[fc-announce] Call for participation: FC14 -- Early registration deadline in 2 weeks

Tyler Moore tylerm at smu.edu
Fri Jan 17 18:37:47 CET 2014


CALL FOR PARTICIPATION                   CALL FOR PANELS AND POSTERS

********************************************************************
Financial Cryptography and Data Security
March 3-7, 2014, Accra Beach Hotel & Spa, Barbados
http://fc14.ifca.ai/
********************************************************************

ABOUT THE CONFERENCE

Financial Cryptography and Data Security is a major international
forum for research, advanced development, education, exploration, and
debate regarding information assurance, with a specific focus on
financial, economic and commercial transaction security. 2014 will be
the eighteenth year in which FC has run, and the conference has
continued to grow both in terms of quality of papers and number of
attendees.

The conference will be a 4-day event featuring technical presentations
of 19 full papers and 12 short papers, selected by rigorous
peer-review from 138 submissions.

Two 1-day workshops following the conference are:

    2nd Workshop on Applied Homomorphic Cryptography (WAHC'14)
    1st Workshop on Bitcoin Research (BITCOIN'14)

More details on the workshops can be found at
http://fc14.ifca.ai/workshops.html

REGISTRATION

EARLY REGISTRATION DEADLINE: FEBRUARY 1, 2014

Registration information is available at:
http://fc14.ifca.ai/registration.html

EXTENDED DEADLINE FOR PANEL PROPOSALS AND POSTERS:
Deadline for submission: Jan 27
Notifications:           Jan 31

LIST OF CONFERENCE ACCEPTED PAPERS

 -- FULL-LENGTH PAPERS --

John Ross Wallrabenstein and Chris Clifton. Privacy Preserving
Tatonnement; A Cryptographic Construction of an Incentive Compatible
Market

Jan Stanek, Lukas Kencl, Alessandro Sorniotti and Elli Androulaki. A
Secure Data Deduplication Scheme for Cloud Storage

Mehdi Tibouchi. Elligator Squared: Uniform Points on Elliptic Curves
of Prime Order as Uniform Random Strings

Tyler Moore and Richard Clayton. The Ghosts of Banking Past: Empirical
Analysis of Closed Bank Websites

Kaoru Kurosawa. Garbled Searchable Symmetric Encryption

Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed
Sadeghian. Scaling Private Set Intersection to Billion-Element Sets

Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong and
N. Asokan. Drone to the Rescue: Relay-Resilient Authentication using
Ambient Multi-Sensing

Philip Koshy, Diana Koshy and Patrick McDaniel. An Analysis of
Anonymity in Bitcoin Using P2P Network Traffic

Ittay Eyal and Emin Gun Sirer. Majority is not Enough: Bitcoin Mining
is Vulnerable

Julien Bringer, Hervé Chabanne, Roch Lescuyer and Alain
Patey. Efficient and Strongly Secure Dynamic Domain-Specific
Pseudonymous Signatures for ID Documents

Clementine Maurice, Christoph Neumann, Olivier Heen and Aurélien
Francillon. Confidentiality Issues on a GPU in a Virtualized
Environment

Berry Schoenmakers, Sebastiaan de Hoogh, Ping Chen and Harm Op den
Akker. Practical Secure Decision Tree Learning in a Teletreatment
Application

Marie Vasek and Tyler Moore. Identifying Risk Factors for Webserver
Compromise

Prastudy Fauzi, Helger Lipmaa and Bingsheng Zhang. Efficient
Non-Interactive Zero Knowledge Arguments for Set Operations

Alexandra Dmitrienko, Christopher Liebchen, Christian Rossow and
Ahmad-Reza Sadeghi. When More Becomes Less: On the (In)Security of
Mobile Two-Factor Authentication

Rigel Gjomemo, Hafiz Malik, Nilesh Sumb, Rashid Ansari and
V.N. Venkatakrishnan. Digital Check Forgery Attacks on Client Check
Truncation Systems

Joppe Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael
Naehrig and Eric Wustrow. Elliptic Curve Cryptography in Practice

Aron Laszka, Benjamin Johnson, Jens Grossklags and Mark
Felegyhazi. Estimating Systematic Risk in Real-World Networks

Joseph Bonneau, Jeremy Clark, Joshua A. Kroll, Andrew Miller and
Arvind Narayanan. Mixcoin: Anonymity for Bitcoin with accountable
mixes

 -- SHORT PAPERS --

Steven Murdoch and Ross Anderson. Security protocols and evidence:
where many payment systems fail

Michele Spagnuolo, Federico Maggi and Stefano Zanero. BitIodine:
Extracting Intelligence from the Bitcoin Network

Henning Perl, Sascha Fahl and Matthew Smith. You Won't Be Needing
These Any More: On Removing Unused Certificates From Trust Stores

Lucjan Hanzlik and Kamil Kluczniak. A Short Paper on How to Improve
U-Prove Using Self-Blindable Certificates

Lucjan Hanzlik, Kamil Kluczniak and Miroslaw Kutylowski. Attack on a
U-Prove Revocation Scheme

Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg and J. Alex
Halderman. Outsmarting Proctors with Smart Watches: A Case Study on
Wearable Computing Security

Nicholas Hopper. Challenges in protecting Tor hidden services from
botnet abuse

Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht,
Stefan Katzenbeisser and Ahmad-Reza Sadeghi. MoP-2-MoP -- Mobile
private microblogging

Adam McCarthy, Ben Smyth and Elizabeth Quaglia. Hawk and Aucitas:
e-auction schemes from the Helios and Civitas e-voting schemes

Franziska Roesner, Brian T. Gill and Tadayoshi Kohno. Sex, Lies, or
Kittens? Investigating the Use of Snapchat’s Self-Destructing Messages

Sebastian Pape. Sample or Random Security – A Security Model for
Segment-Based Visual Encryption

Benjamin Henne, Maximilian Koch and Matthew Smith. Now You See Me, Now
You Don't: On the Awareness and Control of Photo Metadata

PANEL PROPOSALS

We especially would like to encourage submissions of panel
proposals. These should include a very brief description of the panel
topics, as well as of the prospective panelists. Accepted panel
sessions will be presented at the conference. Moreover, each
participant will contribute a one-page abstract to be published in the
conference proceedings. Please feel free to contact us directly if you
would like to further discuss the suitability of a certain
topic. Panel submissions must not be anonymous and should be up to 2
pages, sent to fc14chair at ifca.ai.

POSTERS

The poster session is the perfect venue to share a provocative
opinion, interesting established or preliminary work, or a cool idea
that will spark discussion. Poster presenters will benefit from a
multi-hour session to discuss their work, get exposure, and receive
feedback from attendees. Poster submissions should be a 1-page
abstract (in the same LNCS format) describing the poster. Please keep
in mind that the poster deadline is later than the main paper
submission deadline. The poster abstracts will be published in the
proceedings. Poster proposals must not be anonymous and should be sent
to the posters chair at fc14chair at ifca.ai.

STUDENT STIPENDS

We are pleased to announce the availability of enhanced financial
support for students attending FC14. We anticipate awarding student
stipends that would cover conference registration fees and reimburse
travel expenses up to $750. Preference will be given to students who
will be presenting at the conference or associated workshops, but all
student participants are encouraged to apply. If you are interested in
applying for stipend support, please email the FC2014 general chair at
fc14general at ifca.ai with subject line "student stipend" and a letter
of support from your home institution.

This conference is organized annually by the International Financial
Cryptography Association.

Additional information about the conference can be found at:
http://fc14.ifca.ai/


More information about the fc-announce mailing list