Skip to main content
  • Conference proceedings
  • © 2009

Financial Cryptography and Data Security

13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5628)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FC: International Conference on Financial Cryptography and Data Security

Conference proceedings info: FC 2009.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Economics of Information Security I

    1. Mitigating Inadvertent Insider Threats with Incentives

      • Debin Liu, XiaoFeng Wang, L. Jean Camp
      Pages 1-16
  3. Anonymity and Privacy I

    1. Privacy-Preserving Information Markets for Computing Statistical Data

      • Aggelos Kiayias, Bülent Yener, Moti Yung
      Pages 32-50
    2. Achieving Privacy in a Federated Identity Management System

      • Susan Landau, Hubert Le Van Gong, Robin Wilton
      Pages 51-70
    3. Data Hemorrhages in the Health-Care Sector

      • M. Eric Johnson
      Pages 71-89
  4. Private Computation

    1. Private Intersection of Certified Sets

      • Jan Camenisch, Gregory M. Zaverucha
      Pages 108-127
    2. Privacy-Preserving Classifier Learning

      • Justin Brickell, Vitaly Shmatikov
      Pages 128-147
  5. Economics of Information Security II

    1. Investments and Trade-offs in the Economics of Information Security

      • Christos Ioannidis, David Pym, Julian Williams
      Pages 148-166
    2. Blue versus Red: Towards a Model of Distributed Security Attacks

      • Neal Fultz, Jens Grossklags
      Pages 167-183
  6. Authentication and Identification

    1. Optimised to Fail: Card Readers for Online Banking

      • Saar Drimer, Steven J. Murdoch, Ross Anderson
      Pages 184-200
    2. Optical DNA

      • Deepak Vijaywargi, Dave Lewis, Darko Kirovski
      Pages 222-229
  7. Panel

    1. Passwords: If We’re So Smart, Why Are We Still Using Them?

      • Cormac Herley, P. C. van Oorschot, Andrew S. Patrick
      Pages 230-237
  8. Fraud Detection

    1. Detecting Denial of Service Attacks in Tor

      • Norman Danner, Danny Krizanc, Marc Liberatore
      Pages 273-284
  9. Auctions

    1. Cryptographic Combinatorial Securities Exchanges

      • Christopher Thorpe, David C. Parkes
      Pages 285-304
    2. Cryptographic Combinatorial Clock-Proxy Auctions

      • David C. Parkes, Michael O. Rabin, Christopher Thorpe
      Pages 305-324

Other Volumes

  1. Financial Cryptography and Data Security

About this book

This volume contains the proceedings of the 13th International Conference on Financial Cryptography and Data Security, held at the Accra Beach Hotel and Resort, Barbados, February 23–26, 2009. Financial Cryptography and Data Security (FC) is a well-established int- national forum for research, advanced development, education, exploration and debate regarding information assurance in the context of ?nance and commerce. The conference covers all aspects of securing transactions and systems. The goal of FC is to bring security and cryptography researchers and pr- titioners together with economists, bankers, and policy makers. This year, we assembled a vibrant program featuring 21 peer-reviewed research paper pres- tations, two panels (on the economics of information security and on authen- cation), and a keynote address by David Dagon. Despite a proliferation of security and cryptography venues, FC continues to receive a large number of high-quality submissions. This year, we received 91 submissions(75full-lengthpapers,15shortpapersand1panel).Eachsubmission was reviewed by at least three reviewers. Following a rigorous selection, ranking and discussion process, the Program Committee accepted 20 full-length papers, 1 short paper and 1 panel. The overall acceptance rate was 24%.

Editors and Affiliations

  • The Tor Project, Dedham, USA

    Roger Dingledine

  • Palo Alto Research Center, Palo Alto, USA

    Philippe Golle

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access