Financial Cryptography and Data Security '11
Fifteenth International Conference
February 28–March 4, 2011
Bay Gardens Beach Resort
St. Lucia
Financial Cryptography and Data Security is a major international forum for research, advanced development, education, exploration, and debate regarding information assurance, with a specific focus on commercial contexts. The conference covers all aspects of securing transactions and systems. Original works focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security are solicited. Submissions need not be exclusively concerned with cryptography. Systems security and inter-disciplinary efforts are particularly encouraged.
Important Dates
Workshop Proposal Submission | |
Workshop Proposal Notification | |
Paper Submission | |
Paper Notification | |
Final Papers | |
Poster and Panel Submission | |
Poster and Panel Notification | |
Hotel room reduced rate cut-off | |
Reduced registration rate cut-off |
Submission
All submissions should be sent via EasyChair. See the call for papers for further submission requirements.
Affiliated Workshops
Financial Cryptography will be held in conjunction with the following workshops:
Workshop on Ethics in Computer Security Research (WECSR 2011)
Chair: Sven Dietrich
Computer security often leads to discovering interesting new problems and challenges. The challenge still remains to follow a path acceptable for Institutional Review Boards at academic institutions, as well as compatible with ethical guidelines for professional societies or government institutions. However, no exact guidelines exist for computer security research yet. This workshop will bring together computer security researchers, practitioners, policy makers, and legal experts.
The Future of User Authentication and Authorization on the Web: Challenges in Current Practice, New Threats, and Research Directions
Chairs: Robert Biddle, Sonia Chiasson, Fabian Monrose, Paul Van Oorschot
The web is essential for business and personal activities well beyond information retrieval, such online banking, financial transactions, and payment authorization, but reliable user authentication remains a challenge. The increasing use of smart phones and other mobile devices, with their new user interfaces and input modalities, present both additional opportunities and issues for user authentication beyond those of traditional PC platforms. The workshop will match traditional FC interests in commerce security, commercial contexts, and all aspects of security transactions and systems.
Real-life Cryptographic protocols and standardization
Chair: Kazue Sako
As a fruit of modern cryptographic research, we have seen many cryptographic primitives such as public-key encryption and digital signature algorithms deployed in real life systems, and standardized in many international organizations such as ISO, ITUT, IEEE, IETF, and many others. We have also seen some cryptographic protocols as well, such as key distribution and entity authentication, and some dedicated protocols for limited purpose systems. This workshop aims to bring researchers and engineers together to share their experiences regarding the design of cryptographic primitives and protocols deployed in real life systems.
Organizers
General Chair | Steven Murdoch, University of Cambridge, UK |
Local Arrangements Chair | Fabian Monrose, University of North Carolina Chapel Hill, US |
Program Committee
Program Chair | George Danezis, Microsoft Research, UK |
Ross Anderson, University of Cambridge, UK Tuomas Aura, Helsinki University of Technology, FI Lucas Ballard, Google, US Adam Barth, UC Berkeley, US Elisa Bertino, Purdue University, US Kevin Butler, University of Oregon, US Srdjan Capkun, ETH Zurich, CH Veronique Cortier, CNRS / LORIA, FR Ernesto Damiani, University of Milan, IT Claudia Diaz, K.U.Leuven, BE Roger Dingledine, The Tor Project, US Orr Dunkelman, Weizmann Institute of Science, IL Simone Fisher-Hubner, Karlstad University, SE Craig Gentry, IBM T.J.Watson Research Center, US Dieter Gollmann, Technische Universitat Harburg, DE Rachel Greenstadt, Drexel University, US Jean-Pierre Hubaux, Ecole Polytechnique Federale de Lausanne, CH Markus Jakobsson, Indiana University, US Jaeyeon Jung, Intel Research, US Stefan Katzenbeisser, Technische Universitat Darmstadt, DE |
Angelos Keromytis, Columbia University, US Arjen Lenstra, Ecole Polytechnique Federale de Lausanne, CH Helger Lipmaa, Cybernetica AS, EE Evangelos Markatos, FORTH, GR David Molnar, Microsoft Research, US Tyler Moore, Harvard University, US David Naccache, Ecole normale superieure, FR Thomas Ristenpart, University of Wisconsin, US Peter Ryan, Universite du Luxembourg, LU Ahmad-Reza Sadeghi, Ruhr-University Bochum, DE Rei Safavi-Naini, University of Calgary, CA Nigel Smart, University of Bristol, UK Jessica Staddon, Google, US Angelos Stavrou, George Mason University, US Paul Syverson, Naval Research Laboratory, US Nicholas Weaver, International Computer Science Institute, US Moti Yung, Google, US |
This conference is organized annually by the International Financial Cryptography Association.