation in Message Authentication
    Giovanni Di Crescenzo
    Richard Graveman (Telcordia)
    Gonzalo Arce
    Renwei Ge (U Delaware)

Systems & Applications Presentations

Securing Sensitive Data with the Ingrian DataSecure Platform
    Andrew Koyfman (Ingrian Networks)

Ciphire Mail Email Encryption
    Lars Eilebrecht (Ciphire Labs)

Interactive Investor

RSA Security
Indiana University Center for Applied Cybersecurity Research
Bibit Global Payment Services