Ranking & Metrics
Impact Score is a novel metric devised to rank conferences based on the number of contributing the best scientists in addition to the h-index estimated from the scientific papers published by the best scientists. See more details on our methodology page.
Research Impact Score:5.50
Contributing Best Scientists:84
H5-index:
Papers published by Best Scientists93
Research Ranking (Computer Science)73
Conference Call for Papers
Topics of particular interest are listed below:
Access Control, Authorization and Trust Management
Anonymity and Privacy Enhancing Technologies
Applied Cryptography
Attacks, attack techniques, and attack case studies
Auctions and Incentive Design
Authentication, Identity Management and Biometrics
Behavioral Aspects of Security and Privacy
Blockchain Applications
Blockchain protocols, including PoW, -stake, -burn, permissioned/permissionless
Censorship circumvention and resistance
Certification and Audits
Cloud Computing and Data Outsourcing Security
Data Security and Privacy
Decentralized Finance (DeFi)
Digital Cash and Payment Systems
Distributed Consensus Protocols
Digital Rights Management
Economic and Monetary Aspects of Cryptocurrencies
Economics of Security and Privacy
Electronic Crime and Underground Markets
Electronic Payments and Ticketing Systems
Empirical studies, Real-world Measurements and Metrics
Forensics, Monitoring and Transaction Graph Analysis
Fraud Detection and Management
Game Theory for Security, Privacy, and Blockchain
Language-based security and formal verification
Legal and Regulatory Issues of Blockchains, Cryptocurrencies, and Electronic Payments
Machine Learning and AI Security
Malware and Software Security
Mobile Payments
Network and distributed system security
Peer-to-Peer Networks
Phishing and Social Engineering
Reputation Systems
Security of Banking, Financial Services, and Electronic Commerce
Smart Contracts and Financial Instruments
Smartcards, Secure Tokens, and Secure Hardware
Surveillance and Tracking
System security
Trusted Execution Environments (TEE) Security and Applications
Usability and Security
Web Security
General Information
For each accepted paper/poster the conference requires at least one registration at the general or academic rate, and paper authors must sign the IFCA copyright form when submitting the final version. Alternatively, individual papers can be published as fully open access—the publisher charges authors a fee for this.
Format
Papers must be formatted in standard LNCS format (templates) and submitted as PDF files. Submissions in other formats will be rejected. All papers must be submitted electronically according to the instructions and forms found here and at the submission site.
Anonymous Submission
Regular and short research paper submissions must be anonymized with no author names, affiliations, acknowledgments, or obvious references. Failure to properly anonymize submitted papers is grounds for a desk rejection without review. It is acceptable (but by no means required) for submitted papers to be published online in non-anonymous form (e.g., on authors' websites or archives like ePrint or arXiv.org). Program committee members will be instructed not to actively seek to de-anonymize papers.
Resubmission to Affiliated Workshops
Papers that are submitted but ultimately not accepted to the main conference may be considered for acceptance at one of the associated workshops. If you would like to take advantage of this, please indicate this preference when submitting your paper.
Evaluation Criteria
Regular Research Papers
Research papers should describe novel, previously unpublished scientific contributions to the field, and they will be subject to rigorous peer review. Accepted submissions will be included in the conference proceedings to be published in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series. Submissions are limited to 15 pages in standard LNCS format excluding references and appendices. A total page restriction may apply for the printed proceedings version. Committee members are not required to read the appendices, so the full papers should be intelligible without them.
Short Papers
Short papers are also subject to peer review; however, the intention is to encourage authors to introduce work in progress, novel applications, and corporate/industrial experiences. Short papers will be evaluated with a focus on novelty and potential for sparking participants' interest and future research avenues. Short paper submissions are limited to 8 pages in standard LNCS format in total. The paper title for short papers must include the text "Short Paper:". Accepted submissions will be included in the conference proceedings. The authors of some submissions not accepted as regular research papers may be offered the option of acceptance as a short paper.
Systematization of Knowledge Papers
We also solicit Systematization of Knowledge (SoK) papers. To be suitable for publication, SoK articles must provide an added value beyond a literature review, such as novel insights, identification of research gaps, or challenges to commonly held assumptions. SoK paper submissions are limited to 20 pages in standard LNCS format excluding references and appendices. Accepted submissions will be included in the conference proceedings. A total page restriction may apply for the printed proceedings version. Committee members are not required to read the appendices, so the full papers should be intelligible without them. The paper title for systematization of knowledge papers must include the text "SoK:".
Ethics and Etiquette
Original Submissions
Authors may submit only work that does not substantially overlap with work that is currently submitted or has been accepted for publication to any other peer-reviewed conference/workshop with proceedings or a journal. We consider double submission serious research fraud and will treat it as such. Note that it is acceptable for papers to appear in non-peer-reviewed formats (for example, as technical reports or in online archives such as ePrint). In case of doubt contact the program chairs for any clarifications at [email protected].
Ethical Considerations for Vulnerability Disclosure (From IEEE S&P)
Where research identifies a vulnerability (e.g., software vulnerabilities in a given program, design weaknesses in a hardware system, or any other kind of vulnerability in deployed systems), we expect that researchers act in a way that avoids gratuitous harm to affected users and, where possible, affirmatively protects those users. In nearly every case, disclosing the vulnerability to vendors of affected systems, and other stakeholders, will help protect users. It is the committee's sense that a disclosure window of 45 days to 90 days ahead of publication is consistent with authors' ethical obligations.
Longer disclosure windows (which may keep vulnerabilities from the public for extended periods of time) should only be considered in exceptional situations, e.g., if the affected parties have provided convincing evidence the vulnerabilities were previously unknown and the full rollout of mitigations requires additional time. The authors are encouraged to consult with the PC chairs in case of questions or concerns.
The version of the paper submitted for review must discuss in detail the steps the authors have taken or plan to take to address these vulnerabilities; but, consistent with the timelines above, the authors do not have to disclose vulnerabilities ahead of submission. If a paper raises significant ethical and/or legal concerns, it might be rejected based on these concerns. The PC chairs will be happy to consult with authors about how this policy applies to their submissions.
It is the responsibility of all paper authors to provide clear evidence that their work follows relevant ethical standards. If a paper raises significant ethical and/or legal concerns, it may be rejected. The PC chairs will consult with authors about how this policy applies to their submissions and may request additional clarifying information about submissions as needed.
Ethical Considerations for Human Subjects Research (From IEEE S&P)
Submissions that describe experiments on human subjects, that analyze data derived from human subjects (even anonymized data), or that otherwise may put humans at risk should:
Disclose whether the research received an approval or waiver from each of the authors' institutional ethics review boards (IRB) if applicable.
Discuss steps taken to ensure that participants and others who might have been affected by an experiment were treated ethically and with respect.
If a submission deals with any kind of personal identifiable information (PII) or other kinds of sensitive data, the version of the paper submitted for review must discuss in detail the steps the authors have taken to mitigate harms to the persons identified.
Conflict of Interest
Authors should report in the submission site any conflicts with program committee members. A conflict exists if an author has the same affiliation as a committee member, has ever acted as their PhD supervisor or been supervised by them, or if they have been co-authors on a paper within the past two years.
Overview
Top Research Topics at Financial Cryptography?
Computer security (60.59%)
Cryptography (19.94%)
Internet privacy (14.65%)
Financial Cryptography tackles a plethora of topics, such as Computer security, Cryptography, Internet privacy, Payment and Protocol (object-oriented programming).
The event focused on Computer security research but expanded to cover Scheme (programming language).
The research on Cryptography tackled can also make contributions to studies in the areas of Electronic funds transfer, Public-key cryptography, Blind signature, Digital signature and Smart card.
Discussions in the conference are anchored in the subject of Payment and the similar topic of Database transaction.
Financial Cryptography investigates Encryption research which frequently intersects with Theoretical computer science.
Theoretical computer science research discussed connects with the study of Random oracle.
What are the most cited papers published at the conference?
Cryptographic cloud storage (1063 citations)
Majority Is Not Enough: Bitcoin Mining Is Vulnerable (764 citations)
On Scaling Decentralized Blockchains (667 citations)
Research areas of the most cited articles at Financial Cryptography:
The most cited articles focus on Computer security, Internet privacy, Cryptography, Protocol (object-oriented programming) and Theoretical computer science.
Payment and Currency are some topics wherein Computer security research discussed in the conference articles has an impact.
The conference publications hold forums on Protocol (object-oriented programming) that merge themes from other disciplines such as Cryptocurrency and Proof-of-work system.
What topics the last edition of the conference is best known for?
Computer security
Cryptography
The Internet
The previous edition focused in particular on these issues:
The conference is organized to address concerns in the fields of Computer security, Cryptography, Payment, Internet privacy and Protocol (object-oriented programming).
The conference explores topics in Computer security which can be helpful for research in disciplines like The Internet and Digital signature.
Cryptography research presented in it encompasses a variety of subjects, including Theoretical computer science, Electronic funds transfer, Electronic cash and Blind signature, Public-key cryptography.
Issues in Payment were discussed, taking into consideration concepts from other disciplines like Cryptocurrency and Database transaction.
Homomorphic encryption is a focus of the Encryption works in the event.
The conference focuses on Authentication research which is adjacent to topics in Password.
The most cited articles from the last conference are:
Secure Multiparty Computation Goes Live (431 citations)
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes (357 citations)
Efficient Trace and Revoke Schemes (339 citations)
Papers citation over time
A key indicator for each conference is its effectiveness in reaching other researchers with the papers published at that venue.
The chart below presents the interquartile range (first quartile 25%, median 50% and third quartile 75%) of the number of citations of articles over time.
Research.com
Top authors and change over time
The top authors publishing at Financial Cryptography (based on the number of publications) are:
Ahmad-Reza Sadeghi (17 papers) published 1 paper at the last edition, 1 less than at the previous edition,
Joseph Bonneau (11 papers) absent at the last edition,
Tyler Moore (11 papers) absent at the last edition,
Matthew Smith (9 papers) absent at the last edition,
Andrew Miller (9 papers) published 4 papers at the last edition, 2 more than at the previous edition.
The overall trend for top authors publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top authors.
Research.com
Top affiliations and change over time
Only papers with recognized affiliations are considered
The top affiliations publishing at Financial Cryptography (based on the number of publications) are:
Technische Universität Darmstadt (26 papers) published 3 papers at the last edition, 1 less than at the previous edition,
Microsoft (23 papers) published 1 paper at the last edition, 1 less than at the previous edition,
University of Cambridge (17 papers) absent at the last edition,
Carnegie Mellon University (15 papers) published 1 paper at the last edition,
ETH Zurich (12 papers) published 4 papers at the last edition, 2 more than at the previous edition.
The overall trend for top affiliations publishing at this conference is outlined below. The chart shows the number of publications at each edition of the conference for top affiliations.
Research.com
Publication chance based on affiliation
The publication chance index shows the ratio of articles published by the best research institutions at the conference edition to all articles published within that conference. The best research institutions were selected based on the largest number of articles published during all editions of the conference.
The chart below presents the percentage ratio of articles from top institutions (based on their ranking of total papers).Top affiliations were grouped by their rank into the following tiers: top 1-10, top 11-20, top 21-50, and top 51+. Only articles with a recognized affiliation are considered.
Research.com
During the most recent 2019 edition, 3.28% of publications had an unrecognized affiliation. Out of the publications with recognized affiliations, 27.12% were posted by at least one author from the top 10 institutions publishing at the conference. Another 6.78% included authors affiliated with research institutions from the top 11-20 affiliations. Institutions from the 21-50 range included 28.81% of all publications and 37.29% were from other institutions.
Returning Authors Index
A very common phenomenon observed among researchers publishing scientific articles is the intentional selection of conferences they have already attended in the past. In particular, it is worth analyzing the case when the authors participate in the same conference from year to year.
The Returning Authors Index presented below illustrates the ratio of authors who participated in both a given as well as the previous edition of the conference in relation to all participants in a given year.
Research.com
Returning Institution Index
The graph below shows the Returning Institution Index, illustrating the ratio of institutions that participated in both a given and the previous edition of the conference in relation to all affiliations present in a given year.
Research.com
The experience to innovation index
Our experience to innovation index was created to show a cross-section of the experience level of authors publishing at a conference. The index includes the authors publishing at the last edition of a conference, grouped by total number of publications throughout their academic career (P) and the total number of citations of these publications ever received (C).
The group intervals were selected empirically to best show the diversity of the authors' experiences, their labels were selected as a convenience, not as judgment. The authors were divided into the following groups:
Novice - P < 5 or C < 25 (the number of publications less than 5 or the number of citations less than 25),
Competent - P < 10 or C < 100 (the number of publications less than 10 or the number of citations less than 100),
Experienced - P < 25 or C < 625 (the number of publications less than 25 or the number of citations less than 625),
Master - P < 50 or C < 2500 (the number of publications less than 50 or the number of citations less than 2500),
Star - P ≥ 50 and C ≥ 2500 (both the number of publications greater than 50 and the number of citations greater than 2500).
Research.com
The chart below illustrates experience levels of first authors in cases of publications with multiple authors.