[fc-announce] FC'05 - Registration Now Open
Stuart E. Schechter
ses@ll.mit.edu
Wed, 12 Jan 2005 21:29:22 -0500
Registration now open at
http://www.ifca.ai/fc05/registration.html
Call for Participation
________________________________________
Financial Cryptography and Data Security
February 28 -> March 3, 2005
Roseau, Dominica
________________________________________
http://www.ifca.ai/fc05
* Registration is now open *
Financial Cryptography and Data Security (FC'05) is the premier
international forum for research, advanced development, education,
exploration, and debate regarding security in the context of finance and
commerce. We have augmented our conference title and expanded our scope
to cover all aspects of securing transactions and systems. These aspects
include a range of technical areas such as: cryptography, payment
systems, secure transaction architectures, software systems and tools,
user and operator interfaces, fraud prevention, secure IT
infrastructure, and analysis methodologies.
FC'05 brings together top cryptographers, data-security specialists,
and scientists with economists, bankers, implementers, and policy
makers. Intimate and colorful by tradition, the FC'05 program will
features invited talks (to be announced), academic presentations,
technical demonstrations, and panel discussions. This conference is
organized annually by the International Financial Cryptography
Association (IFCA).
Keynote Speakers
================
Lynne Coventry (NCR)
Usable Security: A conundrum?
Bezalel Gavish (Southern Methodist University)
Trust and Swindling on the Internet
Panel Sessions
==============
Financial Technology in the Developing World
Allan Friedman (Harvard) - Organizer
Alessandro Acquisti (CMU)
H William Burdett, Jr. (Foley & Lardner, LLP)
Jon Peha (CMU)
Phishing
Steve Myers (Indiana University) - Organizer
Drew Dean (SRI)
Stuart Stubblebine (Stubblebine Research Labs)
Richard Clayton (Cambridge, UK)
Markus Jakobsson (Indiana University CACR)
Research Papers
===============
Fraud within Asymmetric Multi-Hop Cellular Networks
Gildas Avoine (EPFL, Lausanne, Switzerland)
Information-Theoretic Security Analysis of Physical Uncloneable Functions
P. Tuyls
B. Skoric
S. Stallinga
A.H. Akkermans
W. Ophey (Philips Research Laboratories, The Netherlands)
Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce.
Simson L. Garfinkel
Jeffrey I. Schiller
Erik Nordlander (MIT)
David Margrave (Amazon.com)
Robert C. Miller (MIT)
Identity-based Partial Message Recovery Signatures
(or How to Shorten ID-based Signatures)
Fangguo Zhang (Sun Yat Sen University, P.R.China)
Yi Mu
Willy Susilo (University of Wollongong, Australia)
How to Non-Interactively Update a Secret
Eujin Goh (Stanford University)
Philippe Golle (Palo Alto Research Center)
Interactive Diffie-Hellman Assumptions with Applications
to Password-Based Authentication
Michel Abdalla
David Pointcheval (Ecole Normale Superieure)
Achieving Fairness in Private Contract Negotiation
Keith Frikken
Mikhail Atallah (Purdue University)
Protecting Secret Data from Insider Attacks
David Dagon
Wenke Lee
Richard Lipton (Georgia Tech)
RFID Traceability A Multilayer Problem
Gildas Avoine
Philippe Oechslin (EPFL Lausanne Switzerland)
A User-Friendly Approach to Human Authentication of Messages
Jeff King
Andre dos Santos (Georgia Tech)
Countering Identity Theft through Digital Uniqueness,
Location Cross-Checking, and Funneling
P.C. van Oorschot (Carleton University)
S. Stubblebine (Stubblebine Research Labs)
Policy-Based Cryptography and Applications
Walid Bagga
Refik Molva (Eurecom)
A Privacy Protecting Coupon System
Liqun Chen (HP Laboratories)
Matthias Enzmann (Fraunhofer SIT)
Ahmad-Reza Sadeghi (University of Bochum)
Markus Schneider (Fraunhofer SIT)
Michael Steiner (IBM T.J. Watson)
Analysis of a Multi-Party Fair Exchange Protocol and Formal
Proof of Correctness in the Strand Space model
Steve Kremer
Aybek Mukhamedov
Eike Ritter (University of Birmingham, UK)
Secure Biometric Authentication for Weak Computational Devices
Mikhail J. Atallah
Keith B. Frikken (Purdue)
Michael T. Goodrich (UC Irvine)
Roberto Tamassia (Brown)
Small Coalitions Cannot Manipulate Voting
Edith Elkind (Princeton University)
Helger Lipmaa (Helsinki University of Technology)
Efficient Privacy-Preserving Protocols for Multi-Unit Auctions
Felix Brandt (Stanford)
Tuomas Sandholm (Carnegie Mellon University)
Risk Assurance for Hedge Funds using Zero Knowledge Proofs
Michael Szydlo (RSA Security/Independent)
Testing Disjointness of Private Datasets
Aggelos Kiayias (University of Connecticut)
Antonina Mitrofanova (Rutgers University)
Time Capsule Signature
Yevgeniy Dodis (NYU)
Dae Hyun Yum (POSTECH)
Probabilistic Escrow of Financial Transactions
with Cumulative Threshold Disclosure
Stanislaw Jarecki (UC Irvine)
Vitaly Shmatikov (UT Austin)
Approximation in Message Authentication
Giovanni Di Crescenzo
Richard Graveman (Telcordia)
Gonzalo Arce
Renwei Ge (U Delaware)
Systems & Applications Presentations
====================================
Securing Sensitive Data with the Ingrian DataSecure Platform
Andrew Koyfman (Ingrian Networks)
Ciphire Mail Email Encryption
Lars Eilebrecht (Ciphire Labs)
GOLD SPONSOR
============
Interactive Investor
http://www.iii.co.uk/
SPONSORS
========
RSA Security
http://www.rsasecurity.com/
Indiana University Center for Applied Cybersecurity Research
http://cacr.iu.edu/
Bibit Global Payment Services
http://www.bibit.com/