<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40"><head><meta http-equiv=Content-Type content="text/html; charset=us-ascii"><meta name=Generator content="Microsoft Word 14 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]--></head><body lang=EN-GB link=blue vlink=purple><div class=WordSection1><p class=MsoNormal>Financial Cryptography and Data Security (FC 2011), <o:p></o:p></p><p class=MsoNormal>Bay Gardens Beach Resort, St. Lucia<o:p></o:p></p><p class=MsoNormal>February 28 – March 4, 2011 - <a href="http://ifca.ai/fc11/">http://ifca.ai/fc11/</a><o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>[CFP in PDF: <a href="http://ifca.ai/fc11/fc11cfp.pdf">http://ifca.ai/fc11/fc11cfp.pdf</a>]<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Financial Cryptography and Data Security is a major international forum for<o:p></o:p></p><p class=MsoNormal>research, advanced development, education, exploration, and debate regarding<o:p></o:p></p><p class=MsoNormal>information assurance, with a specific focus on commercial contexts. The<o:p></o:p></p><p class=MsoNormal>conference covers all aspects of securing transactions and systems. Original<o:p></o:p></p><p class=MsoNormal>works focusing on both fundamental and applied real-world deployments <o:p></o:p></p><p class=MsoNormal>on all aspects surrounding commerce security are solicited. Submissions need <o:p></o:p></p><p class=MsoNormal>not be exclusively concerned with cryptography. Systems security and <o:p></o:p></p><p class=MsoNormal>inter-disciplinary efforts are particularly encouraged. <o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Topics include:<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Anonymity and Privacy, Auctions and Audits, Authentication and<o:p></o:p></p><p class=MsoNormal>Identification, Backup Authentication, Biometrics, Certification and<o:p></o:p></p><p class=MsoNormal>Authorization, Cloud Computing Security, Commercial Cryptographic<o:p></o:p></p><p class=MsoNormal>Applications, Transactions and Contracts, Data Outsourcing Security, Digital<o:p></o:p></p><p class=MsoNormal>Cash and Payment Systems, Digital Incentive and Loyalty Systems, Digital<o:p></o:p></p><p class=MsoNormal>Rights Management, Fraud Detection, Game Theoretic Approaches to Security, <o:p></o:p></p><p class=MsoNormal>Identity Theft, Spam, Phishing and Social Engineering, Infrastructure Design, <o:p></o:p></p><p class=MsoNormal>Legal and Regulatory Issues, Management and Operations, Microfinance and <o:p></o:p></p><p class=MsoNormal>Micropayments, Mobile Internet Device Security, Monitoring, Reputation Systems, <o:p></o:p></p><p class=MsoNormal>RFID-Based and Contactless Payment Systems, Risk Assessment and Management, <o:p></o:p></p><p class=MsoNormal>Secure Banking and Financial Web Services, Securing Emerging Computational<o:p></o:p></p><p class=MsoNormal>Paradigms, Security and Risk Perceptions and Judgments, Security Economics,<o:p></o:p></p><p class=MsoNormal>Smartcards, Secure Tokens and Hardware, Trust Management, Underground-Market<o:p></o:p></p><p class=MsoNormal>Economics, Usability, Virtual Economies, Voting Systems<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>IMPORTANT DATES<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Workshop Proposal Submission: August 6, 2010 <o:p></o:p></p><p class=MsoNormal>Workshop Proposal Notification: August 30, 2010 <o:p></o:p></p><p class=MsoNormal>Paper Submission: October 1, 2010<o:p></o:p></p><p class=MsoNormal>Paper Notification: November 15, 2010 <o:p></o:p></p><p class=MsoNormal>Final Papers: December 17, 2010 <o:p></o:p></p><p class=MsoNormal>Poster and Panel Submission: December 3, 2010 <o:p></o:p></p><p class=MsoNormal>Poster and Panel Notification: December 13, 2010 <o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>SUBMISSION<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Submission categories: (i) regular papers (15 pg LNCS format), (ii) short <o:p></o:p></p><p class=MsoNormal>papers (8 pg), (iii) panels and workshops (2 pg), and (iv) posters (1 pg).<o:p></o:p></p><p class=MsoNormal>Anonymized submissions will be double-blind reviewed.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Papers must be formatted in standard LNCS format and submitted as PDF files. <o:p></o:p></p><p class=MsoNormal>Submissions in other formats will be rejected. All papers must be submitted <o:p></o:p></p><p class=MsoNormal>electronically according to the instructions and forms found on this web <o:p></o:p></p><p class=MsoNormal>site and at the submission site.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Authors may only submit work that does not substantially overlap with <o:p></o:p></p><p class=MsoNormal>work that is currently submitted or has been accepted for publication <o:p></o:p></p><p class=MsoNormal>to a conference with proceedings or a journal. We consider double submission <o:p></o:p></p><p class=MsoNormal>serious research fraud and will treat it as such. In case of doubt contact <o:p></o:p></p><p class=MsoNormal>the program chair for any clarifications at fc11chair@ifca.ai.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Regular Research Papers.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Research papers should describe novel, previously unpublished scientific<o:p></o:p></p><p class=MsoNormal>contributions to the field, and they will be subject to rigorous peer<o:p></o:p></p><p class=MsoNormal>review. Accepted submissions will be included in the conference proceedings<o:p></o:p></p><p class=MsoNormal>to be published in the Springer-Verlag Lecture Notes in Computer Science<o:p></o:p></p><p class=MsoNormal>(LNCS) series. Submissions are limited to 15 pages.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Short Papers.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Short papers are also subject to peer review, however, the intention is to<o:p></o:p></p><p class=MsoNormal>encourage authors to introduce work in progress, novel applications and<o:p></o:p></p><p class=MsoNormal>corporate/industrial experiences. Short papers will be evaluated with a<o:p></o:p></p><p class=MsoNormal>focus on novelty and potential for sparking participants' interest and<o:p></o:p></p><p class=MsoNormal>future research avenues. Short paper submissions are limited to 8 pages <o:p></o:p></p><p class=MsoNormal>in standard LNCS format. The paper title for short papers should necessarily <o:p></o:p></p><p class=MsoNormal>include the text '(a short paper)'.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Panel Proposals.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>We especially would like to encourage submissions of panel proposals. These<o:p></o:p></p><p class=MsoNormal>should include a very brief description of the panel topics, as well as of<o:p></o:p></p><p class=MsoNormal>the prospective panelists. Accepted panel sessions will be presented at the<o:p></o:p></p><p class=MsoNormal>conference. Moreover, each participant will contribute a one-page abstract to<o:p></o:p></p><p class=MsoNormal>be published in the conference proceedings. Please feel free to contact us<o:p></o:p></p><p class=MsoNormal>directly if you would like to further discuss the suitability of a certain<o:p></o:p></p><p class=MsoNormal>topic. Panel submissions should be up to 2 pages, sent to fc11chair@ifca.ai.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Posters.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>The poster session is the perfect venue to share a provocative opinion,<o:p></o:p></p><p class=MsoNormal>interesting established or preliminary work, or a cool idea that will spark<o:p></o:p></p><p class=MsoNormal>discussion. Poster presenters will benefit from a multi-hour session to<o:p></o:p></p><p class=MsoNormal>discuss their work, get exposure, and receive feedback from attendees.<o:p></o:p></p><p class=MsoNormal>Poster submissions should be 1 page (in the same LNCS format). Please keep<o:p></o:p></p><p class=MsoNormal>in mind that the poster deadline is later than the main paper submission<o:p></o:p></p><p class=MsoNormal>deadline. The posters will be published in the proceedings.<o:p></o:p></p><p class=MsoNormal>Poster proposals should be sent to the posters chair at fc11chair@ifca.ai.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Workshop Proposals.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Proposals for workshops to be held at FC 2011 are also solicited. A<o:p></o:p></p><p class=MsoNormal>workshop can be full day or half day in length. Workshop proposals should<o:p></o:p></p><p class=MsoNormal>include: (i) a title, (ii) a call for papers, (iii) a brief summary and<o:p></o:p></p><p class=MsoNormal>justification -- including how it would fit into the greater FC scope, (iv)<o:p></o:p></p><p class=MsoNormal>a (tentative) Program Committee and its Chair, (v) one-paragraph bios for<o:p></o:p></p><p class=MsoNormal>key organizers, and (vi) the expected (or previous - if workshop has been<o:p></o:p></p><p class=MsoNormal>held in previous years) number of submissions, participants and acceptance<o:p></o:p></p><p class=MsoNormal>rates. Workshop proposals should be sent fc11workshops@ifca.ai.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>The Rump Session.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>FC'11 will also include the popular "rump session" held on one of the<o:p></o:p></p><p class=MsoNormal>evenings in an informal, social atmosphere. The rump session is a program of<o:p></o:p></p><p class=MsoNormal>short (5-7 minute), informal presentations on works in progress,<o:p></o:p></p><p class=MsoNormal>off-the-cuff ideas, and any other matters pertinent to the conference. Any<o:p></o:p></p><p class=MsoNormal>conference attendee is welcome to submit a presentation to the Rump Session<o:p></o:p></p><p class=MsoNormal>Chair (to be announced at the conference). This submission should consist of<o:p></o:p></p><p class=MsoNormal>a talk title, the name of the presenter, and, if desired, a very brief<o:p></o:p></p><p class=MsoNormal>abstract. Submissions may be sent via e-mail, or submitted in person in the<o:p></o:p></p><p class=MsoNormal>morning on the day of the session.<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>ORGANIZERS<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>General Chair: Steven Murdoch, University of Cambridge, UK<o:p></o:p></p><p class=MsoNormal>Local Arrangements Chair: Fabian Monrose, University of North Carolina Chapel Hill, US<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>PROGRAM COMMITTEE<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Program Chair: George Danezis, Microsoft Research, UK<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>Ross Anderson, University of Cambridge, UK<o:p></o:p></p><p class=MsoNormal>Tuomas Aura, Helsinki University of Technology, FI<o:p></o:p></p><p class=MsoNormal>Lucas Ballard, Google, US<o:p></o:p></p><p class=MsoNormal>Adam Barth, UC Berkeley, US<o:p></o:p></p><p class=MsoNormal>Elisa Bertino, Purdue University, US<o:p></o:p></p><p class=MsoNormal>Kevin Butler, Pennsylvania State University, US<o:p></o:p></p><p class=MsoNormal>Srdjan Capkun, ETH Zurich, CH<o:p></o:p></p><p class=MsoNormal>Veronique Cortier, CNRS / LORIA, FR<o:p></o:p></p><p class=MsoNormal>Ernesto Damiani, University of Milan, IT<o:p></o:p></p><p class=MsoNormal>Claudia Diaz, K.U.Leuven, BE<o:p></o:p></p><p class=MsoNormal>Roger Dingledine, The Tor Project, US<o:p></o:p></p><p class=MsoNormal>Orr Dunkelman, Weizmann Institute of Science, IL<o:p></o:p></p><p class=MsoNormal>Simone Fisher-Hubner, Karlstad University, SE<o:p></o:p></p><p class=MsoNormal>Craig Gentry, Stanford University, US<o:p></o:p></p><p class=MsoNormal>Dieter Gollmann, Technische Universitat Harburg, DE<o:p></o:p></p><p class=MsoNormal>Rachel Greenstad, Drexel University, US<o:p></o:p></p><p class=MsoNormal>Jean-Pierre Hubaux, Ecole Polytechnique Federale de Lausanne, CH<o:p></o:p></p><p class=MsoNormal>Markus Jakobsson, Indiana University, US<o:p></o:p></p><p class=MsoNormal>Jaeyeon Jung, Intel Research, US<o:p></o:p></p><p class=MsoNormal>Stefan Katzenbeisser, Technische Universitat Darmstadt, DE<o:p></o:p></p><p class=MsoNormal>Angelos Keromytis, Columbia University, US<o:p></o:p></p><p class=MsoNormal>Arjen Lenstra, Ecole Polytechnique Federale de Lausanne, CH<o:p></o:p></p><p class=MsoNormal>Helger Lipmaa, Cybernetica AS, EE<o:p></o:p></p><p class=MsoNormal>Evangelos Markatos, FORTH, GR<o:p></o:p></p><p class=MsoNormal>David Molnar, Microsoft Research, US<o:p></o:p></p><p class=MsoNormal>Tyler Moore, Harvard University, US<o:p></o:p></p><p class=MsoNormal>David Naccache, Ecole normale superieure, FR<o:p></o:p></p><p class=MsoNormal>Thomas Ristenpart, University of Wisconsin, US<o:p></o:p></p><p class=MsoNormal>Peter Ryan, Universite du Luxembourg, LU<o:p></o:p></p><p class=MsoNormal>Ahmad-Reza Sadeghi, Ruhr-University Bochum, DE<o:p></o:p></p><p class=MsoNormal>Rei Safavi-Naini, University of Calgary, CA<o:p></o:p></p><p class=MsoNormal>Nigel Smart, University of Bristol, UK<o:p></o:p></p><p class=MsoNormal>Jessica Staddon, Google, US<o:p></o:p></p><p class=MsoNormal>Angelos Stavrou, George Mason University, US<o:p></o:p></p><p class=MsoNormal>Paul Syverson, Naval Research Laboratory, US<o:p></o:p></p><p class=MsoNormal>Nicholas Weaver, International Computer Science Institute, US<o:p></o:p></p><p class=MsoNormal>Moti Yung, Google, US<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p><p class=MsoNormal>The Financial Cryptography and Data Security <o:p></o:p></p><p class=MsoNormal>Conference is organized by The International <o:p></o:p></p><p class=MsoNormal>Financial Cryptography Association (IFCA).<o:p></o:p></p><p class=MsoNormal><o:p> </o:p></p></div></body></html>