Search dblp for Publications

export results for "financial security"

 download as .bib file

@article{DBLP:journals/csse/LiWFZZ24,
  author       = {Xiaonan Li and
                  Qiang Wang and
                  Conglai Fan and
                  Wei Zhan and
                  Mingliang Zhang},
  title        = {A New Malicious Code Classification Method for the Security of Financial
                  Software},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {48},
  number       = {3},
  pages        = {773--792},
  year         = {2024}
}
@article{DBLP:journals/tcss/JiangWZNL24,
  author       = {Changjun Jiang and
                  Fei{-}Yue Wang and
                  Mengchu Zhou and
                  Asoke K. Nandi and
                  Guanjun Liu},
  title        = {Guest Editorial: Special Issue on Big Data and Computational Social
                  Intelligence for Guaranteed Financial Security},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1551--1555},
  year         = {2024}
}
@article{DBLP:journals/tcss/ZhaoHLMW24,
  author       = {Qin Zhao and
                  Jingyi Huang and
                  Gang Liu and
                  Yaru Miao and
                  Pengwei Wang},
  title        = {A Multiinterest and Social Interest-Field Framework for Financial
                  Security},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1685--1695},
  year         = {2024}
}
@proceedings{DBLP:conf/fc/2023-1,
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13950},
  publisher    = {Springer},
  year         = {2024}
}
@proceedings{DBLP:conf/fc/2023-2,
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13951},
  publisher    = {Springer},
  year         = {2024}
}
@proceedings{DBLP:conf/fc/2023w,
  editor       = {Aleksander Essex and
                  Shin'ichiro Matsuo and
                  Oksana Kulyk and
                  Lewis Gudgeon and
                  Ariah Klages{-}Mundt and
                  Daniel Perez and
                  Sam Werner and
                  Andrea Bracciali and
                  Geoff Goodell},
  title        = {Financial Cryptography and Data Security. {FC} 2023 International
                  Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia,
                  May 5, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13953},
  publisher    = {Springer},
  year         = {2024}
}
@article{DBLP:journals/cejcs/Wang23,
  author       = {Yanzhao Wang},
  title        = {Intelligent cluster construction of internet financial security protection
                  system in banking industry},
  journal      = {Open Comput. Sci.},
  volume       = {13},
  number       = {1},
  year         = {2023}
}
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23,
  author       = {Julija Gavenaite{-}Sirvydiene and
                  Algita Miecinskiene},
  title        = {The Assessment of Cyber Security's Significance in the Financial Sector
                  of Lithuania},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {497--518},
  year         = {2023}
}
@article{DBLP:journals/jsan/SaqibA23,
  author       = {Nazar Abbas Saqib and
                  Shahad Talla AL{-}Talla},
  title        = {Scaling Up Security and Efficiency in Financial Transactions and Blockchain
                  Systems},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {2},
  pages        = {31},
  year         = {2023}
}
@article{DBLP:journals/sap/Yu23,
  author       = {Haiping Yu},
  title        = {Application of blockchain technology in the data processing security
                  system of financial enterprises},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023}
}
@article{DBLP:journals/sncs/DansoMGDS23,
  author       = {Juliana Mantebea Danso and
                  Yaw Marfo Missah and
                  Enoch Opanin Gyamfi and
                  Stephen Dankwa and
                  Kwabena Sarpong},
  title        = {Reseed Skipping of Linear Congruential Generator for Multi-level Image
                  Steganography Security of Financial Data},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {2},
  pages        = {124},
  year         = {2023}
}
@inproceedings{DBLP:conf/bde/Ji23,
  author       = {Wenjun Ji},
  title        = {Research and analysis of the security risk management strategy of
                  big data technology in the financial industry},
  booktitle    = {{BDE}},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/ccece/RazaviJEAH23,
  author       = {Hooman Razavi and
                  Mohammad Reza Jamali and
                  Morvaridsadat Emsaki and
                  Ali Ahmadi and
                  Mostafa Hajiaghaei{-}Keshteli},
  title        = {Quantifying the Financial Impact of Cyber Security Attacks on Banks:
                  {A} Big Data Analytics Approach},
  booktitle    = {{CCECE}},
  pages        = {533--538},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/cpits/KavunLKLL23,
  author       = {Sergii Kavun and
                  Ruslana Levkina and
                  Yana Kotko and
                  Dmytro Levkin and
                  Artur Levkin},
  title        = {Information Security in Project Management for the Financial and Budgetary
                  Capacity of the National Economy (short paper)},
  booktitle    = {{CPITS} {II}},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3550},
  pages        = {246--254},
  publisher    = {CEUR-WS.org},
  year         = {2023}
}
@inproceedings{DBLP:conf/eurousec/MehrnezhadA23,
  author       = {Maryam Mehrnezhad and
                  Teresa Almeida},
  title        = {"My sex-related data is more sensitive than my financial data and
                  {I} want the same level of security and privacy": User Risk Perceptions
                  and Protective Actions in Female-oriented Technologies},
  booktitle    = {EuroUSEC},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/iccsci/NurmaraHAJSKI23,
  author       = {Muhammad Azril Kurniawan Nurmara and
                  Muhammad Naufal Hakim and
                  Oey Hans Christian Ardy and
                  Reynaldo Jeffrey and
                  Vincentius Albert Setiono and
                  Bayu Kanigoro and
                  Edy Irwansyah},
  title        = {A Review of Security in Financial Technology},
  booktitle    = {{ICCSCI}},
  series       = {Procedia Computer Science},
  volume       = {227},
  pages        = {958--965},
  publisher    = {Elsevier},
  year         = {2023}
}
@inproceedings{DBLP:conf/iccsie/YeWWWYT23,
  author       = {Xin Ye and
                  Shimin Wang and
                  Han Wang and
                  Qinwei Wei and
                  Ting Yang and
                  Yu Tao},
  title        = {Application of Knowledge Graph in Financial Information Security Strategy},
  booktitle    = {{ICCSIE}},
  pages        = {188--192},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/icfnds/BurkhanovTUINA23,
  author       = {Aktam Usmanovich Burkhanov and
                  Bobur Ortikmirzaevich Tursunov and
                  Khusniddin Fakhriddinovich Uktamov and
                  Jamshidxon Odilovich Imomov and
                  Jasur Tursunpulotovich Nosirov and
                  Barno Akbarova},
  title        = {Ways and Prospects of Rational Use of Production Capacity in Ensuring
                  Financial Security in Textile Enterprises In The Conditions of Digital
                  Economy Transformation},
  booktitle    = {{ICFNDS}},
  pages        = {234--242},
  publisher    = {{ACM}},
  year         = {2023}
}
@inproceedings{DBLP:conf/icitjo/ShalabiAA23,
  author       = {Khawla Shalabi and
                  Mustafa Al{-}Fayoumi and
                  Qasem Abu Al{-}Haija},
  title        = {Enhancing Financial System Resilience Against Cyber Threats via {SWIFT}
                  Customer Security Framework},
  booktitle    = {{ICIT}},
  pages        = {260--265},
  publisher    = {{IEEE}},
  year         = {2023}
}
@inproceedings{DBLP:conf/uss/BelliniLBSBR23,
  author       = {Rosanna Bellini and
                  Kevin Lee and
                  Megan A. Brown and
                  Jeremy Shaffer and
                  Rasika Bhalerao and
                  Thomas Ristenpart},
  title        = {The Digital-Safety Risks of Financial Technologies for Survivors of
                  Intimate Partner Violence},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {87--104},
  publisher    = {{USENIX} Association},
  year         = {2023}
}
@inproceedings{DBLP:conf/uss/WangHMXMFTJ23,
  author       = {Wansen Wang and
                  Wenchao Huang and
                  Zhaoyi Meng and
                  Yan Xiong and
                  Fuyou Miao and
                  Xianjin Fang and
                  Caichang Tu and
                  Renjie Ji},
  title        = {Automated Inference on Financial Security of Ethereum Smart Contracts},
  booktitle    = {{USENIX} Security Symposium},
  pages        = {3367--3383},
  publisher    = {{USENIX} Association},
  year         = {2023}
}
@proceedings{DBLP:conf/fc/2022w,
  editor       = {Shin'ichiro Matsuo and
                  Lewis Gudgeon and
                  Ariah Klages{-}Mundt and
                  Daniel Perez Hernandez and
                  Sam Werner and
                  Thomas Haines and
                  Aleksander Essex and
                  Andrea Bracciali and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security. {FC} 2022 International
                  Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13412},
  publisher    = {Springer},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2306-05956,
  author       = {Maryam Mehrnezhad and
                  Teresa Almeida},
  title        = {"My sex-related data is more sensitive than my financial data and
                  {I} want the same level of security and privacy": User Risk Perceptions
                  and Protective Actions in Female-oriented Technologies},
  journal      = {CoRR},
  volume       = {abs/2306.05956},
  year         = {2023}
}
@article{DBLP:journals/corr/abs-2310-18668,
  author       = {Prof N. Jeenath Laila and
                  Dr G. Tamilpavai},
  title        = {FinBTech: Blockchain-Based Video and Voice Authentication System for
                  Enhanced Security in Financial Transactions Utilizing FaceNet512 and
                  Gaussian Mixture Models},
  journal      = {CoRR},
  volume       = {abs/2310.18668},
  year         = {2023}
}
@phdthesis{DBLP:phd/dnb/Maikowski22,
  author       = {Alfons Michael Maikowski},
  title        = {Why do financial institutions implement blockchain technology in security
                  settlement?: {A} conceptual framework for blockchain business cases},
  school       = {Technical University of Berlin, Germany},
  year         = {2022}
}
@article{DBLP:journals/ijahuc/SunWZ22,
  author       = {Qi Sun and
                  Hong Wu and
                  Binglong Zhao},
  title        = {Artificial intelligence technology in internet financial edge computing
                  and analysis of security risk},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {39},
  number       = {4},
  pages        = {201--210},
  year         = {2022}
}
@article{DBLP:journals/ijguc/ZhouW22,
  author       = {Xiuying Zhou and
                  Huaqun Weng},
  title        = {Assessing information security performance of enterprise internal
                  financial sharing in cloud computing environment using analytic hierarchy
                  process},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {13},
  number       = {2/3},
  pages        = {256--271},
  year         = {2022}
}
@article{DBLP:journals/ijinfomandi/AmponsahAW22,
  author       = {Anokye Acheampong Amponsah and
                  Adebayo Felix Adekoya and
                  Benjamin Asubam Weyori},
  title        = {Improving the Financial Security of National Health Insurance using
                  Cloud-Based Blockchain Technology Application},
  journal      = {Int. J. Inf. Manag. Data Insights},
  volume       = {2},
  number       = {1},
  pages        = {100081},
  year         = {2022}
}
@article{DBLP:journals/ijis/ShiZZDLL22,
  author       = {Hongfang Shi and
                  Wenying Zhang and
                  Zimin Zhang and
                  Dewen Ding and
                  Huimin Liu and
                  Hong Lei},
  title        = {Understanding digit-only financial account passwords: {ID} card, structure,
                  and security},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {11},
  pages        = {8635--8652},
  year         = {2022}
}
@article{DBLP:journals/imcs/KwatengAT22,
  author       = {Kwame Owusu Kwateng and
                  Christopher Amanor and
                  Francis Kamewor Tetteh},
  title        = {Enterprise risk management and information technology security in
                  the financial sector},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {422--451},
  year         = {2022}
}
@article{DBLP:journals/jeim/TayaksiAKS22,
  author       = {Cansu Tayaksi and
                  Erhan Ada and
                  Yigit Kazan{\c{c}}oglu and
                  Muhittin Sagnak},
  title        = {The financial impacts of information systems security breaches on
                  publicly traded companies: reactions of different sectors},
  journal      = {J. Enterp. Inf. Manag.},
  volume       = {35},
  number       = {2},
  pages        = {650--668},
  year         = {2022}
}
@article{DBLP:journals/jgim/WuSWL22,
  author       = {Wenqing Wu and
                  Kun Shi and
                  Chia{-}Huei Wu and
                  Jiayue Liu},
  title        = {Research on the Impact of Information Security Certification and Concealment
                  on Financial Performance: Impact of {ISO} 27001 and Concealment on
                  Performance},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {30},
  number       = {3},
  pages        = {1--16},
  year         = {2022}
}
@article{DBLP:journals/smr/QasaimehHYATL22,
  author       = {Malik Qasaimeh and
                  Rand Abu Hammour and
                  Muneer O. Bani Yassein and
                  Raad S. Al{-}Qassas and
                  Juan Alfonso Lara Torralbo and
                  David Lizcano},
  title        = {Advanced security testing using a cyber-attack forecasting model:
                  {A} case study of financial institutions},
  journal      = {J. Softw. Evol. Process.},
  volume       = {34},
  number       = {11},
  year         = {2022}
}
@article{DBLP:journals/systems/DengZDFL22,
  author       = {Shangkun Deng and
                  Yingke Zhu and
                  Shuangyang Duan and
                  Zhe Fu and
                  Zonghua Liu},
  title        = {Stock Price Crash Warning in the Chinese Security Market Using a Machine
                  Learning-Based Method and Financial Indicators},
  journal      = {Syst.},
  volume       = {10},
  number       = {4},
  pages        = {108},
  year         = {2022}
}
@inproceedings{DBLP:conf/bigdataconf/LiF22,
  author       = {Yueqi Li and
                  Ingrid Fisher},
  title        = {Digital Financial Literacy, Risk Aversion, and College Students' Online
                  Security Behavior},
  booktitle    = {{IEEE} Big Data},
  pages        = {4807--4811},
  publisher    = {{IEEE}},
  year         = {2022}
}
@inproceedings{DBLP:conf/bisec/MircevskiPAS22,
  author       = {Julijana Mircevski and
                  Nikola B. Popovic and
                  Mirjana Andric and
                  Branko Stanojev},
  title        = {Security of Financial Software to Support Cryptocurrency Trading},
  booktitle    = {{BISEC}},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3529},
  pages        = {20--26},
  publisher    = {CEUR-WS.org},
  year         = {2022}
}
@inproceedings{DBLP:conf/eitce/Liu22e,
  author       = {Tian Liu},
  title        = {Research on Information Security of Enterprise Group Financial Sharing
                  in Cloud Computing Environment},
  booktitle    = {{EITCE}},
  pages        = {1201--1207},
  publisher    = {{ACM}},
  year         = {2022}
}
@inproceedings{DBLP:conf/fc/TiwariAJDDRG22,
  author       = {Pratyush Ranjan Tiwari and
                  Dhruv Agarwal and
                  Prakhar Jain and
                  Swagam Dasgupta and
                  Preetha Datta and
                  Vineet Reddy and
                  Debayan Gupta},
  title        = {India's "Aadhaar" Biometric {ID:} Structure, Security, and Vulnerabilities},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {13411},
  pages        = {672--693},
  publisher    = {Springer},
  year         = {2022}
}
@inproceedings{DBLP:conf/hicss/CastellanoFP22,
  author       = {Nicola G. Castellano and
                  Carsten Felden and
                  Robert E. Pinsker},
  title        = {Shadow {IT} Behavior of Financial Executives in Germany and Italy
                  as an Antecedent to Internal Data Security Breaches},
  booktitle    = {{HICSS}},
  pages        = {1--11},
  publisher    = {ScholarSpace},
  year         = {2022}
}
@inproceedings{DBLP:conf/icfnds/Tursunov22a,
  author       = {Bobir Tursunov},
  title        = {Financial Security in Small Business in period of Digital Economy:
                  in Case of Uzbekistan},
  booktitle    = {{ICFNDS}},
  pages        = {491--498},
  publisher    = {{ACM}},
  year         = {2022}
}
@inproceedings{DBLP:conf/icfnds/ZarovaT22,
  author       = {Elena Zarova and
                  Bobir Tursunov},
  title        = {Methodology for Assessing the Financial Security of Enterprises in
                  the Post-Pandemic period of Digital Economy},
  booktitle    = {{ICFNDS}},
  pages        = {110--115},
  publisher    = {{ACM}},
  year         = {2022}
}
@inproceedings{DBLP:conf/pacis/LiZX22,
  author       = {Jin Li and
                  Tong Zhang and
                  Shen Xu},
  title        = {The Impact of Financial Restatement on Reported Data Security Breach},
  booktitle    = {{PACIS}},
  pages        = {283},
  year         = {2022}
}
@inproceedings{DBLP:conf/pkc/FaustHKS22,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Financially Backed Covert Security},
  booktitle    = {Public Key Cryptography {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {99--129},
  publisher    = {Springer},
  year         = {2022}
}
@proceedings{DBLP:conf/fc/2022,
  editor       = {Ittay Eyal and
                  Juan A. Garay},
  title        = {Financial Cryptography and Data Security - 26th International Conference,
                  {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13411},
  publisher    = {Springer},
  year         = {2022}
}
@article{DBLP:journals/corr/abs-2208-12960,
  author       = {Wansen Wang and
                  Wenchao Huang and
                  Zhaoyi Meng and
                  Yan Xiong and
                  Fuyou Miao and
                  Xianjin Fang and
                  Caichang Tu and
                  Renjie Ji},
  title        = {An Automated Analyzer for Financial Security of Ethereum Smart Contracts},
  journal      = {CoRR},
  volume       = {abs/2208.12960},
  year         = {2022}
}
@article{DBLP:journals/dagstuhl-reports/GervaisV22,
  author       = {Arthur Gervais and
                  Marie Vasek},
  title        = {Security of Decentralized Financial Technologies (Dagstuhl Seminar
                  22421)},
  journal      = {Dagstuhl Reports},
  volume       = {12},
  number       = {10},
  pages        = {129--142},
  year         = {2022}
}
@article{DBLP:journals/iam/GoelWHW21,
  author       = {Sanjay Goel and
                  Kevin J. Williams and
                  Jingyi Huang and
                  Merrill Warkentin},
  title        = {Can financial incentives help with the struggle for security policy
                  compliance?},
  journal      = {Inf. Manag.},
  volume       = {58},
  number       = {4},
  pages        = {103447},
  year         = {2021}
}
@article{DBLP:journals/ieeesp/MassacciN21,
  author       = {Fabio Massacci and
                  Chan Nam Ngo},
  title        = {Distributed Financial Exchanges: Security Challenges and Design Principles},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {54--64},
  year         = {2021}
}
@article{DBLP:journals/ijbir/AkhtarSBV21,
  author       = {Shahzeb Akhtar and
                  Pratima Amol Sheorey and
                  Sonali Bhattacharya and
                  Ajith Kumar Vadakki Veetil},
  title        = {Cyber Security Solutions for Businesses in Financial Services: Challenges,
                  Opportunities, and the Way Forward},
  journal      = {Int. J. Bus. Intell. Res.},
  volume       = {12},
  number       = {1},
  pages        = {82--97},
  year         = {2021}
}
@article{DBLP:journals/js/QuLB21,
  author       = {Qiao Qu and
                  Cheng Liu and
                  Xinzhong Bao},
  title        = {Financial Security Analysis of E-Commerce Platform Based on Supply
                  Chain for Heterogeneous Network Location Verification},
  journal      = {J. Sensors},
  volume       = {2021},
  pages        = {1--14},
  year         = {2021}
}
@article{DBLP:journals/mis/WeiY21,
  author       = {Ran Wei and
                  Sheng Yao},
  title        = {Enterprise Financial Risk Identification and Information Security
                  Management and Control in Big Data Environment},
  journal      = {Mob. Inf. Syst.},
  volume       = {2021},
  pages        = {7188327:1--7188327:6},
  year         = {2021}
}
@article{DBLP:journals/peerj-cs/EduAA21,
  author       = {Sampson Abeeku Edu and
                  Mary Agoyi and
                  Divine Quazie Agozie},
  title        = {Digital security vulnerabilities and threats implications for financial
                  institutions deploying digital technology platforms and application:
                  {FMEA} and {FTOPSIS} analysis},
  journal      = {PeerJ Comput. Sci.},
  volume       = {7},
  pages        = {e658},
  year         = {2021}
}
@inproceedings{DBLP:conf/aiam/LinX21,
  author       = {Zhisheng Lin and
                  Yan Xia},
  title        = {Network Security of University Financial Sharing Platform under the
                  Background of Smart Campus},
  booktitle    = {{AIAM} {(ACM)}},
  pages        = {1304--1308},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/cpits/BatorshynaTKCH21,
  author       = {Adilia Batorshyna and
                  Volodymyr Tokar and
                  Natalia Kotenko and
                  Serhii Chekhovych and
                  Andrii Homotiuk},
  title        = {The Impact of Awareness Stimulating Activities and Events on Global
                  Islamic Finance Assets: Enhancing Financial Risk Management and Economic
                  Security in Non-Muslim Countries},
  booktitle    = {{CPITS} {II} {(1)}},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3187},
  pages        = {13--26},
  publisher    = {CEUR-WS.org},
  year         = {2021}
}
@inproceedings{DBLP:conf/cpits/KreidychKK21,
  author       = {Iryna Kreidych and
                  leksandr Kharchenko and
                  Oksana Kazak},
  title        = {Solvency Management in the Financial Security System of Housing and
                  Communal Services},
  booktitle    = {{CPITS} {II} {(2)}},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3188},
  pages        = {63--75},
  publisher    = {CEUR-WS.org},
  year         = {2021}
}
@inproceedings{DBLP:conf/fc/DasKC21,
  author       = {Sanchari Das and
                  Andrew Kim and
                  L. Jean Camp},
  title        = {Short Paper: Organizational Security: Implementing a Risk-Reduction-Based
                  Incentivization Model for {MFA} Adoption},
  booktitle    = {Financial Cryptography {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  pages        = {406--413},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/icict/MohananSB21,
  author       = {Sudhish Mohanan and
                  Nandagopal Sridhar and
                  Sajal Bhatia},
  title        = {Comparative Analysis of Cloud Computing Security Frameworks for Financial
                  Sector},
  booktitle    = {{ICICT} {(2)}},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {236},
  pages        = {1015--1025},
  publisher    = {Springer},
  year         = {2021}
}
@inproceedings{DBLP:conf/icise/FacciaSEB21,
  author       = {Alessio Faccia and
                  Nedal Sawan and
                  Ahmed Eltweri and
                  Zeenat Beebeejaun},
  title        = {Financial Big Data Security and Privacy in X-Accounting. {A} Step
                  Further to Implement the Triple-Entry Accounting},
  booktitle    = {{ICISE}},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2021}
}
@inproceedings{DBLP:conf/ico/SattarMSPBPK21,
  author       = {Md Rahat Ibne Sattar and
                  Shrabonti Mitra and
                  Sadia Sultana and
                  Umme Salma Pushpa and
                  Dhruba Bhattacharjee and
                  Abhijit Pathak and
                  Mayeen Uddin Khandaker},
  title        = {A Secured Network Layer and Information Security for Financial Institutions:
                  {A} Case Study},
  booktitle    = {{ICO}},
  pages        = {992--1001},
  year         = {2021}
}
@inproceedings{DBLP:conf/issre/TanCC21,
  author       = {Vincent Tan and
                  Carmen Cheh and
                  Binbin Chen},
  title        = {From Application Security Verification Standard {(ASVS)} to Regulation
                  Compliance: {A} Case Study in Financial Services Sector},
  booktitle    = {{ISSRE} Workshops},
  pages        = {69--76},
  publisher    = {{IEEE}},
  year         = {2021}
}
@proceedings{DBLP:conf/fc/2021-1,
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12674},
  publisher    = {Springer},
  year         = {2021}
}
@proceedings{DBLP:conf/fc/2021-2,
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  publisher    = {Springer},
  year         = {2021}
}
@proceedings{DBLP:conf/fc/2021w,
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  Lewis Gudgeon and
                  Thomas Haines and
                  Ariah Klages{-}Mundt and
                  Shin'ichiro Matsuo and
                  Daniel Perez and
                  Massimiliano Sala and
                  Sam Werner},
  title        = {Financial Cryptography and Data Security. {FC} 2021 International
                  Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March
                  5, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12676},
  publisher    = {Springer},
  year         = {2021}
}
@article{DBLP:journals/iacr/FaustHKS21a,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Financially Backed Covert Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1652},
  year         = {2021}
}
@article{DBLP:journals/ijitdm/Balashunmugaraja20,
  author       = {B. Balashunmugaraja and
                  T. R. Ganeshbabu},
  title        = {Optimal Key Generation for Data Sanitization and Restoration of Cloud
                  Data: Future of Financial Cyber Security},
  journal      = {Int. J. Inf. Technol. Decis. Mak.},
  volume       = {19},
  number       = {4},
  pages        = {987--1013},
  year         = {2020}
}
@article{DBLP:journals/imcs/DzidzahKA20,
  author       = {Esther Dzidzah and
                  Kwame Owusu Kwateng and
                  Benjamin Kofi Asante},
  title        = {Security behaviour of mobile financial service users},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {719--741},
  year         = {2020}
}
@article{DBLP:journals/jbft/KaulH20,
  author       = {Sonam Devgan Kaul and
                  Dimitrios Hatzinakos},
  title        = {Intelligent {RFID} biometric enabled dual security lock in the banking
                  environment},
  journal      = {J. Bank. Financial Technol.},
  volume       = {4},
  number       = {2},
  pages        = {159--173},
  year         = {2020}
}
@article{DBLP:journals/mta/PanWH20,
  author       = {Shuang Pan and
                  Jianguo Wei and
                  Shaobo Hu},
  title        = {A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping
                  and Intelligent Learning in Financial Security System},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {13-14},
  pages        = {9163--9176},
  year         = {2020}
}
@inproceedings{DBLP:conf/IEEEares/Moeckel20,
  author       = {Caroline Moeckel},
  title        = {Attacker-centric thinking in security: perspectives from financial
                  services practitioners},
  booktitle    = {{ARES}},
  pages        = {1:1--1:10},
  publisher    = {{ACM}},
  year         = {2020}
}
@inproceedings{DBLP:conf/acis/PhamH20,
  author       = {Thai Pham and
                  Farkhondeh Hassandoust},
  title        = {The Role of External Mechanisms and Transformational Leadership in
                  Information Security Policy Effectiveness: {A} Managerial Perspective
                  of Financial Industry in Vietnam},
  booktitle    = {{ACIS}},
  pages        = {79},
  year         = {2020}
}
@inproceedings{DBLP:conf/atci/HuH20,
  author       = {Shuyu Hu and
                  Ming Huang},
  title        = {Internet Financial Security Based on Big Data},
  booktitle    = {{ATCI}},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1244},
  pages        = {485--490},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/dessert/SirenkoAVPMF20,
  author       = {Natalia N. Sirenko and
                  Igor P. Atamanyuk and
                  Yuriy Volosyuk and
                  Anastasiya Poltorak and
                  Olha Melnyk and
                  Polina Fenenko},
  title        = {Paradigm Changes that Strengthen the Financial Security of the State
                  through {FINTECH} Development},
  booktitle    = {{DESSERT}},
  pages        = {110--116},
  publisher    = {{IEEE}},
  year         = {2020}
}
@inproceedings{DBLP:conf/fc/KulykRAMGV20,
  author       = {Oksana Kulyk and
                  Benjamin Reinheimer and
                  Lukas Aldag and
                  Peter Mayer and
                  Nina Gerber and
                  Melanie Volkamer},
  title        = {Security and Privacy Awareness in Smart Environments - {A} Cross-Country
                  Investigation},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {84--101},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/fc/OyebisiN20,
  author       = {David Oyebisi and
                  Kennedy Njenga},
  title        = {Behaviour of Outsourced Employees as Sources of Information System
                  Security Threats},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {137--148},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/fc/SuBSUM20,
  author       = {Jianan Su and
                  Michael Bartholic and
                  Andrew Stange and
                  Ryosuke Ushida and
                  Shin'ichiro Matsuo},
  title        = {How to Dynamically Incentivize Sufficient Level of IoT Security},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {451--465},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/fc/Taylor-JacksonM20,
  author       = {Jacqui Taylor{-}Jackson and
                  John McAlaney and
                  Jeffrey L. Foster and
                  Abubakar Bello and
                  Alana Maurushat and
                  John Dale},
  title        = {Incorporating Psychology into Cyber Security Education: {A} Pedagogical
                  Approach},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {207--217},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/fc/WangYPB0D020,
  author       = {Qin Wang and
                  Jiangshan Yu and
                  Zhiniang Peng and
                  Van Cuong Bui and
                  Shiping Chen and
                  Yong Ding and
                  Yang Xiang},
  title        = {Security Analysis on dBFT Protocol of {NEO}},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {20--31},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/fc/YuenSLAEZG20,
  author       = {Tsz Hon Yuen and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Man Ho Au and
                  Muhammed F. Esgin and
                  Qingzhao Zhang and
                  Dawu Gu},
  title        = {RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and
                  Stronger Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {464--483},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/ijcai/ChenGCZL20,
  author       = {Weili Chen and
                  Xiongfeng Guo and
                  Zhiguang Chen and
                  Zibin Zheng and
                  Yutong Lu},
  title        = {Phishing Scam Detection on Ethereum: Towards Financial Security for
                  Blockchain Ecosystem},
  booktitle    = {{IJCAI}},
  pages        = {4506--4512},
  publisher    = {ijcai.org},
  year         = {2020}
}
@inproceedings{DBLP:conf/isdmci/KulyniakOR20,
  author       = {Ihor Kulyniak and
                  Solomiya Ohinok and
                  Halyna Rachynska},
  title        = {Scientific and Methodological Approach to Assessing the Level of Banks'
                  Financial Security},
  booktitle    = {{ISDMCI}},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1246},
  pages        = {77--97},
  publisher    = {Springer},
  year         = {2020}
}
@inproceedings{DBLP:conf/m3e2/KhrushchHHLPV20,
  author       = {Nila Khrushch and
                  Pavlo Hryhoruk and
                  Tetiana Hovorushchenko and
                  Sergii Lysenko and
                  Liudmyla Prystupa and
                  Liudmyla Vahanova},
  title        = {Assessment of bank's financial security levels based on a comprehensive
                  index using information technology},
  booktitle    = {{M3E2-MLPEED}},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2713},
  pages        = {239--260},
  publisher    = {CEUR-WS.org},
  year         = {2020}
}
@incollection{DBLP:series/ais/BelloP20,
  author       = {Gabriel Bello and
                  Alfredo J. Perez},
  title        = {On the Application of Financial Security Standards in Blockchain Platforms},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {2020}
}
@proceedings{DBLP:conf/fc/2019w,
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  publisher    = {Springer},
  year         = {2020}
}
@proceedings{DBLP:conf/fc/2020,
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  publisher    = {Springer},
  year         = {2020}
}
@proceedings{DBLP:conf/fc/2020w,
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  publisher    = {Springer},
  year         = {2020}
}
@article{DBLP:journals/ijais/McCalligRR19,
  author       = {John McCallig and
                  D. Alastair Robb and
                  Fiona H. Rohde},
  title        = {Establishing the representational faithfulness of financial accounting
                  information using multiparty security, network analysis and a blockchain},
  journal      = {Int. J. Account. Inf. Syst.},
  volume       = {33},
  pages        = {47--58},
  year         = {2019}
}
@article{DBLP:journals/ijssmet/Feltus19,
  author       = {Christophe Feltus},
  title        = {Deriving Information System Security and Privacy From Value Cocreation
                  Theory: Case Study in the Financial Sector},
  journal      = {Int. J. Serv. Sci. Manag. Eng. Technol.},
  volume       = {10},
  number       = {4},
  pages        = {1--25},
  year         = {2019}
}
@article{DBLP:journals/jbft/DasguptaSG19,
  author       = {Dipankar Dasgupta and
                  John M. Shrein and
                  Kishor Datta Gupta},
  title        = {A survey of blockchain from security perspective},
  journal      = {J. Bank. Financial Technol.},
  volume       = {3},
  number       = {1},
  pages        = {1--17},
  year         = {2019}
}
@article{DBLP:journals/tele/BarthJJHR19,
  author       = {Susanne Barth and
                  Menno D. T. de Jong and
                  Marianne Junger and
                  Pieter H. Hartel and
                  Janina C. Roppelt},
  title        = {Putting the privacy paradox to the test: Online privacy and security
                  behaviors among users with technical knowledge, privacy awareness,
                  and financial resources},
  journal      = {Telematics Informatics},
  volume       = {41},
  pages        = {55--69},
  year         = {2019}
}
@inproceedings{DBLP:conf/chi/SleeperMOTWSOSC19,
  author       = {Manya Sleeper and
                  Tara Matthews and
                  Kathleen O'Leary and
                  Anna Turner and
                  Jill Palzkill Woelfer and
                  Martin Shelton and
                  Andrew Oplinger and
                  Andreas Schou and
                  Sunny Consolvo},
  title        = {Tough Times at Transitional Homeless Shelters: Considering the Impact
                  of Financial Insecurity on Digital Security and Privacy},
  booktitle    = {{CHI}},
  pages        = {89},
  publisher    = {{ACM}},
  year         = {2019}
}
@inproceedings{DBLP:conf/cscwd/MahalleYT19a,
  author       = {Abhishek Mahalle and
                  Jianming Yong and
                  Xiaohui Tao},
  title        = {Ethics of {IT} Security Team for Cloud Architecture Infrastructure
                  in Banking and Financial Services Industry},
  booktitle    = {{CSCWD}},
  pages        = {506--511},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/fc/AchenbachGH0LMM19,
  author       = {Dirk Achenbach and
                  Roland Gr{\"{o}}ll and
                  Timon Hackenjos and
                  Alexander Koch and
                  Bernhard L{\"{o}}we and
                  Jeremias Mechler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Jochen Rill},
  title        = {Your Money or Your Life - Modeling and Analyzing the Security of Electronic
                  Payment in the {UC} Framework},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {243--261},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/fc/AvarikiotiK0W19,
  author       = {Georgia Avarikioti and
                  Lukas K{\"{a}}ppeli and
                  Yuyi Wang and
                  Roger Wattenhofer},
  title        = {Bitcoin Security Under Temporary Dishonest Majority},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {466--483},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/fc/OzmenBY19,
  author       = {Muslum Ozgur Ozmen and
                  Rouzbeh Behnia and
                  Attila A. Yavuz},
  title        = {Fast Authentication from Aggregate Signatures with Improved Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {686--705},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/m3e2/HryhorukKG19,
  author       = {Pavlo Hryhoruk and
                  Nila Khrushch and
                  Svitlana Grygoruk},
  title        = {Model for Assessment of the Financial Security Level of the Enterprise
                  Based on the Desirability Scale},
  booktitle    = {{M3E2-MLPEED}},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2422},
  pages        = {169--180},
  publisher    = {CEUR-WS.org},
  year         = {2019}
}
@inproceedings{DBLP:conf/medes/TroianoSPPMD19,
  author       = {Ernesto Troiano and
                  John Soldatos and
                  Ariana Polyviou and
                  Andreas Polyviou and
                  Alessandro Mamelli and
                  Dimitris Drakoulis},
  title        = {Big Data Platform for Integrated Cyber and Physical Security of Critical
                  Infrastructures for the Financial Sector: Critical Infrastructures
                  as Cyber-Physical Systems},
  booktitle    = {{MEDES}},
  pages        = {262--269},
  publisher    = {{ACM}},
  year         = {2019}
}
@inproceedings{DBLP:conf/sp/FettHK19,
  author       = {Daniel Fett and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters},
  title        = {An Extensive Formal Security Analysis of the OpenID Financial-Grade
                  {API}},
  booktitle    = {{IEEE} Symposium on Security and Privacy},
  pages        = {453--471},
  publisher    = {{IEEE}},
  year         = {2019}
}
@inproceedings{DBLP:conf/spw/Mavroudis19,
  author       = {Vasilios Mavroudis},
  title        = {Bounded Temporal Fairness for {FIFO} Financial Markets},
  booktitle    = {Security Protocols Workshop},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {91--103},
  publisher    = {Springer},
  year         = {2019}
}
@inproceedings{DBLP:conf/spw/Mavroudis19a,
  author       = {Vasilios Mavroudis},
  title        = {Bounded Temporal Fairness for {FIFO} Financial Markets (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols Workshop},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {104--112},
  publisher    = {Springer},
  year         = {2019}
}
@proceedings{DBLP:conf/fc/2018w,
  editor       = {Aviv Zohar and
                  Ittay Eyal and
                  Vanessa Teague and
                  Jeremy Clark and
                  Andrea Bracciali and
                  Federico Pintore and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security - {FC} 2018 International
                  Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March
                  2, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10958},
  publisher    = {Springer},
  year         = {2019}
}
@proceedings{DBLP:conf/fc/2019,
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  publisher    = {Springer},
  year         = {2019}
}
@article{DBLP:journals/corr/abs-1901-11520,
  author       = {Daniel Fett and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters},
  title        = {An Extensive Formal Security Analysis of the OpenID Financial-grade
                  {API}},
  journal      = {CoRR},
  volume       = {abs/1901.11520},
  year         = {2019}
}
@phdthesis{DBLP:phd/ethos/Pan18,
  author       = {Liuxuan Pan},
  title        = {Application of a financial quantitative risk model to information
                  security risk assessment},
  school       = {Royal Holloway, University of London, Egham, {UK}},
  year         = {2018}
}
@article{DBLP:journals/jcam/Nkeki18a,
  author       = {Charles I. Nkeki},
  title        = {Optimal investment risks and debt management with backup security
                  in a financial crisis},
  journal      = {J. Comput. Appl. Math.},
  volume       = {338},
  pages        = {129--152},
  year         = {2018}
}
@article{DBLP:journals/taasm/Lee18,
  author       = {Kyoung{-}Joo Lee},
  title        = {Strategic human resource management for university-industry collaborations
                  in Korea: financial incentives for academic faculty and employment
                  security of industry liaison offices},
  journal      = {Technol. Anal. Strateg. Manag.},
  volume       = {30},
  number       = {4},
  pages        = {461--472},
  year         = {2018}
}
@inproceedings{DBLP:conf/cscwd/MahalleYT018,
  author       = {Abhishek Mahalle and
                  Jianming Yong and
                  Xiaohui Tao and
                  Jun Shen},
  title        = {Data Privacy and System Security for Banking and Financial Services
                  Industry based on Cloud Computing Infrastructure},
  booktitle    = {{CSCWD}},
  pages        = {407--413},
  publisher    = {{IEEE}},
  year         = {2018}
}
@inproceedings{DBLP:conf/fc/DasDC18,
  author       = {Sanchari Das and
                  Andrew Dingman and
                  L. Jean Camp},
  title        = {Why Johnny Doesn't Use Two Factor {A} Two-Phase Usability Study of
                  the {FIDO} {U2F} Security Key},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/fc/FarhangLG18,
  author       = {Sadegh Farhang and
                  Aron Laszka and
                  Jens Grossklags},
  title        = {An Economic Study of the Effect of Android Platform Fragmentation
                  on Security Updates},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {119--137},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/fc/Shacham18,
  author       = {Hovav Shacham},
  title        = {Short Unique Signatures from {RSA} with a Tight Security Reduction
                  (in the Random Oracle Model)},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/spw/Massacci18,
  author       = {Fabio Massacci},
  title        = {Non-monotonic Security Protocols and Failures in Financial Intermediation
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols Workshop},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {55--62},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/spw/MassacciN0W18,
  author       = {Fabio Massacci and
                  Chan Nam Ngo and
                  Daniele Venturi and
                  Julian Williams},
  title        = {Non-monotonic Security Protocols and Failures in Financial Intermediation},
  booktitle    = {Security Protocols Workshop},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {45--54},
  publisher    = {Springer},
  year         = {2018}
}
@proceedings{DBLP:conf/fc/2018,
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  publisher    = {Springer},
  year         = {2018}
}
@article{DBLP:journals/ieeesp/TraynorBBR17,
  author       = {Patrick Traynor and
                  Kevin R. B. Butler and
                  Jasmine D. Bowers and
                  Bradley Reaves},
  title        = {FinTechSec: Addressing the Security Challenges of Digital Financial
                  Services},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {5},
  pages        = {85--89},
  year         = {2017}
}
@inproceedings{DBLP:conf/fc/ChothiaGHS17,
  author       = {Tom Chothia and
                  Flavio D. Garcia and
                  Chris Heppel and
                  Chris McMahon Stone},
  title        = {Why Banker Bob (Still) Can't Get {TLS} Right: {A} Security Analysis
                  of {TLS} in Leading {UK} Banking Apps},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {579--597},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/fc/Gjosteen017,
  author       = {Kristian Gj{\o}steen and
                  Martin Strand},
  title        = {A Roadmap to Fully Homomorphic Elections: Stronger Security, Better
                  Verifiability},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/fc/MalhotraGVKGG17,
  author       = {Aanchal Malhotra and
                  Matthew Van Gundy and
                  Mayank Varia and
                  Haydn Kennedy and
                  Jonathan Gardner and
                  Sharon Goldberg},
  title        = {The Security of NTP's Datagram Protocol},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {405--423},
  publisher    = {Springer},
  year         = {2017}
}
@inproceedings{DBLP:conf/fc/SzalachowskiP17,
  author       = {Pawel Szalachowski and
                  Adrian Perrig},
  title        = {Short Paper: On Deployment of DNS-Based Security Enhancements},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {424--433},
  publisher    = {Springer},
  year         = {2017}
}
@proceedings{DBLP:conf/fc/2016,
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  publisher    = {Springer},
  year         = {2017}
}
@proceedings{DBLP:conf/fc/2017,
  editor       = {Aggelos Kiayias},
  title        = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  publisher    = {Springer},
  year         = {2017}
}
@proceedings{DBLP:conf/fc/2017w,
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  publisher    = {Springer},
  year         = {2017}
}
@article{DBLP:journals/cais/AppanB16,
  author       = {Radha Appan and
                  Dinko Bacic},
  title        = {Impact of Information Technology {(IT)} Security Information Sharing
                  among Competing {IT} Firms on Firm's Financial Performance: An Empirical
                  Investigation},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {39},
  pages        = {12},
  year         = {2016}
}
@article{DBLP:journals/dss/ChunCS16,
  author       = {Se{-}Hak Chun and
                  Wooje Cho and
                  Ramanath Subramanyam},
  title        = {Transaction security investments in online marketplaces: An analytical
                  examination of financial liabilities},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {91--102},
  year         = {2016}
}
@article{DBLP:journals/fi/PandeyS16,
  author       = {Pankaj Pandey and
                  Einar Snekkenes},
  title        = {Using Financial Instruments to Transfer the Information Security Risks},
  journal      = {Future Internet},
  volume       = {8},
  number       = {2},
  pages        = {20},
  year         = {2016}
}
@article{DBLP:journals/ijinfoman/RoumaniNR16,
  author       = {Yaman Roumani and
                  Joseph K. Nwankpa and
                  Yazan F. Roumani},
  title        = {Examining the relationship between firm's financial records and security
                  vulnerabilities},
  journal      = {Int. J. Inf. Manag.},
  volume       = {36},
  number       = {6},
  pages        = {987--994},
  year         = {2016}
}
@article{DBLP:journals/lp/LinZ16,
  author       = {Songqing Lin and
                  Lijuan Zhan},
  title        = {International publishing partnerships for China's English language
                  journals and financial security},
  journal      = {Learn. Publ.},
  volume       = {29},
  number       = {3},
  pages        = {145--153},
  year         = {2016}
}
@article{DBLP:journals/wpc/Noh16,
  author       = {Kyoo{-}Sung Noh},
  title        = {A Study on the Authentication and Security of Financial Settlement
                  Using the Finger Vein Technology in Wireless Internet Environment},
  journal      = {Wirel. Pers. Commun.},
  volume       = {89},
  number       = {3},
  pages        = {761--775},
  year         = {2016}
}
@inproceedings{DBLP:conf/bigdatasec/GaiQE16a,
  author       = {Keke Gai and
                  Meikang Qiu and
                  Sam Adam Elnagdy},
  title        = {Security-Aware Information Classifications Using Supervised Learning
                  for Cloud-Based Cyber Risk Management in Financial Big Data},
  booktitle    = {BigDataSecurity/HPSC/IDS},
  pages        = {197--202},
  publisher    = {{IEEE}},
  year         = {2016}
}
@inproceedings{DBLP:conf/fc/AlgwilY16,
  author       = {Abdalnaser Algwil and
                  Jeff Yan},
  title        = {Failures of Security APIs: {A} New Case},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {283--298},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/fc/KrombholzJGW16,
  author       = {Katharina Krombholz and
                  Aljosha Judmayer and
                  Matthias Gusenbauer and
                  Edgar R. Weippl},
  title        = {The Other Side of the Coin: User Experiences with Bitcoin Security
                  and Privacy},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {555--580},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/fc/LangCBSS16,
  author       = {Juan Lang and
                  Alexei Czeskis and
                  Dirk Balfanz and
                  Marius Schilder and
                  Sampath Srinivas},
  title        = {Security Keys: Practical Cryptographic Second Factors for the Modern
                  Web},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {422--440},
  publisher    = {Springer},
  year         = {2016}
}
@inproceedings{DBLP:conf/haisa/WahlgrenFMK16,
  author       = {Gunnar Wahlgren and
                  Anna Fedotova and
                  Alexandra Musaeva and
                  Stewart Kowalski},
  title        = {{IT} Security Incidents Escalation in the Swedish Financial Sector:
                  {A} Maturity Model Study},
  booktitle    = {{HAISA}},
  pages        = {45--55},
  publisher    = {University of Plymouth},
  year         = {2016}
}
@inproceedings{DBLP:conf/wisa/OhKC16,
  author       = {Eun Oh and
                  Tae{-}Sung Kim and
                  Tae{-}Hee Cho},
  title        = {Development of Information Security Management Assessment Model for
                  the Financial Sector},
  booktitle    = {{WISA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {186--197},
  year         = {2016}
}
@proceedings{DBLP:conf/fc/2016w,
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  publisher    = {Springer},
  year         = {2016}
}
@article{DBLP:journals/ijais/Otero15,
  author       = {Angel R. Otero},
  title        = {An information security control assessment methodology for organizations'
                  financial information},
  journal      = {Int. J. Account. Inf. Syst.},
  volume       = {18},
  pages        = {26--45},
  year         = {2015}
}
@article{DBLP:journals/ijisss/Ifinedo15,
  author       = {Princely Ifinedo},
  title        = {Socio-Economic Correlates of Information Security Threats and Controls
                  in Global Financial Services Industry: An Analysis},
  journal      = {Int. J. Inf. Syst. Serv. Sect.},
  volume       = {7},
  number       = {2},
  pages        = {54--70},
  year         = {2015}
}
@inproceedings{DBLP:conf/3pgcic/PandeyH15,
  author       = {Pankaj Pandey and
                  Steven De Haes},
  title        = {A Variable Payout Information Security Financial Instrument and Trading
                  Mechanism to Address Information Security Risk},
  booktitle    = {3PGCIC},
  pages        = {17--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2015}
}
@inproceedings{DBLP:conf/csa2/AhnC15,
  author       = {JungJin Ahn and
                  Eunmi Choi},
  title        = {Financial Security Protocol and Service Model for Joint Account Banking
                  Transaction},
  booktitle    = {{CSA/CUTE}},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {373},
  pages        = {521--527},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/fc/Toorani15,
  author       = {Mohsen Toorani},
  title        = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6
                  Standard},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  pages        = {245--260},
  publisher    = {Springer},
  year         = {2015}
}
@inproceedings{DBLP:conf/ntms/GranadilloGDPM15,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar and
                  Christophe Ponchel and
                  Laura Rodriguez Martin},
  title        = {Considering technical and financial impact in the selection of security
                  countermeasures against Advanced Persistent Threats (APTs)},
  booktitle    = {{NTMS}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015}
}
@proceedings{DBLP:conf/fc/2015,
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  publisher    = {Springer},
  year         = {2015}
}
@proceedings{DBLP:conf/fc/2015w,
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  publisher    = {Springer},
  year         = {2015}
}
@article{DBLP:journals/corr/Erturk15,
  author       = {Emre Erturk},
  title        = {Two Trends in Mobile Security: Financial Motives and Transitioning
                  from Static to Dynamic Analysis},
  journal      = {CoRR},
  volume       = {abs/1504.06893},
  year         = {2015}
}
@article{DBLP:journals/cais/LiuZA14,
  author       = {Charles Zhechao Liu and
                  Humayun Zafar and
                  Yoris A. Au},
  title        = {Rethinking {FS-ISAC:} An {IT} Security Information Sharing Network
                  Model for the Financial Services Sector},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {34},
  pages        = {2},
  year         = {2014}
}
@article{DBLP:journals/ijebm/Ifinedo14,
  author       = {Princely Ifinedo},
  title        = {The effects of national culture on the assessment of information security
                  threats and controls in financial services industry},
  journal      = {Int. J. Electron. Bus. Manag.},
  volume       = {12},
  number       = {2},
  year         = {2014}
}
@inproceedings{DBLP:conf/fc/DmitrienkoLRS14,
  author       = {Alexandra Dmitrienko and
                  Christopher Liebchen and
                  Christian Rossow and
                  Ahmad{-}Reza Sadeghi},
  title        = {On the (In)Security of Mobile Two-Factor Authentication},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {365--383},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/fc/Garman0MR14,
  author       = {Christina Garman and
                  Matthew Green and
                  Ian Miers and
                  Aviel D. Rubin},
  title        = {Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {8438},
  pages        = {140--155},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/fc/MigicovskyDRH14,
  author       = {Alex Migicovsky and
                  Zakir Durumeric and
                  Jeff Ringenberg and
                  J. Alex Halderman},
  title        = {Outsmarting Proctors with Smartwatches: {A} Case Study on Wearable
                  Computing Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {89--96},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/fc/MurdochA14,
  author       = {Steven J. Murdoch and
                  Ross J. Anderson},
  title        = {Security Protocols and Evidence: Where Many Payment Systems Fail},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/fc/Pape14,
  author       = {Sebastian Pape},
  title        = {Sample or Random Security - {A} Security Model for Segment-Based Visual
                  Cryptography},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {291--303},
  publisher    = {Springer},
  year         = {2014}
}
@inproceedings{DBLP:conf/mipro/CapkoAT14,
  author       = {Zvonko Capko and
                  Sasa Aksentijevic and
                  Edvard Tijan},
  title        = {Economic and financial analysis of investments in information security},
  booktitle    = {{MIPRO}},
  pages        = {1550--1556},
  publisher    = {{IEEE}},
  year         = {2014}
}
@inproceedings{DBLP:conf/pst/MartinKA14,
  author       = {Clemens Martin and
                  Amina Kadry and
                  Ghada Abu{-}Shady},
  title        = {Quantifying the financial impact of it security breaches on business
                  processes},
  booktitle    = {{PST}},
  pages        = {149--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2014}
}
@proceedings{DBLP:conf/fc/2014,
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  publisher    = {Springer},
  year         = {2014}
}
@proceedings{DBLP:conf/fc/2014w,
  editor       = {Rainer B{\"{o}}hme and
                  Michael Brenner and
                  Tyler Moore and
                  Matthew Smith},
  title        = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
                  and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8438},
  publisher    = {Springer},
  year         = {2014}
}
@phdthesis{DBLP:phd/ethos/Alhayani13,
  author       = {Abdullah Alhayani},
  title        = {Implementation, management and dissemination of information security
                  : an organisational perspective of financial institution},
  school       = {Brunel University London, {UK}},
  year         = {2013}
}
@article{DBLP:journals/cit/Ifinedo13,
  author       = {Princely Ifinedo},
  title        = {Relationships Between Relevant Contextual Influences and Information
                  Security Threats and Controls in Global Financial Services Industry},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {21},
  number       = {4},
  pages        = {235--246},
  year         = {2013}
}
@article{DBLP:journals/jisis/FloresAS13,
  author       = {Denys A. Flores and
                  Olga Angelopoulou and
                  Richard J. Self},
  title        = {An Anti-Money Laundering Methodology: Financial Regulations, Information
                  Security and Digital Forensics Working Together},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {101--114},
  year         = {2013}
}
@article{DBLP:journals/mcm/ChangKL13,
  author       = {Hangbae Chang and
                  Jungduk Kim and
                  Hosin David Lee},
  title        = {Financial {IT} and Security},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {1-2},
  pages        = {1--2},
  year         = {2013}
}
@article{DBLP:journals/mcm/LeeLL13,
  author       = {Jung{-}Hyun Lee and
                  Won Gue Lim and
                  Jong In Lim},
  title        = {A study of the security of Internet banking and financial private
                  information in South Korea},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {1-2},
  pages        = {117--131},
  year         = {2013}
}
@inproceedings{DBLP:conf/amcis/LampeWMS13,
  author       = {Ulrich Lampe and
                  Olga Wenge and
                  Alexander M{\"{u}}ller and
                  Ralf Schaarschmidt},
  title        = {On the Relevance of Security Risks for Cloud Adoption in the Financial
                  Industry},
  booktitle    = {{AMCIS}},
  publisher    = {Association for Information Systems},
  year         = {2013}
}
@inproceedings{DBLP:conf/cts/PanjaFMRM13,
  author       = {Biswajit Panja and
                  Dennis Fattaleh and
                  Mark Mercado and
                  Adam Robinson and
                  Priyanka Meharia},
  title        = {Cybersecurity in banking and financial sector: Security analysis of
                  a mobile banking application},
  booktitle    = {{CTS}},
  pages        = {397--403},
  publisher    = {{IEEE}},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/ArianezhadSM13,
  author       = {Majid Arianezhad and
                  Douglas Stebila and
                  Behzad Mozaffari},
  title        = {Usability and Security of Gaze-Based Graphical Grid Passwords},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/Cappos13,
  author       = {Justin Cappos},
  title        = {Avoiding Theoretical Optimality to Efficiently and Privately Retrieve
                  Security Updates},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {386--394},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/ChuangNWJ13,
  author       = {John C.{-}I. Chuang and
                  Hamilton Nguyen and
                  Charles Wang and
                  Benjamin Johnson},
  title        = {I Think, Therefore {I} Am: Usability and Security of Authentication
                  Using Brainwaves},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/EgelmanS13,
  author       = {Serge Egelman and
                  Stuart E. Schechter},
  title        = {The Importance of Being Earnest [In Security Warnings]},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {52--59},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/FahlHOMS13,
  author       = {Sascha Fahl and
                  Marian Harbach and
                  Marten Oltrogge and
                  Thomas Muders and
                  Matthew Smith},
  title        = {Hey, You, Get Off of My Clipboard - On How Usability Trumps Security
                  in Android Password Managers},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/GallegoSV13,
  author       = {Alexander Gallego and
                  Nitesh Saxena and
                  Jonathan Voris},
  title        = {Exploring Extrinsic Motivation for Better Security: {A} Usability
                  Study of Scoring-Enhanced Device Pairing},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/KeHY13,
  author       = {Ping Fan Ke and
                  Kai Lung Hui and
                  Wei T. Yue},
  title        = {Information Security as a Credence Good},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {83--93},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13,
  author       = {Patrick Gage Kelley and
                  Saranga Komanduri and
                  Michelle L. Mazurek and
                  Richard Shay and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  title        = {The Impact of Length and Mathematical Operators on the Usability and
                  Security of System-Assigned One-Time PINs},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/KirlapposBS13,
  author       = {Iacovos Kirlappos and
                  Adam Beautement and
                  Martina Angela Sasse},
  title        = {"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {70--82},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/fc/ZhouYSQ13,
  author       = {Yuanyuan Zhou and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  title        = {On the Need of Physical Security for Small Embedded Devices: {A} Case
                  Study with {COMP128-1} Implementations in {SIM} Cards},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {230--238},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/indin/RayAGBT13,
  author       = {Apala Ray and
                  Johan {\AA}kerberg and
                  Mikael Gidlund and
                  Mats Bj{\"{o}}rkman and
                  Christophe Tremlet},
  title        = {Reusability assessment of financial card readers' security mechanisms
                  in process control devices},
  booktitle    = {{INDIN}},
  pages        = {494--499},
  publisher    = {{IEEE}},
  year         = {2013}
}
@inproceedings{DBLP:conf/issa/EsanNO13,
  author       = {Omobayo A. Esan and
                  S. M. Ngwira and
                  Isaac Olusegun Osunmakinde},
  title        = {Bimodal biometrics for financial infrastructure security},
  booktitle    = {{ISSA}},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013}
}
@inproceedings{DBLP:conf/isse/BalboniKM13,
  author       = {Paolo Balboni and
                  Udo Kroon and
                  Milda Macenaite},
  title        = {Data Protection and Data Security by Design Applied to Financial Intelligence},
  booktitle    = {{ISSE}},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2013}
}
@inproceedings{DBLP:conf/istas/MushoreK13,
  author       = {Rutendo Mushore and
                  Michael Kyobe},
  title        = {Investigating the factors influencing information security compliance
                  in a financial services firm},
  booktitle    = {{ISTAS}},
  pages        = {155--173},
  publisher    = {{IEEE}},
  year         = {2013}
}
@inproceedings{DBLP:conf/wocc/XuWYWZ13,
  author       = {Jiang{-}pei Xu and
                  Liji Wu and
                  Xiang{-}jun Yang and
                  Yu{-}zhong Wang and
                  Xiangmin Zhang},
  title        = {A security vulnerability of Java Card on array access in financial
                  system},
  booktitle    = {{WOCC}},
  pages        = {707--710},
  publisher    = {{IEEE}},
  year         = {2013}
}
@proceedings{DBLP:conf/fc/2013,
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  publisher    = {Springer},
  year         = {2013}
}
@proceedings{DBLP:conf/fc/2013w,
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  publisher    = {Springer},
  year         = {2013}
}
@article{DBLP:journals/ijmms/LeeRNFJ12,
  author       = {Jong{-}Eun Roselyn Lee and
                  Shailendra Rao and
                  Clifford Nass and
                  Karin Forssell and
                  Jae Min John},
  title        = {When do online shoppers appreciate security enhancement efforts? Effects
                  of financial risk and security level on evaluations of customer authentication},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {70},
  number       = {5},
  pages        = {364--376},
  year         = {2012}
}
@article{DBLP:journals/irmj/ZafarKO12,
  author       = {Humayun Zafar and
                  Myung Ko and
                  Kweku{-}Muata Osei{-}Bryson},
  title        = {Financial Impact of Information Security Breaches on Breached Firms
                  and their Non-Breached Competitors},
  journal      = {Inf. Resour. Manag. J.},
  volume       = {25},
  number       = {1},
  pages        = {21--37},
  year         = {2012}
}
@inproceedings{DBLP:conf/amcis/LampeWMS12,
  author       = {Ulrich Lampe and
                  Olga Wenge and
                  Alexander M{\"{u}}ller and
                  Ralf Schaarschmidt},
  title        = {Cloud Computing in the Financial Industry - {A} Road Paved with Security
                  Pitfalls?},
  booktitle    = {{AMCIS}},
  publisher    = {Association for Information Systems},
  year         = {2012}
}
@inproceedings{DBLP:conf/fc/BenderDFK12,
  author       = {Jens Bender and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  title        = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents,
                  and Its Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {344--358},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/fc/Bohme12,
  author       = {Rainer B{\"{o}}hme},
  title        = {Security Audits Revisited},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {129--147},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/fc/BonneauPA12,
  author       = {Joseph Bonneau and
                  S{\"{o}}ren Preibusch and
                  Ross J. Anderson},
  title        = {A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen
                  Banking PINs},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {25--40},
  publisher    = {Springer},
  year         = {2012}
}
@proceedings{DBLP:conf/fc/2011,
  editor       = {George Danezis},
  title        = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  publisher    = {Springer},
  year         = {2012}
}
@proceedings{DBLP:conf/fc/2011w,
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  publisher    = {Springer},
  year         = {2012}
}
@proceedings{DBLP:conf/fc/2012,
  editor       = {Angelos D. Keromytis},
  title        = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  publisher    = {Springer},
  year         = {2012}
}
@proceedings{DBLP:conf/fc/2012w,
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  publisher    = {Springer},
  year         = {2012}
}
@inproceedings{DBLP:conf/fc/AycockBDD11,
  author       = {John Aycock and
                  Elizabeth Buchanan and
                  Scott D. Dexter and
                  David Dittrich},
  title        = {Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer
                  Security Research},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {138--145},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/fc/ChiaK11,
  author       = {Pern Hui Chia and
                  Svein Johan Knapskog},
  title        = {Re-evaluating the Wisdom of Crowds in Assessing Web Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {299--314},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/fc/ChristinEVG11,
  author       = {Nicolas Christin and
                  Serge Egelman and
                  Timothy Vidas and
                  Jens Grossklags},
  title        = {It's All about the Benjamins: An Empirical Study on Incentivizing
                  Users to Ignore Security Advice},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/fc/JohnsonBK11,
  author       = {Maritza L. Johnson and
                  Steven M. Bellovin and
                  Angelos D. Keromytis},
  title        = {Computer Security Research with Human Subjects: Risks, Benefits and
                  Informed Consent},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {131--137},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/fc/NovakSMH11,
  author       = {Jay Novak and
                  Jonathan Stribley and
                  Kenneth Meagher and
                  J. Alex Halderman},
  title        = {Absolute Pwnage: {A} Short Paper about the Security Risks of Remote
                  Administration Tools},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {77--84},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/fc/PlotzN11,
  author       = {Henryk Pl{\"{o}}tz and
                  Karsten Nohl},
  title        = {Peeling Away Layers of an {RFID} Security System},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/fc/RobinsonH11,
  author       = {David G. Robinson and
                  J. Alex Halderman},
  title        = {Ethical Issues in E-Voting Security Analysis},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/ichit/BaekP11,
  author       = {Jong{-}Il Baek and
                  Dea{-}Woo Park},
  title        = {A Study of Disaster Preparedness Systems Operations Analysis and Financial
                  Security Measures of Large Banking Network},
  booktitle    = {{ICHIT} {(2)}},
  series       = {Communications in Computer and Information Science},
  volume       = {206},
  pages        = {167--173},
  publisher    = {Springer},
  year         = {2011}
}
@inproceedings{DBLP:conf/fc/BarthRSMSB10,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Song and
                  Peter L. Bartlett},
  title        = {A Learning-Based Approach to Reactive Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/Caballero-GilMCH10,
  author       = {Pino Caballero{-}Gil and
                  Jezabel Molina{-}Gil and
                  C{\'{a}}ndido Caballero{-}Gil and
                  Candelaria Hern{\'{a}}ndez{-}Goya},
  title        = {Poster Abstract: Security in Commercial Applications of Vehicular
                  Ad-Hoc Networks},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {427},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/Cranor10,
  author       = {Lorrie Faith Cranor},
  title        = {Users Do the Darndest Things: True Stories from the CyLab Usable Privacy
                  and Security Laboratory},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {3},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/Cranor10a,
  author       = {Lorrie Faith Cranor},
  title        = {Ethical Concerns in Computer Security and Privacy Research Involving
                  Human Subjects},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {247--249},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/Fleischmann10,
  author       = {Kenneth R. Fleischmann},
  title        = {Preaching What We Practice: Teaching Ethical Decision-Making to Computer
                  Security Professionals},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {197--202},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/GrossklagsJC10,
  author       = {Jens Grossklags and
                  Benjamin Johnson and
                  Nicolas Christin},
  title        = {When Information Improves Information Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {416--423},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/Hubaux10,
  author       = {Jean{-}Pierre Hubaux},
  title        = {Security Mechanisms with Selfish Players in Wireless Networks},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {2},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/KenneallyBM10,
  author       = {Erin Kenneally and
                  Michael D. Bailey and
                  Douglas Maughan},
  title        = {A Framework for Understanding and Applying Ethical Principles in Network
                  and Security Research},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {240--246},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/MatsuoMOB10,
  author       = {Shin'ichiro Matsuo and
                  Kunihiko Miyazaki and
                  Akira Otsuka and
                  David A. Basin},
  title        = {How to Evaluate the Security of Real-Life Cryptographic Protocols?
                  - The Cases of {ISO/IEC} 29128 and {CRYPTREC}},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/RuhrmairJHACS10,
  author       = {Ulrich R{\"{u}}hrmair and
                  Christian Jaeger and
                  Christian Hilgers and
                  Michael Algasinger and
                  Gy{\"{o}}rgy Csaba and
                  Martin Stutzmann},
  title        = {Security Applications of Diodes with Unique Current-Voltage Characteristics},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {328--335},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/fc/Sassaman10,
  author       = {Len Sassaman},
  title        = {Ethical Guidelines for Computer Security Researchers: "Be Reasonable"},
  booktitle    = {Financial Cryptography Workshops},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {250--255},
  publisher    = {Springer},
  year         = {2010}
}
@inproceedings{DBLP:conf/iceis/BaldoniLCDMM10,
  author       = {Roberto Baldoni and
                  Giorgia Lodi and
                  Gregory V. Chockler and
                  Eliezer Dekel and
                  Barry P. Mulcahy and
                  Giuseppe Martufi},
  title        = {A Contract-based Event Driven Model for Collaborative Security in
                  Financial Information Systems},
  booktitle    = {{ICEIS} {(4)}},
  pages        = {147--152},
  publisher    = {SciTePress},
  year         = {2010}
}
@incollection{DBLP:series/natosec/Bollag10,
  author       = {Josef Bollag},
  title        = {World Financial Crisis and its Influence on Terror Financing},
  booktitle    = {Web Intelligence and Security - Advances in Data and Text Mining Techniques
                  for Detecting and Preventing Terrorist Activities on the Web},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {27},
  pages        = {13--18},
  publisher    = {{IOS} Press},
  year         = {2010}
}
@proceedings{DBLP:conf/fc/2010,
  editor       = {Radu Sion},
  title        = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  publisher    = {Springer},
  year         = {2010}
}
@proceedings{DBLP:conf/fc/2010w,
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  publisher    = {Springer},
  year         = {2010}
}
@book{DBLP:reference/crc/2010fcs,
  editor       = {Burton Rosenberg},
  title        = {Handbook of Financial Cryptography and Security},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Barni010,
  author       = {Mauro Barni and
                  Stefan Katzenbeisser},
  title        = {Digital Watermarking},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {391--435},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Belenkiy10,
  author       = {Mira Belenkiy},
  title        = {E-Cash},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {3--48},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Brandt10,
  author       = {Felix Brandt},
  title        = {Auctions},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {49--58},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Coventry10,
  author       = {Lynne M. Coventry},
  title        = {Human Factors},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {497--519},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/DanezisDS10,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Paul F. Syverson},
  title        = {Anonymous Communication},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {341--389},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/DashtiM10,
  author       = {Mohammad Torabi Dashti and
                  Sjouke Mauw},
  title        = {Fair Exchange},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {109--132},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Ellison10,
  author       = {Carl M. Ellison},
  title        = {Public Key Infrastructure},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {455--493},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Jackson10,
  author       = {Margaret Jackson},
  title        = {Legal Issues},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {521--554},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/JakobssonSS10,
  author       = {Markus Jakobsson and
                  Sid Stamm and
                  Christopher Soghoian},
  title        = {Phishing},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {301--339},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Kiayias10,
  author       = {Aggelos Kiayias},
  title        = {Electronic Voting},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {59--81},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Parhonyi10,
  author       = {R{\'{o}}bert P{\'{a}}rhonyi},
  title        = {Micropayment Systems},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {163--191},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Pehlivanoglu10,
  author       = {Serdar Pehlivanoglu},
  title        = {Broadcast and Content Distribution},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {133--159},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/SadeghiW10,
  author       = {Ahmad{-}Reza Sadeghi and
                  Christian Wachsmann},
  title        = {Trusted Computing},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {221--256},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Safavi-NainiS10,
  author       = {Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard},
  title        = {Digital Rights Management},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {193--220},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/SionW10,
  author       = {Radu Sion and
                  Marianne Winslett},
  title        = {Regulatory Compliance},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {555--584},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Smith10,
  author       = {Sean Smith},
  title        = {Hardware Security Modules},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {257--278},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Szydlo10,
  author       = {Michael Szydlo},
  title        = {Portfolio Trading},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {279--297},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Wilton10,
  author       = {Robin Wilton},
  title        = {Identity Management},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {437--453},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@incollection{DBLP:reference/crc/Zhou10,
  author       = {Jianying Zhou},
  title        = {Non-Repudiation},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {83--108},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010}
}
@article{DBLP:journals/ijisp/Ifinedo09,
  author       = {Princely Ifinedo},
  title        = {Information Technology Security Concerns in Global Financial Services
                  Institutions: Do Socio-Economic Factors Differentiate Perceptions?},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {68--83},
  year         = {2009}
}
@article{DBLP:journals/imcs/Ifinedo09,
  author       = {Princely Ifinedo},
  title        = {Information technology security management concerns in global financial
                  services institutions: Is national culture a differentiator?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {372--387},
  year         = {2009}
}
@article{DBLP:journals/riga/KryukovS09,
  author       = {Dmitry Kryukov and
                  Raimonds Strauss},
  title        = {Information security governance as key performance indicator for financial
                  institutions},
  journal      = {Sci. J. Riga Tech. Univ. Ser. Comput. Sci.},
  volume       = {38},
  pages        = {161--167},
  year         = {2009}
}
@inproceedings{DBLP:conf/amcis/ZafarA09,
  author       = {Humayun Zafar and
                  Yoris A. Au},
  title        = {The Economic Ramifications of Strategic {IT} Security Information
                  Sharing in the Financial Services Industry},
  booktitle    = {{AMCIS}},
  pages        = {281},
  publisher    = {Association for Information Systems},
  year         = {2009}
}
@inproceedings{DBLP:conf/fc/FultzG09,
  author       = {Neal Fultz and
                  Jens Grossklags},
  title        = {Blue versus Red: Towards a Model of Distributed Security Attacks},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {167--183},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/fc/IoannidisPW09,
  author       = {Christos Ioannidis and
                  David J. Pym and
                  Julian Williams},
  title        = {Investments and Trade-offs in the Economics of Information Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {148--166},
  publisher    = {Springer},
  year         = {2009}
}
@inproceedings{DBLP:conf/interaction/SaghafiNE09,
  author       = {Fatemeh Saghafi and
                  Fatemeh NasserEslami and
                  Maryam Esmaili},
  title        = {Ranking secure technologies in security provision financial transactions
                  mobile commerce},
  booktitle    = {{ICIS}},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {403},
  pages        = {331--336},
  publisher    = {{ACM}},
  year         = {2009}
}
@proceedings{DBLP:conf/fc/2009,
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  publisher    = {Springer},
  year         = {2009}
}
@article{DBLP:journals/isjgp/SingletonS08,
  author       = {Tommie W. Singleton and
                  Aaron J. Singleton},
  title        = {The Potential for a Synergistic Relationship Between Information Security
                  and a Financial Audit},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {17},
  number       = {2},
  pages        = {80--86},
  year         = {2008}
}
@article{DBLP:journals/kybernetes/HuangWZ08,
  author       = {Xiangzhao Huang and
                  Hu Wan and
                  Hongtao Zhou},
  title        = {The synergetic model of the controlling tactics to network financial
                  information security},
  journal      = {Kybernetes},
  volume       = {37},
  number       = {9/10},
  pages        = {1393--1400},
  year         = {2008}
}
@inproceedings{DBLP:conf/fc/HuangD08,
  author       = {Ken Huang and
                  Paul Douthit},
  title        = {ST{\&}E Is the Most Cost Effective Measure for Comply with Payment
                  Card Industry {(PCI)} Data Security Standard},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {321--322},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/isse/FibikovaM08,
  author       = {Lenka Fib{\'{\i}}kov{\'{a}} and
                  Roland M{\"{u}}ller},
  title        = {The Information Security Framework for Daimler Financial Services
                  and its Implementation},
  booktitle    = {{ISSE}},
  pages        = {3--19},
  publisher    = {Vieweg+Teubner},
  year         = {2008}
}
@inproceedings{DBLP:conf/pst/Ifinedo08,
  author       = {Princely Ifinedo},
  title        = {{IT} Security and Privacy Issues in Global Financial Services Institutions:
                  Do Socio-Economic and Cultural Factors Matter?},
  booktitle    = {{PST}},
  pages        = {75--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@inproceedings{DBLP:conf/wkdd/XiaBP08,
  author       = {Bin Xia and
                  Hui Bai and
                  Bin Pan},
  title        = {Research of Information Technology Security in the Financial Industry},
  booktitle    = {{WKDD}},
  pages        = {477--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2008}
}
@proceedings{DBLP:conf/fc/2007,
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  publisher    = {Springer},
  year         = {2008}
}
@proceedings{DBLP:conf/fc/2008,
  editor       = {Gene Tsudik},
  title        = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  publisher    = {Springer},
  year         = {2008}
}
@inproceedings{DBLP:conf/fc/AsgharpourLC07,
  author       = {Farzaneh Asgharpour and
                  Debin Liu and
                  L. Jean Camp},
  title        = {Mental Models of Security Risks},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {367--377},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/fc/Desmedt07,
  author       = {Yvo Desmedt},
  title        = {Position Statement in {RFID} S{\&}P Panel: From Relative Security
                  to Perceived Secure},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {53--56},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/fc/Fu07,
  author       = {Kevin Fu},
  title        = {Panel: {RFID} Security and Privacy},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {45},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/fc/Jutla07,
  author       = {Dawn N. Jutla},
  title        = {Usable {SPACE:} Security, Privacy, and Context for the Mobile User},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {245},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/fc/KuoWP07,
  author       = {Cynthia Kuo and
                  Jesse Walker and
                  Adrian Perrig},
  title        = {Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth
                  Simple Pairing and Wi-Fi Protected Setup},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {325--340},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/fc/MitchellK07,
  author       = {April Slayden Mitchell and
                  Alan H. Karp},
  title        = {Improving Usability by Adding Security to Video Conferencing Systems},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {378--382},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/fc/PagterP07,
  author       = {Jakob Illeborg Pagter and
                  Marianne Graves Petersen},
  title        = {A Sense of Security in Pervasive Computing - Is the Light on When
                  the Refrigerator Door Is Closed?},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {383--388},
  publisher    = {Springer},
  year         = {2007}
}
@article{DBLP:journals/tele/ChangHYH06,
  author       = {I{-}Chiu Chang and
                  Hsin{-}Ginn Hwang and
                  David C. Yen and
                  Hen{-}Yi Huang},
  title        = {An empirical study of the factors affecting Internet security for
                  the financial industry in Taiwan},
  journal      = {Telematics Informatics},
  volume       = {23},
  number       = {4},
  pages        = {343--364},
  year         = {2006}
}
@proceedings{DBLP:conf/fc/2006,
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  publisher    = {Springer},
  year         = {2006}
}
@article{DBLP:journals/imcs/KeshR05,
  author       = {Someswar Kesh and
                  M. K. Raja},
  title        = {Development of a qualitative reasoning model for financial forecasting},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {167--179},
  year         = {2005}
}
@inproceedings{DBLP:conf/ecis/Locher05,
  author       = {Christian Locher},
  title        = {Methodologies for Evaluating Information Security Investments - What
                  Basel {II} Can Change in the Financial Industry},
  booktitle    = {{ECIS}},
  pages        = {1561--1572},
  year         = {2005}
}
@inproceedings{DBLP:conf/fc/Friedman05,
  author       = {Allan Friedman},
  title        = {Panel Summary: Incentives, Markets and Information Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {372--373},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/fc/TuylsSSAO05,
  author       = {Pim Tuyls and
                  Boris Skoric and
                  S. Stallinga and
                  Anton H. M. Akkermans and
                  W. Ophey},
  title        = {Information-Theoretic Security Analysis of Physical Uncloneable Functions},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/icete/Ghernaouti-Helie05,
  author       = {Solange Ghernaouti{-}Helie and
                  Mohamed Ali Sfaxi},
  title        = {Guaranteerring Security of Financial Transaction by Using Quantum
                  Cryptography in Banking Environment},
  booktitle    = {{ICETE} (Selected Papers)},
  series       = {Communications in Computer and Information Science},
  volume       = {3},
  pages        = {139--149},
  year         = {2005}
}
@inproceedings{DBLP:conf/icete/Ghernaouti-HelieS05,
  author       = {Solange Ghernaouti{-}Helie and
                  Mohamed Ali Sfaxi},
  title        = {Guaranteerring security of financial transaction by using quantum
                  cryptography in banking environment},
  booktitle    = {{ICETE}},
  pages        = {268--274},
  publisher    = {{INSTICC} Press},
  year         = {2005}
}
@inproceedings{DBLP:conf/issa/Baloyi05,
  author       = {Norman Tinyiko Baloyi},
  title        = {Analysis of the financial institutions' strategic e-business security
                  solutions: Technical and non-Technical},
  booktitle    = {{ISSA}},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005}
}
@incollection{DBLP:books/sp/05/PietruszkiewiczR05,
  author       = {Wieslaw Pietruszkiewicz and
                  Leonard Rozenberg},
  title        = {Financial Distress Prediction Using Different Pattern Recognition
                  Methods},
  booktitle    = {Information Processing and Security Systems},
  pages        = {103--111},
  publisher    = {Springer},
  year         = {2005}
}
@proceedings{DBLP:conf/fc/2005,
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  publisher    = {Springer},
  year         = {2005}
}
@inproceedings{DBLP:conf/ACMicec/AgrawalPPRU04,
  author       = {Manish Agrawal and
                  Hemant Padmanabhan and
                  Lokesh Pandey and
                  H. Raghav Rao and
                  Shambhu J. Upadhyaya},
  title        = {A conceptual approach to information security in financial account
                  aggregation},
  booktitle    = {{ICEC}},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {60},
  pages        = {619--626},
  publisher    = {{ACM}},
  year         = {2004}
}
@inproceedings{DBLP:conf/fc/Camp04,
  author       = {L. Jean Camp},
  title        = {Mental Models of Computer Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {106--111},
  publisher    = {Springer},
  year         = {2004}
}
@inproceedings{DBLP:conf/fc/Patrick04,
  author       = {Andrew S. Patrick},
  title        = {Usability and Acceptability of Biometric Security Systems},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {105},
  publisher    = {Springer},
  year         = {2004}
}
@inproceedings{DBLP:conf/fc/Pugh04,
  author       = {Simon Pugh},
  title        = {PayPass Security and Risk (Abstract)},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {70--71},
  publisher    = {Springer},
  year         = {2004}
}
@inproceedings{DBLP:conf/fc/Yurick04,
  author       = {William Yurcik},
  title        = {Visualization Tools for Security Administrators},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {112--113},
  publisher    = {Springer},
  year         = {2004}
}
@article{DBLP:journals/ijstm/Shoniregun03,
  author       = {Charles A. Shoniregun},
  title        = {Are existing internet security measures guaranteed to protect user
                  identity in the financial services industry?},
  journal      = {Int. J. Serv. Technol. Manag.},
  volume       = {4},
  number       = {2},
  pages        = {194--216},
  year         = {2003}
}
@article{DBLP:journals/imcs/GargCH03,
  author       = {Ashish Garg and
                  Jeffrey Curtis and
                  Hilary Halper},
  title        = {Quantifying the financial impact of {IT} security breaches},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {74--83},
  year         = {2003}
}
@article{DBLP:journals/isjgp/GargCH03,
  author       = {Ashish Garg and
                  Jeffrey Curtis and
                  Hilary Halper},
  title        = {The Financial Impact of {IT} Security Breaches: What Do Investors
                  Think?},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {12},
  number       = {1},
  pages        = {22--33},
  year         = {2003}
}
@inproceedings{DBLP:conf/fc/Odlyzko03a,
  author       = {Andrew M. Odlyzko},
  title        = {Economics, Psychology, and Sociology of Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {182--189},
  publisher    = {Springer},
  year         = {2003}
}
@inproceedings{DBLP:conf/fc/SchechterS03,
  author       = {Stuart E. Schechter and
                  Michael D. Smith},
  title        = {How Much Security Is Enough to Stop a Thief?: The Economics of Outsider
                  Theft via Computer Systems and Networks},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2003}
}
@inproceedings{DBLP:conf/wsc/Mayhew02,
  author       = {Stewart Mayhew},
  title        = {Problems in financial engineering: security price dynamics and simulation
                  in financial engineering},
  booktitle    = {{WSC}},
  pages        = {1568--1574},
  publisher    = {{WSC}},
  year         = {2002}
}
@inproceedings{DBLP:conf/fc/BellareNPS01,
  author       = {Mihir Bellare and
                  Chanathip Namprempre and
                  David Pointcheval and
                  Michael Semanko},
  title        = {The Power of {RSA} Inversion Oracles and the Security of Chaum's RSA-Based
                  Blind Signature Scheme},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {309--328},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/fc/JaulmesP01,
  author       = {{\'{E}}liane Jaulmes and
                  Guillaume Poupard},
  title        = {On the Security of Homage Group Authentication Protocol},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {97--107},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/fc/Kravitz01,
  author       = {David W. Kravitz},
  title        = {Aspects of Digital Rights Management and the Use of Hardware Security
                  Devices},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {45--49},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/fc/Tsiounis01,
  author       = {Yiannis Tsiounis},
  title        = {A Security Framework for Card-Based Systems},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {201--222},
  publisher    = {Springer},
  year         = {2001}
}
@inproceedings{DBLP:conf/fc/Jolish00,
  author       = {Barak D. Jolish},
  title        = {The Encryption Debate in Plaintext: National Security and Encryption
                  in the United States and Israel},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {202--224},
  publisher    = {Springer},
  year         = {2000}
}
@inproceedings{DBLP:conf/fc/Zane00,
  author       = {Francis Zane},
  title        = {Efficient Watermark Detection and Collusion Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2000}
}
@inproceedings{DBLP:conf/icis/GuptaCMV00,
  author       = {Mukul Gupta and
                  Alok R. Chaturvedi and
                  Shailendra Raj Mehta and
                  Lorenzo Valeri},
  title        = {The experimental analysis of information security management issues
                  for online financial services},
  booktitle    = {{ICIS}},
  pages        = {667--675},
  publisher    = {Association for Information Systems},
  year         = {2000}
}
@inproceedings{DBLP:conf/ifip11-1/Stanley99,
  author       = {Terry Stanley},
  title        = {Designing a Secure System for Implementing Chip Cards in the Financial
                  Services Industry},
  booktitle    = {Conference on Information Security Management {\&} Small Systems
                  Security},
  series       = {{IFIP} Conference Proceedings},
  volume       = {154},
  pages        = {213--220},
  publisher    = {Kluwer},
  year         = {1999}
}
@inproceedings{DBLP:conf/fc/MathesonMSTZ98,
  author       = {Lesley R. Matheson and
                  Stephen G. Mitchell and
                  Talal Shamoon and
                  Robert Endre Tarjan and
                  Francis Zane},
  title        = {Robustness and Security of Digital Watermarks},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {227--240},
  publisher    = {Springer},
  year         = {1998}
}
@inproceedings{DBLP:conf/fc/FranklinM97,
  author       = {Matthew K. Franklin and
                  Dahlia Malkhi},
  title        = {Auditable Metering with Lightweight Security},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {151--160},
  publisher    = {Springer},
  year         = {1997}
}
@inproceedings{DBLP:conf/fc/Goldstein97,
  author       = {Theodore C. Goldstein},
  title        = {The Gateway Security Model in the Java Electronic Commerce Framework},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {1997}
}
@inproceedings{DBLP:conf/fc/Lelieveldt97,
  author       = {Simon L. Lelieveldt},
  title        = {Evaluating the Security of Electronic Money},
  booktitle    = {Financial Cryptography},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {91--94},
  publisher    = {Springer},
  year         = {1997}
}
@inproceedings{DBLP:conf/lisa/Geer94,
  author       = {Daniel E. Geer Jr.},
  title        = {Breaking into Banks: Security Lessons Learned from Financial Services},
  booktitle    = {{LISA}},
  publisher    = {{USENIX}},
  year         = {1994}
}
@article{DBLP:journals/clsr/X93cl,
  title        = {Controlling computer security: {A} guide for financial institutions:
                  by James Essinger {(FT} Business Information Ltd, 1992 {ISBN} 1-85334-163-0)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {226},
  year         = {1993}
}
@article{DBLP:journals/clsr/X92aq,
  title        = {Information security in financial services: by Ken Slater, 1991 (Hardcover)(MacMillan
                  - Stockton Press), 275 pp, {ISBN} 0-333-54702-0},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {8},
  number       = {4},
  pages        = {165},
  year         = {1992}
}
@article{DBLP:journals/cryptologia/GaronO91,
  author       = {Gilles Garon and
                  Richard Outerbridge},
  title        = {Des Watch: an Examination of the Sufficiency of the Data Encryption
                  Standard for Financial Institution Information Security in the 1990's},
  journal      = {Cryptologia},
  volume       = {15},
  number       = {3},
  pages        = {177--193},
  year         = {1991}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics