|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Silver Sponsor Bronze Sponsor Sponsor in Kind |
Financial
Cryptography and Data Security '10
Fourteenth International Conference
|
|
Registration Reception
|
|
Location: Rotonda
|
Monday (1/25)
09:00 - 09:15 |
Registration |
09:15 - 09:30 |
Welcome and Opening Remarks
|
|
Location: Teide
|
09:30 - 10:30 |
Invited Talk: Ueli Maurer, ETH Zurich. Constructive cryptography -- A primer --- Chair: Moti Yung, Google and Columbia University |
10:30 - 11:00 |
Coffee Break |
11:00 - 13:00 |
Technical Paper Session 1 --- Chair: Ahmad-Reza Sadeghi, Ruhr-University Bochum |
|
Tal Moran, Harvard University, Tyler Moore, Harvard University. The Phish Market Protocol: Securely Sharing Attack Data Between Competitors |
|
Moti Yung, Columbia University, Aggelos Kiayias, Uconn. Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections |
|
BEST PAPER AWARD: Roger Dingledine, The Tor Project, Tsuen-Wan Ngan, Dan Wallach. Building Incentives into Tor |
|
Prithvi Bisht, University of Illinois, Chicago, A. Sistla, University of Illinois, Chicago, V.N. Venkatakrishnan, University of Illinois, Chicago. Automatically Preparing Safe SQL Queries |
|
Lunch |
|
Location: Zurrón |
14:30 - 16:30 |
Technical Paper Session 2 --- Chair: Roger Dingledine, The Tor Project |
|
SHORT PAPER: Ivan Damgard, Aarhus University, Marcel Keller, Aarhus University. Secure Multiparty AES |
|
SHORT PAPER: Bogdan Groza, Politehnica University, Marius Minea, Politehnica University. A formal approach for automated reasoning about off-line and non-blockable on-line guessing |
|
SHORT PAPER: Jorge Guajardo, Bart Mennink, K.U.Leuven, Berry Schoenmakers. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis |
|
SHORT PAPER: John Bethencourt, U. of California, Berkeley, Elaine Shi, PARC, Dawn Song, UC Berkeley. Signatures of Reputation: Towards Trust Without Identity |
|
SHORT PAPER: Jens Grossklags, Princeton University, Benjamin Johnson, Carnegie Mellon University, Nicolas Christin, Carnegie Mellon University. When Information Improves Information Security |
|
SHORT PAPER: Paul Syverson, Naval Research Laboratory, Will Yuen, Christopher Thorpe, Zhenming Liu. Intention-Disguised Algorithmic Trading |
|
Poster Presentations |
|
Location: VIP Reception
|
|
Conference Reception |
Tuesday (1/26)
|
Invited Talk: Jean-Pierre Hubaux, EPFL Switzerland. Security Mechanisms with Selfish Players in Wireless Networks. --- Chair: Pino Caballero-Gil, University of La Laguna |
|
Coffee Break |
|
Technical Paper Session 3 --- Chair: Ivan Damgard, Aarhus University |
|
Frank Stajano, |
|
Joseph Bonneau, |
|
Dan Kaminsky, IOActive, Len Sassaman,
Meredith Patterson, KU Leuven. PKI Layer Cake: New Collision Attacks Against
the Global X.509 Infrastructure |
|
Adam Barth, UC
Berkeley, Ben Rubinstein, UC Berkeley, Mukund Sundararajan,
Stanford, John Mitchell, Stanford, Dawn Song, UC Berkeley, Peter Bartlett, UC
Berkeley. A Learning-Based Approach to Reactive Security |
|
Lunch
|
|
Location: Bocoy
|
|
Technical Paper Session 4 --- Chair: Adam Barth, UC Berkeley |
|
Paul Karger, IBM TJ
Watson Research Center, David Toll, IBM, TJ Watson Research Center,
Elaine Palmer, IBM, TJ Watson Research Center,
Suzanne McIntosh, IBM, TJ Watson Research Center,
Samuel Weber, Jonathan Edwards. Implementing a High-Assurance Smart-Card OS |
|
Jan Camenisch, IBM
Research - |
|
Tom Chothia, |
|
Aline Gouget, Gemalto,
Sebastien Canard, |
|
Coffee Break |
|
Technical Paper Session 5 --- Chair: Sven Dietrich, Stevens Institute of Technology |
|
SHORT PAPER: Feng Hao, Thales E-Security. On
robust key agreement based on
public key authentication |
|
SHORT PAPER: Timo
Kasper, Ruhr-University Bochum, Christof Paar, Ruhr-University Bochum,
Michael Silbermann, Ruhr-University Bochum. All You Can Eat or Breaking a Real-World Contactless Payment System |
|
SHORT PAPER:Ulrich Rührmair, Christian Jaeger, Christian Hilgers, Michael Algasinger, György Csaba, Martin Stutzmann, TU Muenchen. Security Applications of Diodes with Unique Current-Voltage Characteristics |
|
SHORT PAPER: Ryan Gardner, |
|
SHORT PAPER: Steven Murdoch, |
|
SHORT PAPER: Aniket
Kate, |
|
|
|
IFCA General Meeting |
|
Rump Session |
Wednesday (1/27)
|
Invited Talk: Lorrie Faith Cranor, CMU. Users do the darndest things: True stories from the CyLab Usable Privacy and Security Laboratory. --- Chair: Ross Anderson, University of Cambridge |
|
Coffee Break |
|
Technical Paper Session 6 --- Chair: Gene Tsudik, UC Irvine |
|
Benedikt Westermann, Q2S - NTNU, Rolf Wendolsky, Jondos GmbH, Lexi Pimenidis, iDev GmbH, Dogan Kesdogan, University of
Siegen. Cryptographic Protocol Analysis of
AN.ON |
|
Sven Sche, Ruhr-Universitaet |
|
Tyler Moore, |
|
Kimmo Jvinen, |
|
Lunch
|
|
Location: Zurrón
|
|
Technical Paper Session 7 --- Chair: Bart Preneel, Katholieke Universiteit Leuven |
|
SHORT PAPER: Toni Perkovic,
FESB, Mario Cagalj, FESB, Nitesh
Saxena, Polytechnic Institute of NYU. Shoulder Surfing
Safe Login in a Partially Observable Attacker Model |
|
Mathias Bjorkqvist, Christian Cachin, Robert Haas, Xiao-Yu Hu, Anil Kurmus, Rene Pawlitzek, Marko Vukolic. Design and Implementation of a Key-Lifecycle Management System |
|
Octavian Catrina, Amitabh Saxena, |
|
Emiliano De Cristofaro, UCI, Gene Tsudik, UCI. Practical Private Set Intersection Protocols with
Linear Complexity |
|
SHORT PAPER: Xiaofeng
Chen, |
|
SHORT PAPER: Felix Gröbert,
Ruhr University Bochum, Daniel Bußmeyer,
Ruhr University Bochum, Jörg Schwenk,
Ruhr University Bochum, Christoph Wegener,
Ruhr University Bochum. Attacking
of SmartCard-based Banking Applications with JavaScript-based Rootkits |
|
Coffee Break |
|
Panel: Importance of Confidential Network Security Information Exchange for Critical Financial Infrastructure (CFI) Protection - views from participants of the PARSIFAL project |
|
Bernhard Haemmerli, Acris GmbH & University of Applied Sciences Lucerne, Rafael Llarena, Atos Origin, Michael Samson, FI-ISAC y NVB , Thomas Kohler, UBS. Moderator: Henning Arendt, @bc, Previous Chair of European Finance Forum |
|
Gala Dinner
|
|
Location: Fountain Hall
|
Thursday (1/28)
08:45 - 09:00 |
Registration |
09:00 - 10:30 |
Workshops Session 1 |
|
Workshop on Ethics in Computer Security Research
(WECSR 2010)
|
|
Location: Chasna 2.
|
|
First International Workshop on Lightweight
Cryptography for Resource-Constrained Devices (WLC'2010)
|
|
Location: Chasna 3.
|
|
Coffee Break |
|
Workshops Session 2 |
|
First Workshop on Real-Life Cryptographic
Protocols and Standardization (RLCPS’10) |
|
Location: Chasna 1.
|
|
Workshop on Ethics in Computer Security Research
(WECSR 2010) |
|
First International Workshop on Lightweight
Cryptography for Resource-Constrained Devices (WLC'2010) |
|
Lunch
|
|
Location: Zurrón
|
|
Workshops Session 3 |
|
First Workshop on Real-Life Cryptographic
Protocols and Standardization (RLCPS’10) |
|
Workshop on Ethics in Computer Security Research
(WECSR 2010) |
|
|
|
|
|
Workshops Session 4 |
|
First Workshop on Real-Life Cryptographic
Protocols and Standardization (RLCPS’10) |
|
Workshop on Ethics in Computer Security Research
(WECSR 2010) |
|
|
|
Friday (1/29)
|
Excursion to El Teide and La Laguna |
|
|
For more information
contact Pino
Caballero-Gil, FC10 General Chair.
This conference is organized annually by the International
Financial Cryptography Association.