Accepted Papers

Research Papers Category

  1. Vulnerabilities in First-Generation RFID-enabled Credit Cards, Thomas S. Heydt-Benjamin (University of Massachusetts Amherst, USA), Daniel V. Bailey (RSA Laboratories, USA), Kevin Fu (University of Massachusetts Amherst, USA), Ari Juels (RSA Laboratories, USA), and Tom O'Hare (Innealta, Inc.)

  2. Hidden Identity-Based Signatures, Aggelos Kiayias and Hong-Sheng Zhou (University of Connecticut, USA)

  3. Improved multi-party contract signing, Aybek Mukhamedov and Mark Ryan (University of Birmingham, UK)

  4. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer, Mohammad Mannan and Paul C. van Oorschot (Carleton University, Canada)

  5. Cryptographic Securities Exchanges, Christopher Thorpe and David C. Parkes (Harvard University, USA)

  6. Informant: Detecting Sybils Using Incentives, N. Boris Margolin and Brian Neil Levine (University of Massachusetts Amherst, USA)

  7. The unbearable lightness of PIN cracking, Omer Berkman (The Academic College of Tel Aviv Yaffo, Israel) and Odelia Moshe Ostrovsky (Algorithmic Research Ltd. and Tel Aviv University, Israel)

  8. A Model of Onion Routing with Provable Anonymity,Joan Feigenbaum (Yale University), Aaron Johnson (Yale University, USA), and Paul Syverson (Naval Research Laboratory, USA)

  9. An Efficient Aggregate Shuffle Argument Scheme,Jun Furukawa (NEC Corporation, Japan) and Hideki Imai (National Institute of Advanced Industrial Science and Technology, Japan)

  10. Space-Efficient Private Search, George Danezis and Claudia Diaz (K.U. Leuven, Belgium)

  11. Certificate Revocation using Fine Grained Certificate Space Partitioning, Vipul Goyal (UCLA, USA)

  12. On Authentication with HMAC and Non-Random Properties, Christian Rechberger and Vincent Rijmen (Graz University of Technology, Austria)

  13. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups, Yvo Desmedt (University College London, UK), Tanja Lange (Eindhoven University of Technology, Netherlands) and Mike Burmester (Florida State University, USA)
  14. Conditional E-Cash, Larry Shi and Bogdan Carbunar (Motorola Labs) and Radu Sion (Stony Brook University, USA)

  15. K-Anonymous Multi-party Secret Handshakes, Shouhuai Xu (UTSA) and Moti Yung (RSA Laboratories and Columbia University, USA)

  16. Dynamic Virtual Credit Card Numbers, Ian Molloy (Purdue University, USA), Jiangtao Li (Intel Corporation) and Ninghui Li (Purdue University, USA)

  17. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection against Splitting, Liqun Chen (HP Laboratories), Alberto Escalante, Hans Löhr, Mark Manulis, and Ahmad-Reza Sadeghi (Horst Görtz Institute Bochum, Germany)

Systems Presentations Category

  1. Personal Digital Rights Management for Mobile Cellular Devices, Siddharth Bhatt (Stony Brook University, USA), Carbunar Bogdan (Motorola Labs), Radu Sion (Stony Brook University, USA), and Venu Vasudevan (Motorola Labs)