Skip to main content
  • Conference proceedings
  • © 2007

Financial Cryptography and Data Security

11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4886)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FC: International Conference on Financial Cryptography and Data Security

Conference proceedings info: FC 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (37 papers)

  1. Front Matter

  2. Keynote Address

    1. Leaving Room for the Bad Guys

      • Mike Bond
      Pages 1-1
  3. Payment Systems

    1. Vulnerabilities in First-Generation RFID-enabled Credit Cards

      • Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O’Hare
      Pages 2-14
    2. Conditional E-Cash

      • Larry Shi, Bogdan Carbunar, Radu Sion
      Pages 15-28
    3. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting

      • Liqun Chen, Alberto N. Escalante B., Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
      Pages 29-44
  4. Anonymity

    1. A Model of Onion Routing with Provable Anonymity

      • Joan Feigenbaum, Aaron Johnson, Paul Syverson
      Pages 57-71
    2. K-Anonymous Multi-party Secret Handshakes

      • Shouhuai Xu, Moti Yung
      Pages 72-87
  5. Authentication

    1. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups

      • Yvo Desmedt, Tanja Lange, Mike Burmester
      Pages 104-118
    2. On Authentication with HMAC and Non-random Properties

      • Christian Rechberger, Vincent Rijmen
      Pages 119-133
  6. Anonymity and Privacy

    1. Hidden Identity-Based Signatures

      • Aggelos Kiayias, Hong-Sheng Zhou
      Pages 134-147
    2. Space-Efficient Private Search with Applications to Rateless Codes

      • George Danezis, Claudia Diaz
      Pages 148-162
  7. Cryptography and Commercial Transactions

    1. Cryptographic Securities Exchanges

      • Christopher Thorpe, David C. Parkes
      Pages 163-178
    2. Improved Multi-party Contract Signing

      • Aybek Mukhamedov, Mark Ryan
      Pages 179-191
    3. Informant: Detecting Sybils Using Incentives

      • N. Boris Margolin, Brian N. Levine
      Pages 192-207
  8. Financial Transactions and Web Services

    1. Dynamic Virtual Credit Card Numbers

      • Ian Molloy, Jiangtao Li, Ninghui Li
      Pages 208-223

Other Volumes

  1. Financial Cryptography and Data Security

About this book

The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. ifca. ai), organized by the International Financial Crypt- raphy Association (IFCA, http://www. ifca. ai/), was held in Tobago, February 12–15, 2007. The conference is a well-established and premier international - rum for research, advanced development, education, exploration, and debate - garding security in the context of ?nance and commerce. We continue to cover all aspects of securing transactions and systems, which this year included a range of technical areas such as cryptography, payment systems, anonymity, privacy, - thentication, and commercial and ?nancial transactions. For the ?rst time, there was an adjacent workshop on Usable Security, held after FC 2007 in the same - cation. The papers are included in the last part of this volume. The conference goal was to bring together top cryptographers, data-security specialists, and c- puter scientists with economists, bankers, implementers, and policy makers. The goal was met this year: there were 85 submissions, out of which 17 research papers and 1 system presentation paper were accepted. In addition, the conference featured two distinguished speakers, Mike Bond and Dawn Jutla, and two panel sessions, one on RFID and one on virtual economies. As always, there was the rump session on Tuesday evening, colorful as usual.

Editors and Affiliations

  • Software Engineering Institute, Carnegie Mellon University, Pittsburgh, USA

    Sven Dietrich

  • CRCS DEAS, Harvard University, Cambridge, USA

    Rachna Dhamija

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access