Search dblp for Publications

export results for "toc:db/conf/fc/fc2007.bht:"

 download as .bib file

@proceedings{DBLP:conf/fc/2007,
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77366-5},
  doi          = {10.1007/978-3-540-77366-5},
  isbn         = {978-3-540-77365-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AnandparaDJLR07,
  author       = {Vivek Anandpara and
                  Andrew Dingman and
                  Markus Jakobsson and
                  Debin Liu and
                  Heather Roinestad},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Phishing {IQ} Tests Measure Fear, Not Ability},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {362--366},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_33},
  doi          = {10.1007/978-3-540-77366-5\_33},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AnandparaDJLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Anderson07,
  author       = {Ross J. Anderson},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Position Statement in {RFID} S{\&}P Panel: {RFID} and the Middleman},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {46--49},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_6},
  doi          = {10.1007/978-3-540-77366-5\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Anderson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AsgharpourLC07,
  author       = {Farzaneh Asgharpour and
                  Debin Liu and
                  L. Jean Camp},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Mental Models of Security Risks},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {367--377},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_34},
  doi          = {10.1007/978-3-540-77366-5\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AsgharpourLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BerkmanO07,
  author       = {Omer Berkman and
                  Odelia Moshe Ostrovsky},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {The Unbearable Lightness of {PIN} Cracking},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {224--238},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_20},
  doi          = {10.1007/978-3-540-77366-5\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BerkmanO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BhattCSV07,
  author       = {Siddharth Bhatt and
                  Bogdan Carbunar and
                  Radu Sion and
                  Venu Vasudevan},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Personal Digital Rights Management for Mobile Cellular Devices},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {246},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_23},
  doi          = {10.1007/978-3-540-77366-5\_23},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BhattCSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Bond07,
  author       = {Mike Bond},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Leaving Room for the Bad Guys},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {1},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_1},
  doi          = {10.1007/978-3-540-77366-5\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Bond07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Callas07,
  author       = {Jon Callas},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Position Statement in {RFID} S{\&}P Panel: Contactless Smart Cards},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {50--52},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_7},
  doi          = {10.1007/978-3-540-77366-5\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Callas07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenELMS07,
  author       = {Liqun Chen and
                  Alberto N. Escalante and
                  Hans L{\"{o}}hr and
                  Mark Manulis and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection
                  Against Splitting},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_4},
  doi          = {10.1007/978-3-540-77366-5\_4},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChenELMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DanezisD07,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Space-Efficient Private Search with Applications to Rateless Codes},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_15},
  doi          = {10.1007/978-3-540-77366-5\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DanezisD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Desmedt07,
  author       = {Yvo Desmedt},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Position Statement in {RFID} S{\&}P Panel: From Relative Security
                  to Perceived Secure},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {53--56},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_8},
  doi          = {10.1007/978-3-540-77366-5\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Desmedt07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DesmedtLB07,
  author       = {Yvo Desmedt and
                  Tanja Lange and
                  Mike Burmester},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_12},
  doi          = {10.1007/978-3-540-77366-5\_12},
  timestamp    = {Mon, 25 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DesmedtLB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Dhamija07,
  author       = {Rachna Dhamija},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Preface},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {277--279},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_26},
  doi          = {10.1007/978-3-540-77366-5\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Dhamija07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FeigenbaumJS07,
  author       = {Joan Feigenbaum and
                  Aaron Johnson and
                  Paul F. Syverson},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {A Model of Onion Routing with Provable Anonymity},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_9},
  doi          = {10.1007/978-3-540-77366-5\_9},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FeigenbaumJS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Fu07,
  author       = {Kevin Fu},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Panel: {RFID} Security and Privacy},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {45},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_5},
  doi          = {10.1007/978-3-540-77366-5\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Fu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FurukawaI07,
  author       = {Jun Furukawa and
                  Hideki Imai},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {An Efficient Aggregate Shuffle Argument Scheme},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_25},
  doi          = {10.1007/978-3-540-77366-5\_25},
  timestamp    = {Sat, 30 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/FurukawaI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Goyal07,
  author       = {Vipul Goyal},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Certificate Revocation Using Fine Grained Certificate Space Partitioning},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_24},
  doi          = {10.1007/978-3-540-77366-5\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Goyal07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GrossklagsG07,
  author       = {Jens Grossklags and
                  Nathan Good},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Empirical Studies on Software Notices to Inform Policy Makers and
                  Usability Designers},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {341--355},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_31},
  doi          = {10.1007/978-3-540-77366-5\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GrossklagsG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Heydt-BenjaminBFJO07,
  author       = {Thomas S. Heydt{-}Benjamin and
                  Daniel V. Bailey and
                  Kevin Fu and
                  Ari Juels and
                  Tom O'Hare},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Vulnerabilities in First-Generation RFID-enabled Credit Cards},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {2--14},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_2},
  doi          = {10.1007/978-3-540-77366-5\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Heydt-BenjaminBFJO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JacksonSTB07,
  author       = {Collin Jackson and
                  Daniel R. Simon and
                  Desney S. Tan and
                  Adam Barth},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {An Evaluation of Extended Validation and Picture-in-Picture Phishing
                  Attacks},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {281--293},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_27},
  doi          = {10.1007/978-3-540-77366-5\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JacksonSTB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonTSBL07,
  author       = {Markus Jakobsson and
                  Alex Tsow and
                  Ankur Shah and
                  Eli Blevis and
                  Youn{-}Kyung Lim},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {What Instills Trust? {A} Qualitative Study of Phishing},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {356--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_32},
  doi          = {10.1007/978-3-540-77366-5\_32},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonTSBL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jutla07,
  author       = {Dawn N. Jutla},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Usable {SPACE:} Security, Privacy, and Context for the Mobile User},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {245},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_22},
  doi          = {10.1007/978-3-540-77366-5\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Jutla07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KiayiasZ07,
  author       = {Aggelos Kiayias and
                  Hong{-}Sheng Zhou},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Hidden Identity-Based Signatures},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {134--147},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_14},
  doi          = {10.1007/978-3-540-77366-5\_14},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KiayiasZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KuoWP07,
  author       = {Cynthia Kuo and
                  Jesse Walker and
                  Adrian Perrig},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth
                  Simple Pairing and Wi-Fi Protected Setup},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {325--340},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_30},
  doi          = {10.1007/978-3-540-77366-5\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KuoWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MannanO07,
  author       = {Mohammad Mannan and
                  Paul C. van Oorschot},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Using a Personal Device to Strengthen Password Authentication from
                  an Untrusted Computer},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_11},
  doi          = {10.1007/978-3-540-77366-5\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MannanO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MargolinL07,
  author       = {N. Boris Margolin and
                  Brian Neil Levine},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Informant: Detecting Sybils Using Incentives},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {192--207},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_18},
  doi          = {10.1007/978-3-540-77366-5\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MargolinL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MasoneBS07,
  author       = {Chris Masone and
                  Kwang{-}Hyun Baek and
                  Sean W. Smith},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {{WSKE:} Web Server Key Enabled Cookies},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {294--306},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_28},
  doi          = {10.1007/978-3-540-77366-5\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MasoneBS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MitchellK07,
  author       = {April Slayden Mitchell and
                  Alan H. Karp},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Improving Usability by Adding Security to Video Conferencing Systems},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {378--382},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_35},
  doi          = {10.1007/978-3-540-77366-5\_35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MitchellK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MolloyLL07,
  author       = {Ian M. Molloy and
                  Jiangtao Li and
                  Ninghui Li},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Dynamic Virtual Credit Card Numbers},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_19},
  doi          = {10.1007/978-3-540-77366-5\_19},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MolloyLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MukhamedovR07,
  author       = {Aybek Mukhamedov and
                  Mark Ryan},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Improved Multi-party Contract Signing},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {179--191},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_17},
  doi          = {10.1007/978-3-540-77366-5\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/MukhamedovR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/PagterP07,
  author       = {Jakob Illeborg Pagter and
                  Marianne Graves Petersen},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {A Sense of Security in Pervasive Computing - Is the Light on When
                  the Refrigerator Door Is Closed?},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {383--388},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_36},
  doi          = {10.1007/978-3-540-77366-5\_36},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/PagterP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RechbergerR07,
  author       = {Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {On Authentication with {HMAC} and Non-random Properties},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_13},
  doi          = {10.1007/978-3-540-77366-5\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RechbergerR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ShiCS07,
  author       = {Larry Shi and
                  Bogdan Carbunar and
                  Radu Sion},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Conditional E-Cash},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {15--28},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_3},
  doi          = {10.1007/978-3-540-77366-5\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ShiCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ThorpeHCCB07,
  author       = {Christopher Thorpe and
                  Jessica Hammer and
                  L. Jean Camp and
                  Jon Callas and
                  Mike Bond},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Virtual Economies: Threats and Risks},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {239--244},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_21},
  doi          = {10.1007/978-3-540-77366-5\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ThorpeHCCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ThorpeP07,
  author       = {Christopher Thorpe and
                  David C. Parkes},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Cryptographic Securities Exchanges},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_16},
  doi          = {10.1007/978-3-540-77366-5\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ThorpeP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/UzunKA07,
  author       = {Ersin Uzun and
                  Kristiina Karvonen and
                  N. Asokan},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Usability Analysis of Secure Pairing Methods},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {307--324},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_29},
  doi          = {10.1007/978-3-540-77366-5\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/UzunKA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/XuY07,
  author       = {Shouhuai Xu and
                  Moti Yung},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {\emph{K}-Anonymous Multi-party Secret Handshakes},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_10},
  doi          = {10.1007/978-3-540-77366-5\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/XuY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics