


default search action
11th Financial Cryptography 2007: Scarborough, Trinidad and Tobago
- Sven Dietrich, Rachna Dhamija:

Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers. Lecture Notes in Computer Science 4886, Springer 2008, ISBN 978-3-540-77365-8
Keynote Address
- Mike Bond:

Leaving Room for the Bad Guys. 1
Payment Systems
- Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare:

Vulnerabilities in First-Generation RFID-enabled Credit Cards. 2-14 - Larry Shi, Bogdan Carbunar, Radu Sion:

Conditional E-Cash. 15-28 - Liqun Chen

, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. 29-44
Panel
- Kevin Fu:

Panel: RFID Security and Privacy. 45 - Ross J. Anderson:

Position Statement in RFID S&P Panel: RFID and the Middleman. 46-49 - Jon Callas:

Position Statement in RFID S&P Panel: Contactless Smart Cards. 50-52 - Yvo Desmedt:

Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. 53-56
Anonymity
- Joan Feigenbaum, Aaron Johnson, Paul F. Syverson:

A Model of Onion Routing with Provable Anonymity. 57-71 - Shouhuai Xu, Moti Yung:

K-Anonymous Multi-party Secret Handshakes. 72-87
Authentication
- Mohammad Mannan, Paul C. van Oorschot:

Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. 88-103 - Yvo Desmedt, Tanja Lange, Mike Burmester:

Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. 104-118 - Christian Rechberger, Vincent Rijmen:

On Authentication with HMAC and Non-random Properties. 119-133
Anonymity and Privacy
- Aggelos Kiayias, Hong-Sheng Zhou

:
Hidden Identity-Based Signatures. 134-147 - George Danezis, Claudia Díaz:

Space-Efficient Private Search with Applications to Rateless Codes. 148-162
Cryptography and Commercial Transactions
- Christopher Thorpe, David C. Parkes:

Cryptographic Securities Exchanges. 163-178 - Aybek Mukhamedov, Mark Ryan

:
Improved Multi-party Contract Signing. 179-191 - N. Boris Margolin, Brian Neil Levine:

Informant: Detecting Sybils Using Incentives. 192-207
Financial Transactions and Web Services
- Ian M. Molloy, Jiangtao Li, Ninghui Li:

Dynamic Virtual Credit Card Numbers. 208-223 - Omer Berkman, Odelia Moshe Ostrovsky:

The Unbearable Lightness of PIN Cracking. 224-238
Panel
- Christopher Thorpe, Jessica Hammer, L. Jean Camp, Jon Callas, Mike Bond:

Virtual Economies: Threats and Risks. 239-244
Invited Talk
- Dawn N. Jutla:

Usable SPACE: Security, Privacy, and Context for the Mobile User. 245
System Presentation
- Siddharth Bhatt, Bogdan Carbunar, Radu Sion, Venu Vasudevan:

Personal Digital Rights Management for Mobile Cellular Devices. 246
Cryptography
- Vipul Goyal:

Certificate Revocation Using Fine Grained Certificate Space Partitioning. 247-259 - Jun Furukawa, Hideki Imai:

An Efficient Aggregate Shuffle Argument Scheme. 260-274
Usable Security Workshop
- Rachna Dhamija:

Preface. 277-279
Full Papers
- Collin Jackson, Daniel R. Simon, Desney S. Tan, Adam Barth:

An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. 281-293 - Chris Masone, Kwang-Hyun Baek, Sean W. Smith:

WSKE: Web Server Key Enabled Cookies. 294-306 - Ersin Uzun

, Kristiina Karvonen, N. Asokan:
Usability Analysis of Secure Pairing Methods. 307-324 - Cynthia Kuo, Jesse Walker, Adrian Perrig:

Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. 325-340 - Jens Grossklags, Nathan Good:

Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. 341-355
Short Papers
- Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevis

, Youn-Kyung Lim:
What Instills Trust? A Qualitative Study of Phishing. 356-361 - Vivek Anandpara, Andrew Dingman, Markus Jakobsson, Debin Liu, Heather Roinestad:

Phishing IQ Tests Measure Fear, Not Ability. 362-366 - Farzaneh Asgharpour, Debin Liu, L. Jean Camp:

Mental Models of Security Risks. 367-377 - April Slayden Mitchell, Alan H. Karp:

Improving Usability by Adding Security to Video Conferencing Systems. 378-382 - Jakob Illeborg Pagter, Marianne Graves Petersen:

A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed? 383-388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














