FC10.jpg

DUQUE

Financial Cryptography and Data Security '10

logo-IFCA-transparent

Fourteenth International Conference
January 25-28, 2010

Dream Hotel Gran Tacande 5* & Spa Vitanova
Tenerife, Canary Islands, Spain

Preliminary Program

 

Sunday (1/24)

20:00 - 21:30

Registration Reception

 

Location: Rotonda


Monday (1/25)

09:00 - 09:15

Registration

09:15 - 09:30

Welcome and Opening Remarks

 

Location: Teide

09:30 - 10:30

Invited Talk: Ueli Maurer, ETH Zurich. Constructive cryptography -- A primer --- Chair: Moti Yung, Google and Columbia University

10:30 - 11:00

Coffee Break

11:00 - 13:00

Technical Paper Session 1 --- Chair: Ahmad-Reza Sadeghi, Ruhr-University Bochum

 

Tal Moran, Harvard University, Tyler Moore, Harvard University. The Phish Market Protocol: Securely Sharing Attack Data Between Competitors

 

Moti Yung, Columbia University, Aggelos Kiayias, Uconn. Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections

 

BEST PAPER AWARD: Roger Dingledine, The Tor Project, Tsuen-Wan Ngan, Dan Wallach. Building Incentives into Tor

 

Prithvi Bisht, University of Illinois, Chicago, A. Sistla, University of Illinois, Chicago, V.N. Venkatakrishnan, University of Illinois, Chicago. Automatically Preparing Safe SQL Queries

13:00 - 14:30

Lunch

 

Location: Zurrón

14:30 - 16:30

Technical Paper Session 2 --- Chair: Roger Dingledine, The Tor Project

 

SHORT PAPER: Ivan Damgard, Aarhus University, Marcel Keller, Aarhus University. Secure Multiparty AES

 

SHORT PAPER: Bogdan Groza, Politehnica University, Marius Minea, Politehnica University. A formal approach for automated reasoning about off-line and non-blockable on-line guessing

 

SHORT PAPER: Jorge Guajardo, Bart Mennink, K.U.Leuven, Berry Schoenmakers. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis

 

SHORT PAPER: John Bethencourt, U. of California, Berkeley, Elaine Shi, PARC, Dawn Song, UC Berkeley. Signatures of Reputation: Towards Trust Without Identity

 

SHORT PAPER: Jens Grossklags, Princeton University, Benjamin Johnson, Carnegie Mellon University, Nicolas Christin, Carnegie Mellon University. When Information Improves Information Security

 

SHORT PAPER: Paul Syverson, Naval Research Laboratory, Will Yuen, Christopher Thorpe, Zhenming Liu. Intention-Disguised Algorithmic Trading

20:00 - 21:30

Poster Presentations

 

Location: VIP Reception

20:00 - 21:30

Conference Reception


Tuesday (1/26)

09:30 - 10:30

Invited Talk: Jean-Pierre Hubaux, EPFL Switzerland. Security Mechanisms with Selfish Players in Wireless Networks. --- Chair: Pino Caballero-Gil, University of La Laguna

10:30 - 11:00

Coffee Break

11:00 - 13:00

Technical Paper Session 3 --- Chair: Ivan Damgard, Aarhus University

 

Frank Stajano, University of Cambridge, Ford-Long Wong, Bruce Christianson. Multichannel protocols to prevent relay attacks

 

Joseph Bonneau, University of Cambridge, Mike Just, Greg Matthews. What's in a Name? Evaluating Statistical Attacks on Personal Knowledge Questions

 

Dan Kaminsky, IOActive, Len Sassaman, Meredith Patterson, KU  Leuven. PKI Layer Cake: New Collision Attacks Against the Global X.509 Infrastructure

 

Adam Barth, UC Berkeley, Ben Rubinstein, UC Berkeley, Mukund  Sundararajan, Stanford, John Mitchell, Stanford, Dawn Song, UC  Berkeley, Peter Bartlett, UC Berkeley. A Learning-Based Approach to Reactive Security

13:00 - 14:30

Lunch

 

Location: Bocoy

14:30 - 16:30

Technical Paper Session 4 --- Chair: Adam Barth, UC Berkeley

 

Paul Karger, IBM TJ Watson Research Center, David  Toll, IBM, TJ  Watson Research Center, Elaine Palmer, IBM, TJ Watson Research  Center, Suzanne McIntosh, IBM, TJ Watson Research Center, Samuel Weber, Jonathan Edwards. Implementing a High-Assurance Smart-Card OS

 

Jan Camenisch, IBM Research - Zurich, Maria Dubovitskaya, IBM Russian Systems and Technology Laboratory Moscow Engineering Physics Institute, Gregory Neven, IBM Research - Zurich. Unlinkable Priced Oblivious Transfer with Rechargeable Wallets

 

Tom Chothia, University of Birmingham, Vitaliy Smirnov. A Traceability Attack Against e-Passports

 

Aline Gouget, Gemalto, Sebastien Canard, Orange. Multiple Denominations in E-cash with Compact Transaction Data

16:30 - 17:00

Coffee Break

17:00 - 19:00

Technical Paper Session 5 --- Chair: Sven Dietrich, Stevens Institute of Technology

 

SHORT PAPER:  Feng Hao, Thales E-Security. On robust key agreement based  on public key authentication

 

SHORT PAPER:  Timo Kasper, Ruhr-University Bochum, Christof Paar,  Ruhr-University Bochum, Michael Silbermann, Ruhr-University Bochum. All You  Can Eat or Breaking a Real-World Contactless Payment System

 

SHORT PAPER:Ulrich Rührmair, Christian Jaeger, Christian Hilgers, Michael Algasinger, György Csaba, Martin Stutzmann, TU Muenchen. Security Applications of Diodes with Unique Current-Voltage Characteristics

 

SHORT PAPER:  Ryan Gardner, Johns Hopkins University, Sujata Garera, Johns  Hopkins University, Aviel Rubin, Johns Hopkins University. Designing for  Audit: A Voting Machine with a Tiny TCB

 

SHORT PAPER:  Steven Murdoch, University of Cambridge, Ross Anderson,  University of Cambridge. Verified by Visa and MasterCard SecureCode: or, How  Not to Design Authentication

 

SHORT PAPER:  Aniket Kate, University of Waterloo, Ian Goldberg, University of  Waterloo. Using Sphinx to Improve Onion Routing Circuit  Construction

 

 

20:30 - 21:30

IFCA General Meeting

21:30 - 24:00

Rump Session


Wednesday (1/27)

09:30 - 10:30

Invited Talk: Lorrie Faith Cranor, CMU. Users do the darndest things: True stories from the CyLab Usable Privacy and Security Laboratory. --- Chair: Ross Anderson, University of Cambridge

10:30 - 11:00

Coffee Break

11:00 - 13:00

Technical Paper Session 6 --- Chair: Gene Tsudik, UC Irvine

 

Benedikt Westermann, Q2S - NTNU, Rolf Wendolsky, Jondos GmbH, Lexi  Pimenidis, iDev GmbH, Dogan Kesdogan, University of Siegen.  Cryptographic Protocol Analysis of AN.ON

 

Sven Sche, Ruhr-Universitaet Bochum, Jg Schwenk. A CDH-Based Ring  Signature Scheme with Short Signatures and Public Keys

 

Tyler Moore, Harvard University, Benjamin Edelman, Harvard Business  School. Measuring the Perpetrators and Funders of Typosquatting

 

Kimmo Jvinen, Helsinki University of Technology, Vladimir Kolesnikov, Bell Laboratories, Ahmad-Reza Sadeghi, Ruhr-University  Bochum, Thomas Schneider, Ruhr-University Bochum. Embedded SFE:  Offloading Server and Network using Hardware Tokens

13:00 - 14:30

Lunch

 

Location: Zurrón

14:30 - 17:00

Technical Paper Session 7 --- Chair: Bart Preneel, Katholieke Universiteit Leuven

 

SHORT PAPER:  Toni Perkovic, FESB, Mario Cagalj, FESB, Nitesh Saxena, Polytechnic  Institute of NYU. Shoulder Surfing Safe Login in a Partially  Observable Attacker Model

 

Mathias Bjorkqvist, Christian Cachin, Robert Haas, Xiao-Yu Hu, Anil Kurmus, Rene Pawlitzek, Marko Vukolic. Design and Implementation of a Key-Lifecycle Management System

 

Octavian Catrina, Amitabh Saxena, International University in Germany. Secure Computation With Fixed-Point Numbers

 

Emiliano De Cristofaro, UCI, Gene Tsudik, UCI. Practical Private Set Intersection Protocols with Linear Complexity

 

SHORT PAPER:  Xiaofeng Chen, Xidian University, Fangguo  Zhang, Haibo Tian, Yi  Mu, Kwangjo Kim. Three-round Abuse-free Optimistic Contract Signing  With Everlasting Secrecy

 

SHORT PAPER:  Felix Gröbert, Ruhr University Bochum, Daniel Bußmeyer, Ruhr University Bochum, Jörg Schwenk, Ruhr University Bochum,  Christoph Wegener, Ruhr University Bochum. Attacking of SmartCard-based Banking  Applications with JavaScript-based Rootkits

17:00 - 17:30

Coffee Break

17:30 - 19:00

Panel: Importance of Confidential Network Security Information Exchange for Critical Financial Infrastructure (CFI) Protection - views from participants of the PARSIFAL project

 

Bernhard Haemmerli, Acris GmbH & University of Applied Sciences Lucerne, Rafael Llarena, Atos Origin, Michael Samson, FI-ISAC y NVB , Thomas Kohler, UBS. Moderator: Henning Arendt, @bc, Previous Chair of European Finance Forum

20:30 - 23:00

Gala Dinner

 

Location: Fountain Hall


Thursday (1/28)

08:45 - 09:00

Registration

09:00 - 10:30

Workshops Session 1

 

Workshop on Ethics in Computer Security Research (WECSR 2010)

 

Location: Chasna 2.

 

First International Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC'2010)

 

Location: Chasna 3.

10:30 - 11:00

Coffee Break

11:00 - 13:00

Workshops Session 2

 

First Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS’10)

 

Location: Chasna 1.

 

Workshop on Ethics in Computer Security Research (WECSR 2010)

 

First International Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC'2010)

13:00 - 14:30

Lunch

 

Location: Zurrón

14:30 - 16:30

Workshops Session 3

 

First Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS’10)

 

Workshop on Ethics in Computer Security Research (WECSR 2010)

16:30 - 17:00

Coffee Break

17:00 - 19:00

Workshops Session 4

 

First Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS’10)

 

Workshop on Ethics in Computer Security Research (WECSR 2010)

 

Friday (1/29)

09:00-19:00

Excursion to El Teide and La Laguna

 

 

 

 

 

For more information contact Pino Caballero-Gil, FC10 General Chair.

This conference is organized annually by the International Financial Cryptography Association.