FC'05
Financial Cryptography
and Data Security
Preliminary Program
The following is a tentative schedule.
| Sunday, February 27 | |
| 6:00PM |  | 
| 6:00- 8:00 |  | 
| Monday, February 28 | |
| 8:30 |  | 
| 7:00 |  | 
| 9:00 |  | 
| 9:30 | Fraud within Asymmetric Multi-Hop Cellular Networks Protecting Secret Data from Insider Attacks Countering Identity Theft through Digital Uniqueness, Location Cross-Checking, and Funneling | 
| 11:00 |  | 
| 11:30 | Trust and Swindling on the Internet Professor Gavish will present preliminary survey results to counter claims by online auction site operators that fraudulent activity is negligible and to make a case for more extensive research on Internet fraud. (abstract) | 
| 12:30 |  | 
| 1:30 | Identity-based Partial Message Recovery Signatures (or How to Shorten ID-based Signatures) Time Capsule Signature Policy-Based Cryptography and Applications | 
| 3:00 |  | 
| 3:30 | Tentative panelists: Drew Dean, Stuart Stubblebine, Richard Clayton, Steve Myers, Mike Szydlo | 
| 5:00 |  | 
| Tuesday, March 1 | |
| 7:00 |  | 
| 9:00 | A Privacy Protecting Coupon System Testing Disjointness of Private Datasets | 
| 10:00 |  | 
| 10:30 | RFID Traceability A Multilayer Problem Information-Theoretic Security Analysis of Physical Uncloneable Functions | 
| 11:30 | Risk Assurance for Hedge Funds using Zero Knowledge Proofs Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure | 
| 12:30 |  | 
| 1:30 | Views, Reactions and Impact of Digitally-Signed Mail in e-Commerce Securing Sensitive Data with the Ingrian DataSecure Platform Ciphire Mail Email Encryption and Authentication | 
| 3:00 |  | 
| 7:00 |  | 
| 8:00 |  | 
| Wednesday, March 2 | |
| 7:00 |  | 
| 9:00 | Usable Security: A conundrum? | 
| 10:00 |  | 
| 10:30 | A User-Friendly Approach to Human Authentication of Messages Approximation in Message Authentication and Biometric Entity Authentication | 
| 11:30 | Analysis of a Multi-Party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model Achieving Fairness in Private Contract Negotiation | 
| 12:30 |  | 
| 1:30 | Small Coalitions Cannot Manipulate Voting Efficient Privacy-Preserving Protocols for Multi-Unit Auctions Event Driven Private Counters | 
| 3:00 |  | 
| 8:30 (PM) | Works in Progress Papers: Secure Distributed Human Computation Secure Multi-Attribute Procurement Auction Audit File Reduction Using N-Gram Models | 
| Thursday, March 3 | |
| 7:00 |  | 
| 9:00 | Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication Secure Biometric Authentication for Weak Computational Devices | 
| 10:00 |  | 
| 10:30 | Tentative panelists: H William Burdett, Jr., Allan Friedman | 
| 12:00 |  | 
| 12:30 |  | 
| 1:30 |  | 





