From: "Stuart E. Schechter" <[EMAIL PROTECTED]> Subject: [fc-announce] FC'05 - Registration Now Open To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> Date: Wed, 12 Jan 2005 21:29:22 -0500
Registration now open at http://www.ifca.ai/fc05/registration.html Call for Participation ________________________________________ Financial Cryptography and Data Security February 28 -> March 3, 2005 Roseau, Dominica ________________________________________ http://www.ifca.ai/fc05 * Registration is now open * Financial Cryptography and Data Security (FC'05) is the premier international forum for research, advanced development, education, exploration, and debate regarding security in the context of finance and commerce. We have augmented our conference title and expanded our scope to cover all aspects of securing transactions and systems. These aspects include a range of technical areas such as: cryptography, payment systems, secure transaction architectures, software systems and tools, user and operator interfaces, fraud prevention, secure IT infrastructure, and analysis methodologies. FC'05 brings together top cryptographers, data-security specialists, and scientists with economists, bankers, implementers, and policy makers. Intimate and colorful by tradition, the FC'05 program will features invited talks (to be announced), academic presentations, technical demonstrations, and panel discussions. This conference is organized annually by the International Financial Cryptography Association (IFCA). Keynote Speakers ================ Lynne Coventry (NCR) Usable Security: A conundrum? Bezalel Gavish (Southern Methodist University) Trust and Swindling on the Internet Panel Sessions ============== Financial Technology in the Developing World Allan Friedman (Harvard) - Organizer Alessandro Acquisti (CMU) H William Burdett, Jr. (Foley & Lardner, LLP) Jon Peha (CMU) Phishing Steve Myers (Indiana University) - Organizer Drew Dean (SRI) Stuart Stubblebine (Stubblebine Research Labs) Richard Clayton (Cambridge, UK) Markus Jakobsson (Indiana University CACR) Research Papers =============== Fraud within Asymmetric Multi-Hop Cellular Networks Gildas Avoine (EPFL, Lausanne, Switzerland) Information-Theoretic Security Analysis of Physical Uncloneable Functions P. Tuyls B. Skoric S. Stallinga A.H. Akkermans W. Ophey (Philips Research Laboratories, The Netherlands) Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce. Simson L. Garfinkel Jeffrey I. Schiller Erik Nordlander (MIT) David Margrave (Amazon.com) Robert C. Miller (MIT) Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures) Fangguo Zhang (Sun Yat Sen University, P.R.China) Yi Mu Willy Susilo (University of Wollongong, Australia) How to Non-Interactively Update a Secret Eujin Goh (Stanford University) Philippe Golle (Palo Alto Research Center) Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication Michel Abdalla David Pointcheval (Ecole Normale Superieure) Achieving Fairness in Private Contract Negotiation Keith Frikken Mikhail Atallah (Purdue University) Protecting Secret Data from Insider Attacks David Dagon Wenke Lee Richard Lipton (Georgia Tech) RFID Traceability A Multilayer Problem Gildas Avoine Philippe Oechslin (EPFL Lausanne Switzerland) A User-Friendly Approach to Human Authentication of Messages Jeff King Andre dos Santos (Georgia Tech) Countering Identity Theft through Digital Uniqueness, Location Cross-Checking, and Funneling P.C. van Oorschot (Carleton University) S. Stubblebine (Stubblebine Research Labs) Policy-Based Cryptography and Applications Walid Bagga Refik Molva (Eurecom) A Privacy Protecting Coupon System Liqun Chen (HP Laboratories) Matthias Enzmann (Fraunhofer SIT) Ahmad-Reza Sadeghi (University of Bochum) Markus Schneider (Fraunhofer SIT) Michael Steiner (IBM T.J. Watson) Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space model Steve Kremer Aybek Mukhamedov Eike Ritter (University of Birmingham, UK) Secure Biometric Authentication for Weak Computational Devices Mikhail J. Atallah Keith B. Frikken (Purdue) Michael T. Goodrich (UC Irvine) Roberto Tamassia (Brown) Small Coalitions Cannot Manipulate Voting Edith Elkind (Princeton University) Helger Lipmaa (Helsinki University of Technology) Efficient Privacy-Preserving Protocols for Multi-Unit Auctions Felix Brandt (Stanford) Tuomas Sandholm (Carnegie Mellon University) Risk Assurance for Hedge Funds using Zero Knowledge Proofs Michael Szydlo (RSA Security/Independent) Testing Disjointness of Private Datasets Aggelos Kiayias (University of Connecticut) Antonina Mitrofanova (Rutgers University) Time Capsule Signature Yevgeniy Dodis (NYU) Dae Hyun Yum (POSTECH) Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure Stanislaw Jarecki (UC Irvine) Vitaly Shmatikov (UT Austin) Approximation in Message Authentication Giovanni Di Crescenzo Richard Graveman (Telcordia) Gonzalo Arce Renwei Ge (U Delaware) Systems & Applications Presentations ==================================== Securing Sensitive Data with the Ingrian DataSecure Platform Andrew Koyfman (Ingrian Networks) Ciphire Mail Email Encryption Lars Eilebrecht (Ciphire Labs) GOLD SPONSOR ============ Interactive Investor http://www.iii.co.uk/ SPONSORS ======== RSA Security http://www.rsasecurity.com/ Indiana University Center for Applied Cybersecurity Research http://cacr.iu.edu/ Bibit Global Payment Services http://www.bibit.com/ _______________________________________________ fc-announce mailing list [EMAIL PROTECTED] http://mail.ifca.ai/mailman/listinfo/fc-announce ---------- --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]