


default search action
15th Financial Cryptography 2011: Gros Islet, St. Lucia
- George Danezis:

Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7035, Springer 2012, ISBN 978-3-642-27575-3
Finacial Cryptography and Data Security (FC 2011)
- Rainer Böhme, Stefanie Pötzsch:

Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. 1-15 - Nicolas Christin

, Serge Egelman
, Timothy Vidas, Jens Grossklags:
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. 16-30 - Julien Freudiger, Reza Shokri

, Jean-Pierre Hubaux:
Evaluating the Privacy Risk of Location-Based Services. 31-46 - Jeremy Clark, Urs Hengartner:

Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance. 47-61 - Benedikt Westermann, Dogan Kesdogan:

Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. 62-76 - Jay Novak, Jonathan Stribley, Kenneth Meagher, J. Alex Halderman:

Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools. 77-84 - Ben Palmer, Kris Bubendorfer, Ian Welch:

A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper). 85-92 - Philip Marquardt, David Dagon, Patrick Traynor:

Impeding Individual User Profiling in Shopper Loyalty Programs. 93-101 - Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:

Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. 102-112 - Guomin Yang

, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. 113-126 - Martin Franz, Peter Williams, Bogdan Carbunar, Stefan Katzenbeisser, Andreas Peter, Radu Sion, Miroslava Sotáková:

Oblivious Outsourced Storage with Delegation. 127-140 - Rob Johnson, Leif Walsh, Michael Lamb:

Homomorphic Signatures for Digital Photographs. 141-157 - Femi G. Olumofin, Ian Goldberg:

Revisiting the Computational Practicality of Private Information Retrieval. 158-172 - Mohammed Ashraful Tuhin, Reihaneh Safavi-Naini:

Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper). 173-181 - Oliver Spycher, Reto E. Koenig, Rolf Haenni, Michael Schläpfer:

A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time. 182-189 - Ulrich Rührmair, Christian Jaeger, Michael Algasinger:

An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs. 190-204 - Henryk Plötz, Karsten Nohl:

Peeling Away Layers of an RFID Security System. 205-219 - Ross J. Anderson, Mike Bond, Omar Choudary

, Steven J. Murdoch
, Frank Stajano:
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. 220-234 - Shujun Li

, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz, Junaid Jameel Ahmad:
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers. 235-249 - Christopher Soghoian, Sid Stamm:

Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper). 250-259 - Damon McCoy, Jose Andre Morales

, Kirill Levchenko:
Proximax: Measurement-Driven Proxy Dissemination (Short Paper). 260-267 - Peter Lofgren, Nicholas Hopper:

BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper). 268-275 - Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:

Towards Secure Bioinformatics Services (Short Paper). 276-283 - Theodoor Scholte, Davide Balzarotti, Engin Kirda:

Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications. 284-298 - Pern Hui Chia, Svein Johan Knapskog:

Re-evaluating the Wisdom of Crowds in Assessing Web Security. 299-314 - Mohammad Mannan, David Barrera, Carson D. Brown, David Lie, Paul C. van Oorschot

:
Mercury: Recovering Forgotten Passwords Using Personal Devices. 315-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














