![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "financial security"
@article{DBLP:journals/csse/LiWFZZ24, author = {Xiaonan Li and Qiang Wang and Conglai Fan and Wei Zhan and Mingliang Zhang}, title = {A New Malicious Code Classification Method for the Security of Financial Software}, journal = {Comput. Syst. Sci. Eng.}, volume = {48}, number = {3}, pages = {773--792}, year = {2024} }
@article{DBLP:journals/tcss/JiangWZNL24, author = {Changjun Jiang and Fei{-}Yue Wang and Mengchu Zhou and Asoke K. Nandi and Guanjun Liu}, title = {Guest Editorial: Special Issue on Big Data and Computational Social Intelligence for Guaranteed Financial Security}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {2}, pages = {1551--1555}, year = {2024} }
@article{DBLP:journals/tcss/ZhaoHLMW24, author = {Qin Zhao and Jingyi Huang and Gang Liu and Yaru Miao and Pengwei Wang}, title = {A Multiinterest and Social Interest-Field Framework for Financial Security}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {2}, pages = {1685--1695}, year = {2024} }
@proceedings{DBLP:conf/fc/2023-1, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13950}, publisher = {Springer}, year = {2024} }
@proceedings{DBLP:conf/fc/2023-2, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13951}, publisher = {Springer}, year = {2024} }
@proceedings{DBLP:conf/fc/2023w, editor = {Aleksander Essex and Shin'ichiro Matsuo and Oksana Kulyk and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez and Sam Werner and Andrea Bracciali and Geoff Goodell}, title = {Financial Cryptography and Data Security. {FC} 2023 International Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia, May 5, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13953}, publisher = {Springer}, year = {2024} }
@article{DBLP:journals/cejcs/Wang23, author = {Yanzhao Wang}, title = {Intelligent cluster construction of internet financial security protection system in banking industry}, journal = {Open Comput. Sci.}, volume = {13}, number = {1}, year = {2023} }
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23, author = {Julija Gavenaite{-}Sirvydiene and Algita Miecinskiene}, title = {The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {497--518}, year = {2023} }
@article{DBLP:journals/jsan/SaqibA23, author = {Nazar Abbas Saqib and Shahad Talla AL{-}Talla}, title = {Scaling Up Security and Efficiency in Financial Transactions and Blockchain Systems}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {2}, pages = {31}, year = {2023} }
@article{DBLP:journals/sap/Yu23, author = {Haiping Yu}, title = {Application of blockchain technology in the data processing security system of financial enterprises}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023} }
@article{DBLP:journals/sncs/DansoMGDS23, author = {Juliana Mantebea Danso and Yaw Marfo Missah and Enoch Opanin Gyamfi and Stephen Dankwa and Kwabena Sarpong}, title = {Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {2}, pages = {124}, year = {2023} }
@inproceedings{DBLP:conf/bde/Ji23, author = {Wenjun Ji}, title = {Research and analysis of the security risk management strategy of big data technology in the financial industry}, booktitle = {{BDE}}, pages = {67--72}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/ccece/RazaviJEAH23, author = {Hooman Razavi and Mohammad Reza Jamali and Morvaridsadat Emsaki and Ali Ahmadi and Mostafa Hajiaghaei{-}Keshteli}, title = {Quantifying the Financial Impact of Cyber Security Attacks on Banks: {A} Big Data Analytics Approach}, booktitle = {{CCECE}}, pages = {533--538}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/cpits/KavunLKLL23, author = {Sergii Kavun and Ruslana Levkina and Yana Kotko and Dmytro Levkin and Artur Levkin}, title = {Information Security in Project Management for the Financial and Budgetary Capacity of the National Economy (short paper)}, booktitle = {{CPITS} {II}}, series = {{CEUR} Workshop Proceedings}, volume = {3550}, pages = {246--254}, publisher = {CEUR-WS.org}, year = {2023} }
@inproceedings{DBLP:conf/eurousec/MehrnezhadA23, author = {Maryam Mehrnezhad and Teresa Almeida}, title = {"My sex-related data is more sensitive than my financial data and {I} want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies}, booktitle = {EuroUSEC}, pages = {1--14}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/iccsci/NurmaraHAJSKI23, author = {Muhammad Azril Kurniawan Nurmara and Muhammad Naufal Hakim and Oey Hans Christian Ardy and Reynaldo Jeffrey and Vincentius Albert Setiono and Bayu Kanigoro and Edy Irwansyah}, title = {A Review of Security in Financial Technology}, booktitle = {{ICCSCI}}, series = {Procedia Computer Science}, volume = {227}, pages = {958--965}, publisher = {Elsevier}, year = {2023} }
@inproceedings{DBLP:conf/iccsie/YeWWWYT23, author = {Xin Ye and Shimin Wang and Han Wang and Qinwei Wei and Ting Yang and Yu Tao}, title = {Application of Knowledge Graph in Financial Information Security Strategy}, booktitle = {{ICCSIE}}, pages = {188--192}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/icfnds/BurkhanovTUINA23, author = {Aktam Usmanovich Burkhanov and Bobur Ortikmirzaevich Tursunov and Khusniddin Fakhriddinovich Uktamov and Jamshidxon Odilovich Imomov and Jasur Tursunpulotovich Nosirov and Barno Akbarova}, title = {Ways and Prospects of Rational Use of Production Capacity in Ensuring Financial Security in Textile Enterprises In The Conditions of Digital Economy Transformation}, booktitle = {{ICFNDS}}, pages = {234--242}, publisher = {{ACM}}, year = {2023} }
@inproceedings{DBLP:conf/icitjo/ShalabiAA23, author = {Khawla Shalabi and Mustafa Al{-}Fayoumi and Qasem Abu Al{-}Haija}, title = {Enhancing Financial System Resilience Against Cyber Threats via {SWIFT} Customer Security Framework}, booktitle = {{ICIT}}, pages = {260--265}, publisher = {{IEEE}}, year = {2023} }
@inproceedings{DBLP:conf/uss/BelliniLBSBR23, author = {Rosanna Bellini and Kevin Lee and Megan A. Brown and Jeremy Shaffer and Rasika Bhalerao and Thomas Ristenpart}, title = {The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence}, booktitle = {{USENIX} Security Symposium}, pages = {87--104}, publisher = {{USENIX} Association}, year = {2023} }
@inproceedings{DBLP:conf/uss/WangHMXMFTJ23, author = {Wansen Wang and Wenchao Huang and Zhaoyi Meng and Yan Xiong and Fuyou Miao and Xianjin Fang and Caichang Tu and Renjie Ji}, title = {Automated Inference on Financial Security of Ethereum Smart Contracts}, booktitle = {{USENIX} Security Symposium}, pages = {3367--3383}, publisher = {{USENIX} Association}, year = {2023} }
@proceedings{DBLP:conf/fc/2022w, editor = {Shin'ichiro Matsuo and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez Hernandez and Sam Werner and Thomas Haines and Aleksander Essex and Andrea Bracciali and Massimiliano Sala}, title = {Financial Cryptography and Data Security. {FC} 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13412}, publisher = {Springer}, year = {2023} }
@article{DBLP:journals/corr/abs-2306-05956, author = {Maryam Mehrnezhad and Teresa Almeida}, title = {"My sex-related data is more sensitive than my financial data and {I} want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies}, journal = {CoRR}, volume = {abs/2306.05956}, year = {2023} }
@article{DBLP:journals/corr/abs-2310-18668, author = {Prof N. Jeenath Laila and Dr G. Tamilpavai}, title = {FinBTech: Blockchain-Based Video and Voice Authentication System for Enhanced Security in Financial Transactions Utilizing FaceNet512 and Gaussian Mixture Models}, journal = {CoRR}, volume = {abs/2310.18668}, year = {2023} }
@phdthesis{DBLP:phd/dnb/Maikowski22, author = {Alfons Michael Maikowski}, title = {Why do financial institutions implement blockchain technology in security settlement?: {A} conceptual framework for blockchain business cases}, school = {Technical University of Berlin, Germany}, year = {2022} }
@article{DBLP:journals/ijahuc/SunWZ22, author = {Qi Sun and Hong Wu and Binglong Zhao}, title = {Artificial intelligence technology in internet financial edge computing and analysis of security risk}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {39}, number = {4}, pages = {201--210}, year = {2022} }
@article{DBLP:journals/ijguc/ZhouW22, author = {Xiuying Zhou and Huaqun Weng}, title = {Assessing information security performance of enterprise internal financial sharing in cloud computing environment using analytic hierarchy process}, journal = {Int. J. Grid Util. Comput.}, volume = {13}, number = {2/3}, pages = {256--271}, year = {2022} }
@article{DBLP:journals/ijinfomandi/AmponsahAW22, author = {Anokye Acheampong Amponsah and Adebayo Felix Adekoya and Benjamin Asubam Weyori}, title = {Improving the Financial Security of National Health Insurance using Cloud-Based Blockchain Technology Application}, journal = {Int. J. Inf. Manag. Data Insights}, volume = {2}, number = {1}, pages = {100081}, year = {2022} }
@article{DBLP:journals/ijis/ShiZZDLL22, author = {Hongfang Shi and Wenying Zhang and Zimin Zhang and Dewen Ding and Huimin Liu and Hong Lei}, title = {Understanding digit-only financial account passwords: {ID} card, structure, and security}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {11}, pages = {8635--8652}, year = {2022} }
@article{DBLP:journals/imcs/KwatengAT22, author = {Kwame Owusu Kwateng and Christopher Amanor and Francis Kamewor Tetteh}, title = {Enterprise risk management and information technology security in the financial sector}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {422--451}, year = {2022} }
@article{DBLP:journals/jeim/TayaksiAKS22, author = {Cansu Tayaksi and Erhan Ada and Yigit Kazan{\c{c}}oglu and Muhittin Sagnak}, title = {The financial impacts of information systems security breaches on publicly traded companies: reactions of different sectors}, journal = {J. Enterp. Inf. Manag.}, volume = {35}, number = {2}, pages = {650--668}, year = {2022} }
@article{DBLP:journals/jgim/WuSWL22, author = {Wenqing Wu and Kun Shi and Chia{-}Huei Wu and Jiayue Liu}, title = {Research on the Impact of Information Security Certification and Concealment on Financial Performance: Impact of {ISO} 27001 and Concealment on Performance}, journal = {J. Glob. Inf. Manag.}, volume = {30}, number = {3}, pages = {1--16}, year = {2022} }
@article{DBLP:journals/smr/QasaimehHYATL22, author = {Malik Qasaimeh and Rand Abu Hammour and Muneer O. Bani Yassein and Raad S. Al{-}Qassas and Juan Alfonso Lara Torralbo and David Lizcano}, title = {Advanced security testing using a cyber-attack forecasting model: {A} case study of financial institutions}, journal = {J. Softw. Evol. Process.}, volume = {34}, number = {11}, year = {2022} }
@article{DBLP:journals/systems/DengZDFL22, author = {Shangkun Deng and Yingke Zhu and Shuangyang Duan and Zhe Fu and Zonghua Liu}, title = {Stock Price Crash Warning in the Chinese Security Market Using a Machine Learning-Based Method and Financial Indicators}, journal = {Syst.}, volume = {10}, number = {4}, pages = {108}, year = {2022} }
@inproceedings{DBLP:conf/bigdataconf/LiF22, author = {Yueqi Li and Ingrid Fisher}, title = {Digital Financial Literacy, Risk Aversion, and College Students' Online Security Behavior}, booktitle = {{IEEE} Big Data}, pages = {4807--4811}, publisher = {{IEEE}}, year = {2022} }
@inproceedings{DBLP:conf/bisec/MircevskiPAS22, author = {Julijana Mircevski and Nikola B. Popovic and Mirjana Andric and Branko Stanojev}, title = {Security of Financial Software to Support Cryptocurrency Trading}, booktitle = {{BISEC}}, series = {{CEUR} Workshop Proceedings}, volume = {3529}, pages = {20--26}, publisher = {CEUR-WS.org}, year = {2022} }
@inproceedings{DBLP:conf/eitce/Liu22e, author = {Tian Liu}, title = {Research on Information Security of Enterprise Group Financial Sharing in Cloud Computing Environment}, booktitle = {{EITCE}}, pages = {1201--1207}, publisher = {{ACM}}, year = {2022} }
@inproceedings{DBLP:conf/fc/TiwariAJDDRG22, author = {Pratyush Ranjan Tiwari and Dhruv Agarwal and Prakhar Jain and Swagam Dasgupta and Preetha Datta and Vineet Reddy and Debayan Gupta}, title = {India's "Aadhaar" Biometric {ID:} Structure, Security, and Vulnerabilities}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {13411}, pages = {672--693}, publisher = {Springer}, year = {2022} }
@inproceedings{DBLP:conf/hicss/CastellanoFP22, author = {Nicola G. Castellano and Carsten Felden and Robert E. Pinsker}, title = {Shadow {IT} Behavior of Financial Executives in Germany and Italy as an Antecedent to Internal Data Security Breaches}, booktitle = {{HICSS}}, pages = {1--11}, publisher = {ScholarSpace}, year = {2022} }
@inproceedings{DBLP:conf/icfnds/Tursunov22a, author = {Bobir Tursunov}, title = {Financial Security in Small Business in period of Digital Economy: in Case of Uzbekistan}, booktitle = {{ICFNDS}}, pages = {491--498}, publisher = {{ACM}}, year = {2022} }
@inproceedings{DBLP:conf/icfnds/ZarovaT22, author = {Elena Zarova and Bobir Tursunov}, title = {Methodology for Assessing the Financial Security of Enterprises in the Post-Pandemic period of Digital Economy}, booktitle = {{ICFNDS}}, pages = {110--115}, publisher = {{ACM}}, year = {2022} }
@inproceedings{DBLP:conf/pacis/LiZX22, author = {Jin Li and Tong Zhang and Shen Xu}, title = {The Impact of Financial Restatement on Reported Data Security Breach}, booktitle = {{PACIS}}, pages = {283}, year = {2022} }
@inproceedings{DBLP:conf/pkc/FaustHKS22, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Financially Backed Covert Security}, booktitle = {Public Key Cryptography {(2)}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {99--129}, publisher = {Springer}, year = {2022} }
@proceedings{DBLP:conf/fc/2022, editor = {Ittay Eyal and Juan A. Garay}, title = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13411}, publisher = {Springer}, year = {2022} }
@article{DBLP:journals/corr/abs-2208-12960, author = {Wansen Wang and Wenchao Huang and Zhaoyi Meng and Yan Xiong and Fuyou Miao and Xianjin Fang and Caichang Tu and Renjie Ji}, title = {An Automated Analyzer for Financial Security of Ethereum Smart Contracts}, journal = {CoRR}, volume = {abs/2208.12960}, year = {2022} }
@article{DBLP:journals/dagstuhl-reports/GervaisV22, author = {Arthur Gervais and Marie Vasek}, title = {Security of Decentralized Financial Technologies (Dagstuhl Seminar 22421)}, journal = {Dagstuhl Reports}, volume = {12}, number = {10}, pages = {129--142}, year = {2022} }
@article{DBLP:journals/iam/GoelWHW21, author = {Sanjay Goel and Kevin J. Williams and Jingyi Huang and Merrill Warkentin}, title = {Can financial incentives help with the struggle for security policy compliance?}, journal = {Inf. Manag.}, volume = {58}, number = {4}, pages = {103447}, year = {2021} }
@article{DBLP:journals/ieeesp/MassacciN21, author = {Fabio Massacci and Chan Nam Ngo}, title = {Distributed Financial Exchanges: Security Challenges and Design Principles}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {54--64}, year = {2021} }
@article{DBLP:journals/ijbir/AkhtarSBV21, author = {Shahzeb Akhtar and Pratima Amol Sheorey and Sonali Bhattacharya and Ajith Kumar Vadakki Veetil}, title = {Cyber Security Solutions for Businesses in Financial Services: Challenges, Opportunities, and the Way Forward}, journal = {Int. J. Bus. Intell. Res.}, volume = {12}, number = {1}, pages = {82--97}, year = {2021} }
@article{DBLP:journals/js/QuLB21, author = {Qiao Qu and Cheng Liu and Xinzhong Bao}, title = {Financial Security Analysis of E-Commerce Platform Based on Supply Chain for Heterogeneous Network Location Verification}, journal = {J. Sensors}, volume = {2021}, pages = {1--14}, year = {2021} }
@article{DBLP:journals/mis/WeiY21, author = {Ran Wei and Sheng Yao}, title = {Enterprise Financial Risk Identification and Information Security Management and Control in Big Data Environment}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {7188327:1--7188327:6}, year = {2021} }
@article{DBLP:journals/peerj-cs/EduAA21, author = {Sampson Abeeku Edu and Mary Agoyi and Divine Quazie Agozie}, title = {Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: {FMEA} and {FTOPSIS} analysis}, journal = {PeerJ Comput. Sci.}, volume = {7}, pages = {e658}, year = {2021} }
@inproceedings{DBLP:conf/aiam/LinX21, author = {Zhisheng Lin and Yan Xia}, title = {Network Security of University Financial Sharing Platform under the Background of Smart Campus}, booktitle = {{AIAM} {(ACM)}}, pages = {1304--1308}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/cpits/BatorshynaTKCH21, author = {Adilia Batorshyna and Volodymyr Tokar and Natalia Kotenko and Serhii Chekhovych and Andrii Homotiuk}, title = {The Impact of Awareness Stimulating Activities and Events on Global Islamic Finance Assets: Enhancing Financial Risk Management and Economic Security in Non-Muslim Countries}, booktitle = {{CPITS} {II} {(1)}}, series = {{CEUR} Workshop Proceedings}, volume = {3187}, pages = {13--26}, publisher = {CEUR-WS.org}, year = {2021} }
@inproceedings{DBLP:conf/cpits/KreidychKK21, author = {Iryna Kreidych and leksandr Kharchenko and Oksana Kazak}, title = {Solvency Management in the Financial Security System of Housing and Communal Services}, booktitle = {{CPITS} {II} {(2)}}, series = {{CEUR} Workshop Proceedings}, volume = {3188}, pages = {63--75}, publisher = {CEUR-WS.org}, year = {2021} }
@inproceedings{DBLP:conf/fc/DasKC21, author = {Sanchari Das and Andrew Kim and L. Jean Camp}, title = {Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for {MFA} Adoption}, booktitle = {Financial Cryptography {(2)}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {406--413}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/icict/MohananSB21, author = {Sudhish Mohanan and Nandagopal Sridhar and Sajal Bhatia}, title = {Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector}, booktitle = {{ICICT} {(2)}}, series = {Lecture Notes in Networks and Systems}, volume = {236}, pages = {1015--1025}, publisher = {Springer}, year = {2021} }
@inproceedings{DBLP:conf/icise/FacciaSEB21, author = {Alessio Faccia and Nedal Sawan and Ahmed Eltweri and Zeenat Beebeejaun}, title = {Financial Big Data Security and Privacy in X-Accounting. {A} Step Further to Implement the Triple-Entry Accounting}, booktitle = {{ICISE}}, pages = {7--12}, publisher = {{ACM}}, year = {2021} }
@inproceedings{DBLP:conf/ico/SattarMSPBPK21, author = {Md Rahat Ibne Sattar and Shrabonti Mitra and Sadia Sultana and Umme Salma Pushpa and Dhruba Bhattacharjee and Abhijit Pathak and Mayeen Uddin Khandaker}, title = {A Secured Network Layer and Information Security for Financial Institutions: {A} Case Study}, booktitle = {{ICO}}, pages = {992--1001}, year = {2021} }
@inproceedings{DBLP:conf/issre/TanCC21, author = {Vincent Tan and Carmen Cheh and Binbin Chen}, title = {From Application Security Verification Standard {(ASVS)} to Regulation Compliance: {A} Case Study in Financial Services Sector}, booktitle = {{ISSRE} Workshops}, pages = {69--76}, publisher = {{IEEE}}, year = {2021} }
@proceedings{DBLP:conf/fc/2021-1, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, publisher = {Springer}, year = {2021} }
@proceedings{DBLP:conf/fc/2021-2, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, publisher = {Springer}, year = {2021} }
@proceedings{DBLP:conf/fc/2021w, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, publisher = {Springer}, year = {2021} }
@article{DBLP:journals/iacr/FaustHKS21a, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Financially Backed Covert Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1652}, year = {2021} }
@article{DBLP:journals/ijitdm/Balashunmugaraja20, author = {B. Balashunmugaraja and T. R. Ganeshbabu}, title = {Optimal Key Generation for Data Sanitization and Restoration of Cloud Data: Future of Financial Cyber Security}, journal = {Int. J. Inf. Technol. Decis. Mak.}, volume = {19}, number = {4}, pages = {987--1013}, year = {2020} }
@article{DBLP:journals/imcs/DzidzahKA20, author = {Esther Dzidzah and Kwame Owusu Kwateng and Benjamin Kofi Asante}, title = {Security behaviour of mobile financial service users}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {719--741}, year = {2020} }
@article{DBLP:journals/jbft/KaulH20, author = {Sonam Devgan Kaul and Dimitrios Hatzinakos}, title = {Intelligent {RFID} biometric enabled dual security lock in the banking environment}, journal = {J. Bank. Financial Technol.}, volume = {4}, number = {2}, pages = {159--173}, year = {2020} }
@article{DBLP:journals/mta/PanWH20, author = {Shuang Pan and Jianguo Wei and Shaobo Hu}, title = {A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping and Intelligent Learning in Financial Security System}, journal = {Multim. Tools Appl.}, volume = {79}, number = {13-14}, pages = {9163--9176}, year = {2020} }
@inproceedings{DBLP:conf/IEEEares/Moeckel20, author = {Caroline Moeckel}, title = {Attacker-centric thinking in security: perspectives from financial services practitioners}, booktitle = {{ARES}}, pages = {1:1--1:10}, publisher = {{ACM}}, year = {2020} }
@inproceedings{DBLP:conf/acis/PhamH20, author = {Thai Pham and Farkhondeh Hassandoust}, title = {The Role of External Mechanisms and Transformational Leadership in Information Security Policy Effectiveness: {A} Managerial Perspective of Financial Industry in Vietnam}, booktitle = {{ACIS}}, pages = {79}, year = {2020} }
@inproceedings{DBLP:conf/atci/HuH20, author = {Shuyu Hu and Ming Huang}, title = {Internet Financial Security Based on Big Data}, booktitle = {{ATCI}}, series = {Advances in Intelligent Systems and Computing}, volume = {1244}, pages = {485--490}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/dessert/SirenkoAVPMF20, author = {Natalia N. Sirenko and Igor P. Atamanyuk and Yuriy Volosyuk and Anastasiya Poltorak and Olha Melnyk and Polina Fenenko}, title = {Paradigm Changes that Strengthen the Financial Security of the State through {FINTECH} Development}, booktitle = {{DESSERT}}, pages = {110--116}, publisher = {{IEEE}}, year = {2020} }
@inproceedings{DBLP:conf/fc/KulykRAMGV20, author = {Oksana Kulyk and Benjamin Reinheimer and Lukas Aldag and Peter Mayer and Nina Gerber and Melanie Volkamer}, title = {Security and Privacy Awareness in Smart Environments - {A} Cross-Country Investigation}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {84--101}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/fc/OyebisiN20, author = {David Oyebisi and Kennedy Njenga}, title = {Behaviour of Outsourced Employees as Sources of Information System Security Threats}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {137--148}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/fc/SuBSUM20, author = {Jianan Su and Michael Bartholic and Andrew Stange and Ryosuke Ushida and Shin'ichiro Matsuo}, title = {How to Dynamically Incentivize Sufficient Level of IoT Security}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {451--465}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/fc/Taylor-JacksonM20, author = {Jacqui Taylor{-}Jackson and John McAlaney and Jeffrey L. Foster and Abubakar Bello and Alana Maurushat and John Dale}, title = {Incorporating Psychology into Cyber Security Education: {A} Pedagogical Approach}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {207--217}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/fc/WangYPB0D020, author = {Qin Wang and Jiangshan Yu and Zhiniang Peng and Van Cuong Bui and Shiping Chen and Yong Ding and Yang Xiang}, title = {Security Analysis on dBFT Protocol of {NEO}}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {20--31}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/fc/YuenSLAEZG20, author = {Tsz Hon Yuen and Shifeng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu}, title = {RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {464--483}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/ijcai/ChenGCZL20, author = {Weili Chen and Xiongfeng Guo and Zhiguang Chen and Zibin Zheng and Yutong Lu}, title = {Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem}, booktitle = {{IJCAI}}, pages = {4506--4512}, publisher = {ijcai.org}, year = {2020} }
@inproceedings{DBLP:conf/isdmci/KulyniakOR20, author = {Ihor Kulyniak and Solomiya Ohinok and Halyna Rachynska}, title = {Scientific and Methodological Approach to Assessing the Level of Banks' Financial Security}, booktitle = {{ISDMCI}}, series = {Advances in Intelligent Systems and Computing}, volume = {1246}, pages = {77--97}, publisher = {Springer}, year = {2020} }
@inproceedings{DBLP:conf/m3e2/KhrushchHHLPV20, author = {Nila Khrushch and Pavlo Hryhoruk and Tetiana Hovorushchenko and Sergii Lysenko and Liudmyla Prystupa and Liudmyla Vahanova}, title = {Assessment of bank's financial security levels based on a comprehensive index using information technology}, booktitle = {{M3E2-MLPEED}}, series = {{CEUR} Workshop Proceedings}, volume = {2713}, pages = {239--260}, publisher = {CEUR-WS.org}, year = {2020} }
@incollection{DBLP:series/ais/BelloP20, author = {Gabriel Bello and Alfredo J. Perez}, title = {On the Application of Financial Security Standards in Blockchain Platforms}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {247--267}, publisher = {Springer}, year = {2020} }
@proceedings{DBLP:conf/fc/2019w, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, publisher = {Springer}, year = {2020} }
@proceedings{DBLP:conf/fc/2020, editor = {Joseph Bonneau and Nadia Heninger}, title = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, publisher = {Springer}, year = {2020} }
@proceedings{DBLP:conf/fc/2020w, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, publisher = {Springer}, year = {2020} }
@article{DBLP:journals/ijais/McCalligRR19, author = {John McCallig and D. Alastair Robb and Fiona H. Rohde}, title = {Establishing the representational faithfulness of financial accounting information using multiparty security, network analysis and a blockchain}, journal = {Int. J. Account. Inf. Syst.}, volume = {33}, pages = {47--58}, year = {2019} }
@article{DBLP:journals/ijssmet/Feltus19, author = {Christophe Feltus}, title = {Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector}, journal = {Int. J. Serv. Sci. Manag. Eng. Technol.}, volume = {10}, number = {4}, pages = {1--25}, year = {2019} }
@article{DBLP:journals/jbft/DasguptaSG19, author = {Dipankar Dasgupta and John M. Shrein and Kishor Datta Gupta}, title = {A survey of blockchain from security perspective}, journal = {J. Bank. Financial Technol.}, volume = {3}, number = {1}, pages = {1--17}, year = {2019} }
@article{DBLP:journals/tele/BarthJJHR19, author = {Susanne Barth and Menno D. T. de Jong and Marianne Junger and Pieter H. Hartel and Janina C. Roppelt}, title = {Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources}, journal = {Telematics Informatics}, volume = {41}, pages = {55--69}, year = {2019} }
@inproceedings{DBLP:conf/chi/SleeperMOTWSOSC19, author = {Manya Sleeper and Tara Matthews and Kathleen O'Leary and Anna Turner and Jill Palzkill Woelfer and Martin Shelton and Andrew Oplinger and Andreas Schou and Sunny Consolvo}, title = {Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy}, booktitle = {{CHI}}, pages = {89}, publisher = {{ACM}}, year = {2019} }
@inproceedings{DBLP:conf/cscwd/MahalleYT19a, author = {Abhishek Mahalle and Jianming Yong and Xiaohui Tao}, title = {Ethics of {IT} Security Team for Cloud Architecture Infrastructure in Banking and Financial Services Industry}, booktitle = {{CSCWD}}, pages = {506--511}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/fc/AchenbachGH0LMM19, author = {Dirk Achenbach and Roland Gr{\"{o}}ll and Timon Hackenjos and Alexander Koch and Bernhard L{\"{o}}we and Jeremias Mechler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Jochen Rill}, title = {Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the {UC} Framework}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {243--261}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/fc/AvarikiotiK0W19, author = {Georgia Avarikioti and Lukas K{\"{a}}ppeli and Yuyi Wang and Roger Wattenhofer}, title = {Bitcoin Security Under Temporary Dishonest Majority}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {466--483}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/fc/OzmenBY19, author = {Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz}, title = {Fast Authentication from Aggregate Signatures with Improved Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {686--705}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/m3e2/HryhorukKG19, author = {Pavlo Hryhoruk and Nila Khrushch and Svitlana Grygoruk}, title = {Model for Assessment of the Financial Security Level of the Enterprise Based on the Desirability Scale}, booktitle = {{M3E2-MLPEED}}, series = {{CEUR} Workshop Proceedings}, volume = {2422}, pages = {169--180}, publisher = {CEUR-WS.org}, year = {2019} }
@inproceedings{DBLP:conf/medes/TroianoSPPMD19, author = {Ernesto Troiano and John Soldatos and Ariana Polyviou and Andreas Polyviou and Alessandro Mamelli and Dimitris Drakoulis}, title = {Big Data Platform for Integrated Cyber and Physical Security of Critical Infrastructures for the Financial Sector: Critical Infrastructures as Cyber-Physical Systems}, booktitle = {{MEDES}}, pages = {262--269}, publisher = {{ACM}}, year = {2019} }
@inproceedings{DBLP:conf/sp/FettHK19, author = {Daniel Fett and Pedram Hosseyni and Ralf K{\"{u}}sters}, title = {An Extensive Formal Security Analysis of the OpenID Financial-Grade {API}}, booktitle = {{IEEE} Symposium on Security and Privacy}, pages = {453--471}, publisher = {{IEEE}}, year = {2019} }
@inproceedings{DBLP:conf/spw/Mavroudis19, author = {Vasilios Mavroudis}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets}, booktitle = {Security Protocols Workshop}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {91--103}, publisher = {Springer}, year = {2019} }
@inproceedings{DBLP:conf/spw/Mavroudis19a, author = {Vasilios Mavroudis}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets (Transcript of Discussion)}, booktitle = {Security Protocols Workshop}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {104--112}, publisher = {Springer}, year = {2019} }
@proceedings{DBLP:conf/fc/2018w, editor = {Aviv Zohar and Ittay Eyal and Vanessa Teague and Jeremy Clark and Andrea Bracciali and Federico Pintore and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10958}, publisher = {Springer}, year = {2019} }
@proceedings{DBLP:conf/fc/2019, editor = {Ian Goldberg and Tyler Moore}, title = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, publisher = {Springer}, year = {2019} }
@article{DBLP:journals/corr/abs-1901-11520, author = {Daniel Fett and Pedram Hosseyni and Ralf K{\"{u}}sters}, title = {An Extensive Formal Security Analysis of the OpenID Financial-grade {API}}, journal = {CoRR}, volume = {abs/1901.11520}, year = {2019} }
@phdthesis{DBLP:phd/ethos/Pan18, author = {Liuxuan Pan}, title = {Application of a financial quantitative risk model to information security risk assessment}, school = {Royal Holloway, University of London, Egham, {UK}}, year = {2018} }
@article{DBLP:journals/jcam/Nkeki18a, author = {Charles I. Nkeki}, title = {Optimal investment risks and debt management with backup security in a financial crisis}, journal = {J. Comput. Appl. Math.}, volume = {338}, pages = {129--152}, year = {2018} }
@article{DBLP:journals/taasm/Lee18, author = {Kyoung{-}Joo Lee}, title = {Strategic human resource management for university-industry collaborations in Korea: financial incentives for academic faculty and employment security of industry liaison offices}, journal = {Technol. Anal. Strateg. Manag.}, volume = {30}, number = {4}, pages = {461--472}, year = {2018} }
@inproceedings{DBLP:conf/cscwd/MahalleYT018, author = {Abhishek Mahalle and Jianming Yong and Xiaohui Tao and Jun Shen}, title = {Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure}, booktitle = {{CSCWD}}, pages = {407--413}, publisher = {{IEEE}}, year = {2018} }
@inproceedings{DBLP:conf/fc/DasDC18, author = {Sanchari Das and Andrew Dingman and L. Jean Camp}, title = {Why Johnny Doesn't Use Two Factor {A} Two-Phase Usability Study of the {FIDO} {U2F} Security Key}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {160--179}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/fc/FarhangLG18, author = {Sadegh Farhang and Aron Laszka and Jens Grossklags}, title = {An Economic Study of the Effect of Android Platform Fragmentation on Security Updates}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {119--137}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/fc/Shacham18, author = {Hovav Shacham}, title = {Short Unique Signatures from {RSA} with a Tight Security Reduction (in the Random Oracle Model)}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {61--79}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/spw/Massacci18, author = {Fabio Massacci}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion)}, booktitle = {Security Protocols Workshop}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {55--62}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/spw/MassacciN0W18, author = {Fabio Massacci and Chan Nam Ngo and Daniele Venturi and Julian Williams}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation}, booktitle = {Security Protocols Workshop}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {45--54}, publisher = {Springer}, year = {2018} }
@proceedings{DBLP:conf/fc/2018, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, publisher = {Springer}, year = {2018} }
@article{DBLP:journals/ieeesp/TraynorBBR17, author = {Patrick Traynor and Kevin R. B. Butler and Jasmine D. Bowers and Bradley Reaves}, title = {FinTechSec: Addressing the Security Challenges of Digital Financial Services}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {5}, pages = {85--89}, year = {2017} }
@inproceedings{DBLP:conf/fc/ChothiaGHS17, author = {Tom Chothia and Flavio D. Garcia and Chris Heppel and Chris McMahon Stone}, title = {Why Banker Bob (Still) Can't Get {TLS} Right: {A} Security Analysis of {TLS} in Leading {UK} Banking Apps}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {579--597}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/fc/Gjosteen017, author = {Kristian Gj{\o}steen and Martin Strand}, title = {A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {404--418}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/fc/MalhotraGVKGG17, author = {Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and Haydn Kennedy and Jonathan Gardner and Sharon Goldberg}, title = {The Security of NTP's Datagram Protocol}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {405--423}, publisher = {Springer}, year = {2017} }
@inproceedings{DBLP:conf/fc/SzalachowskiP17, author = {Pawel Szalachowski and Adrian Perrig}, title = {Short Paper: On Deployment of DNS-Based Security Enhancements}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {424--433}, publisher = {Springer}, year = {2017} }
@proceedings{DBLP:conf/fc/2016, editor = {Jens Grossklags and Bart Preneel}, title = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, publisher = {Springer}, year = {2017} }
@proceedings{DBLP:conf/fc/2017, editor = {Aggelos Kiayias}, title = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, publisher = {Springer}, year = {2017} }
@proceedings{DBLP:conf/fc/2017w, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, publisher = {Springer}, year = {2017} }
@article{DBLP:journals/cais/AppanB16, author = {Radha Appan and Dinko Bacic}, title = {Impact of Information Technology {(IT)} Security Information Sharing among Competing {IT} Firms on Firm's Financial Performance: An Empirical Investigation}, journal = {Commun. Assoc. Inf. Syst.}, volume = {39}, pages = {12}, year = {2016} }
@article{DBLP:journals/dss/ChunCS16, author = {Se{-}Hak Chun and Wooje Cho and Ramanath Subramanyam}, title = {Transaction security investments in online marketplaces: An analytical examination of financial liabilities}, journal = {Decis. Support Syst.}, volume = {92}, pages = {91--102}, year = {2016} }
@article{DBLP:journals/fi/PandeyS16, author = {Pankaj Pandey and Einar Snekkenes}, title = {Using Financial Instruments to Transfer the Information Security Risks}, journal = {Future Internet}, volume = {8}, number = {2}, pages = {20}, year = {2016} }
@article{DBLP:journals/ijinfoman/RoumaniNR16, author = {Yaman Roumani and Joseph K. Nwankpa and Yazan F. Roumani}, title = {Examining the relationship between firm's financial records and security vulnerabilities}, journal = {Int. J. Inf. Manag.}, volume = {36}, number = {6}, pages = {987--994}, year = {2016} }
@article{DBLP:journals/lp/LinZ16, author = {Songqing Lin and Lijuan Zhan}, title = {International publishing partnerships for China's English language journals and financial security}, journal = {Learn. Publ.}, volume = {29}, number = {3}, pages = {145--153}, year = {2016} }
@article{DBLP:journals/wpc/Noh16, author = {Kyoo{-}Sung Noh}, title = {A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment}, journal = {Wirel. Pers. Commun.}, volume = {89}, number = {3}, pages = {761--775}, year = {2016} }
@inproceedings{DBLP:conf/bigdatasec/GaiQE16a, author = {Keke Gai and Meikang Qiu and Sam Adam Elnagdy}, title = {Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data}, booktitle = {BigDataSecurity/HPSC/IDS}, pages = {197--202}, publisher = {{IEEE}}, year = {2016} }
@inproceedings{DBLP:conf/fc/AlgwilY16, author = {Abdalnaser Algwil and Jeff Yan}, title = {Failures of Security APIs: {A} New Case}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {283--298}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/fc/KrombholzJGW16, author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl}, title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {555--580}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/fc/LangCBSS16, author = {Juan Lang and Alexei Czeskis and Dirk Balfanz and Marius Schilder and Sampath Srinivas}, title = {Security Keys: Practical Cryptographic Second Factors for the Modern Web}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {422--440}, publisher = {Springer}, year = {2016} }
@inproceedings{DBLP:conf/haisa/WahlgrenFMK16, author = {Gunnar Wahlgren and Anna Fedotova and Alexandra Musaeva and Stewart Kowalski}, title = {{IT} Security Incidents Escalation in the Swedish Financial Sector: {A} Maturity Model Study}, booktitle = {{HAISA}}, pages = {45--55}, publisher = {University of Plymouth}, year = {2016} }
@inproceedings{DBLP:conf/wisa/OhKC16, author = {Eun Oh and Tae{-}Sung Kim and Tae{-}Hee Cho}, title = {Development of Information Security Management Assessment Model for the Financial Sector}, booktitle = {{WISA}}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {186--197}, year = {2016} }
@proceedings{DBLP:conf/fc/2016w, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, publisher = {Springer}, year = {2016} }
@article{DBLP:journals/ijais/Otero15, author = {Angel R. Otero}, title = {An information security control assessment methodology for organizations' financial information}, journal = {Int. J. Account. Inf. Syst.}, volume = {18}, pages = {26--45}, year = {2015} }
@article{DBLP:journals/ijisss/Ifinedo15, author = {Princely Ifinedo}, title = {Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis}, journal = {Int. J. Inf. Syst. Serv. Sect.}, volume = {7}, number = {2}, pages = {54--70}, year = {2015} }
@inproceedings{DBLP:conf/3pgcic/PandeyH15, author = {Pankaj Pandey and Steven De Haes}, title = {A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security Risk}, booktitle = {3PGCIC}, pages = {17--25}, publisher = {{IEEE} Computer Society}, year = {2015} }
@inproceedings{DBLP:conf/csa2/AhnC15, author = {JungJin Ahn and Eunmi Choi}, title = {Financial Security Protocol and Service Model for Joint Account Banking Transaction}, booktitle = {{CSA/CUTE}}, series = {Lecture Notes in Electrical Engineering}, volume = {373}, pages = {521--527}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/fc/Toorani15, author = {Mohsen Toorani}, title = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6 Standard}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {8976}, pages = {245--260}, publisher = {Springer}, year = {2015} }
@inproceedings{DBLP:conf/ntms/GranadilloGDPM15, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar and Christophe Ponchel and Laura Rodriguez Martin}, title = {Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)}, booktitle = {{NTMS}}, pages = {1--6}, publisher = {{IEEE}}, year = {2015} }
@proceedings{DBLP:conf/fc/2015, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, publisher = {Springer}, year = {2015} }
@proceedings{DBLP:conf/fc/2015w, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, publisher = {Springer}, year = {2015} }
@article{DBLP:journals/corr/Erturk15, author = {Emre Erturk}, title = {Two Trends in Mobile Security: Financial Motives and Transitioning from Static to Dynamic Analysis}, journal = {CoRR}, volume = {abs/1504.06893}, year = {2015} }
@article{DBLP:journals/cais/LiuZA14, author = {Charles Zhechao Liu and Humayun Zafar and Yoris A. Au}, title = {Rethinking {FS-ISAC:} An {IT} Security Information Sharing Network Model for the Financial Services Sector}, journal = {Commun. Assoc. Inf. Syst.}, volume = {34}, pages = {2}, year = {2014} }
@article{DBLP:journals/ijebm/Ifinedo14, author = {Princely Ifinedo}, title = {The effects of national culture on the assessment of information security threats and controls in financial services industry}, journal = {Int. J. Electron. Bus. Manag.}, volume = {12}, number = {2}, year = {2014} }
@inproceedings{DBLP:conf/fc/DmitrienkoLRS14, author = {Alexandra Dmitrienko and Christopher Liebchen and Christian Rossow and Ahmad{-}Reza Sadeghi}, title = {On the (In)Security of Mobile Two-Factor Authentication}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {365--383}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/fc/Garman0MR14, author = {Christina Garman and Matthew Green and Ian Miers and Aviel D. Rubin}, title = {Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {140--155}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/fc/MigicovskyDRH14, author = {Alex Migicovsky and Zakir Durumeric and Jeff Ringenberg and J. Alex Halderman}, title = {Outsmarting Proctors with Smartwatches: {A} Case Study on Wearable Computing Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {89--96}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/fc/MurdochA14, author = {Steven J. Murdoch and Ross J. Anderson}, title = {Security Protocols and Evidence: Where Many Payment Systems Fail}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {21--32}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/fc/Pape14, author = {Sebastian Pape}, title = {Sample or Random Security - {A} Security Model for Segment-Based Visual Cryptography}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {291--303}, publisher = {Springer}, year = {2014} }
@inproceedings{DBLP:conf/mipro/CapkoAT14, author = {Zvonko Capko and Sasa Aksentijevic and Edvard Tijan}, title = {Economic and financial analysis of investments in information security}, booktitle = {{MIPRO}}, pages = {1550--1556}, publisher = {{IEEE}}, year = {2014} }
@inproceedings{DBLP:conf/pst/MartinKA14, author = {Clemens Martin and Amina Kadry and Ghada Abu{-}Shady}, title = {Quantifying the financial impact of it security breaches on business processes}, booktitle = {{PST}}, pages = {149--155}, publisher = {{IEEE} Computer Society}, year = {2014} }
@proceedings{DBLP:conf/fc/2014, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, publisher = {Springer}, year = {2014} }
@proceedings{DBLP:conf/fc/2014w, editor = {Rainer B{\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8438}, publisher = {Springer}, year = {2014} }
@phdthesis{DBLP:phd/ethos/Alhayani13, author = {Abdullah Alhayani}, title = {Implementation, management and dissemination of information security : an organisational perspective of financial institution}, school = {Brunel University London, {UK}}, year = {2013} }
@article{DBLP:journals/cit/Ifinedo13, author = {Princely Ifinedo}, title = {Relationships Between Relevant Contextual Influences and Information Security Threats and Controls in Global Financial Services Industry}, journal = {J. Comput. Inf. Technol.}, volume = {21}, number = {4}, pages = {235--246}, year = {2013} }
@article{DBLP:journals/jisis/FloresAS13, author = {Denys A. Flores and Olga Angelopoulou and Richard J. Self}, title = {An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {101--114}, year = {2013} }
@article{DBLP:journals/mcm/ChangKL13, author = {Hangbae Chang and Jungduk Kim and Hosin David Lee}, title = {Financial {IT} and Security}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {1--2}, year = {2013} }
@article{DBLP:journals/mcm/LeeLL13, author = {Jung{-}Hyun Lee and Won Gue Lim and Jong In Lim}, title = {A study of the security of Internet banking and financial private information in South Korea}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {117--131}, year = {2013} }
@inproceedings{DBLP:conf/amcis/LampeWMS13, author = {Ulrich Lampe and Olga Wenge and Alexander M{\"{u}}ller and Ralf Schaarschmidt}, title = {On the Relevance of Security Risks for Cloud Adoption in the Financial Industry}, booktitle = {{AMCIS}}, publisher = {Association for Information Systems}, year = {2013} }
@inproceedings{DBLP:conf/cts/PanjaFMRM13, author = {Biswajit Panja and Dennis Fattaleh and Mark Mercado and Adam Robinson and Priyanka Meharia}, title = {Cybersecurity in banking and financial sector: Security analysis of a mobile banking application}, booktitle = {{CTS}}, pages = {397--403}, publisher = {{IEEE}}, year = {2013} }
@inproceedings{DBLP:conf/fc/ArianezhadSM13, author = {Majid Arianezhad and Douglas Stebila and Behzad Mozaffari}, title = {Usability and Security of Gaze-Based Graphical Grid Passwords}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {17--33}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/Cappos13, author = {Justin Cappos}, title = {Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {386--394}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/ChuangNWJ13, author = {John C.{-}I. Chuang and Hamilton Nguyen and Charles Wang and Benjamin Johnson}, title = {I Think, Therefore {I} Am: Usability and Security of Authentication Using Brainwaves}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {1--16}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/EgelmanS13, author = {Serge Egelman and Stuart E. Schechter}, title = {The Importance of Being Earnest [In Security Warnings]}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {52--59}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/FahlHOMS13, author = {Sascha Fahl and Marian Harbach and Marten Oltrogge and Thomas Muders and Matthew Smith}, title = {Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {144--161}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/GallegoSV13, author = {Alexander Gallego and Nitesh Saxena and Jonathan Voris}, title = {Exploring Extrinsic Motivation for Better Security: {A} Usability Study of Scoring-Enhanced Device Pairing}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {60--68}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/KeHY13, author = {Ping Fan Ke and Kai Lung Hui and Wei T. Yue}, title = {Information Security as a Credence Good}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {83--93}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, title = {The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {34--51}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/KirlapposBS13, author = {Iacovos Kirlappos and Adam Beautement and Martina Angela Sasse}, title = {"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {70--82}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/fc/ZhouYSQ13, author = {Yuanyuan Zhou and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {On the Need of Physical Security for Small Embedded Devices: {A} Case Study with {COMP128-1} Implementations in {SIM} Cards}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {230--238}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/indin/RayAGBT13, author = {Apala Ray and Johan {\AA}kerberg and Mikael Gidlund and Mats Bj{\"{o}}rkman and Christophe Tremlet}, title = {Reusability assessment of financial card readers' security mechanisms in process control devices}, booktitle = {{INDIN}}, pages = {494--499}, publisher = {{IEEE}}, year = {2013} }
@inproceedings{DBLP:conf/issa/EsanNO13, author = {Omobayo A. Esan and S. M. Ngwira and Isaac Olusegun Osunmakinde}, title = {Bimodal biometrics for financial infrastructure security}, booktitle = {{ISSA}}, pages = {1--8}, publisher = {{IEEE}}, year = {2013} }
@inproceedings{DBLP:conf/isse/BalboniKM13, author = {Paolo Balboni and Udo Kroon and Milda Macenaite}, title = {Data Protection and Data Security by Design Applied to Financial Intelligence}, booktitle = {{ISSE}}, pages = {73--85}, publisher = {Springer}, year = {2013} }
@inproceedings{DBLP:conf/istas/MushoreK13, author = {Rutendo Mushore and Michael Kyobe}, title = {Investigating the factors influencing information security compliance in a financial services firm}, booktitle = {{ISTAS}}, pages = {155--173}, publisher = {{IEEE}}, year = {2013} }
@inproceedings{DBLP:conf/wocc/XuWYWZ13, author = {Jiang{-}pei Xu and Liji Wu and Xiang{-}jun Yang and Yu{-}zhong Wang and Xiangmin Zhang}, title = {A security vulnerability of Java Card on array access in financial system}, booktitle = {{WOCC}}, pages = {707--710}, publisher = {{IEEE}}, year = {2013} }
@proceedings{DBLP:conf/fc/2013, editor = {Ahmad{-}Reza Sadeghi}, title = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, publisher = {Springer}, year = {2013} }
@proceedings{DBLP:conf/fc/2013w, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, publisher = {Springer}, year = {2013} }
@article{DBLP:journals/ijmms/LeeRNFJ12, author = {Jong{-}Eun Roselyn Lee and Shailendra Rao and Clifford Nass and Karin Forssell and Jae Min John}, title = {When do online shoppers appreciate security enhancement efforts? Effects of financial risk and security level on evaluations of customer authentication}, journal = {Int. J. Hum. Comput. Stud.}, volume = {70}, number = {5}, pages = {364--376}, year = {2012} }
@article{DBLP:journals/irmj/ZafarKO12, author = {Humayun Zafar and Myung Ko and Kweku{-}Muata Osei{-}Bryson}, title = {Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors}, journal = {Inf. Resour. Manag. J.}, volume = {25}, number = {1}, pages = {21--37}, year = {2012} }
@inproceedings{DBLP:conf/amcis/LampeWMS12, author = {Ulrich Lampe and Olga Wenge and Alexander M{\"{u}}ller and Ralf Schaarschmidt}, title = {Cloud Computing in the Financial Industry - {A} Road Paved with Security Pitfalls?}, booktitle = {{AMCIS}}, publisher = {Association for Information Systems}, year = {2012} }
@inproceedings{DBLP:conf/fc/BenderDFK12, author = {Jens Bender and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Dennis K{\"{u}}gler}, title = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents, and Its Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {344--358}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/fc/Bohme12, author = {Rainer B{\"{o}}hme}, title = {Security Audits Revisited}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {129--147}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/fc/BonneauPA12, author = {Joseph Bonneau and S{\"{o}}ren Preibusch and Ross J. Anderson}, title = {A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {25--40}, publisher = {Springer}, year = {2012} }
@proceedings{DBLP:conf/fc/2011, editor = {George Danezis}, title = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, publisher = {Springer}, year = {2012} }
@proceedings{DBLP:conf/fc/2011w, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, publisher = {Springer}, year = {2012} }
@proceedings{DBLP:conf/fc/2012, editor = {Angelos D. Keromytis}, title = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, publisher = {Springer}, year = {2012} }
@proceedings{DBLP:conf/fc/2012w, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, publisher = {Springer}, year = {2012} }
@inproceedings{DBLP:conf/fc/AycockBDD11, author = {John Aycock and Elizabeth Buchanan and Scott D. Dexter and David Dittrich}, title = {Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {138--145}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/fc/ChiaK11, author = {Pern Hui Chia and Svein Johan Knapskog}, title = {Re-evaluating the Wisdom of Crowds in Assessing Web Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {299--314}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/fc/ChristinEVG11, author = {Nicolas Christin and Serge Egelman and Timothy Vidas and Jens Grossklags}, title = {It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {16--30}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/fc/JohnsonBK11, author = {Maritza L. Johnson and Steven M. Bellovin and Angelos D. Keromytis}, title = {Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {131--137}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/fc/NovakSMH11, author = {Jay Novak and Jonathan Stribley and Kenneth Meagher and J. Alex Halderman}, title = {Absolute Pwnage: {A} Short Paper about the Security Risks of Remote Administration Tools}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {77--84}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/fc/PlotzN11, author = {Henryk Pl{\"{o}}tz and Karsten Nohl}, title = {Peeling Away Layers of an {RFID} Security System}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {205--219}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/fc/RobinsonH11, author = {David G. Robinson and J. Alex Halderman}, title = {Ethical Issues in E-Voting Security Analysis}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {119--130}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/ichit/BaekP11, author = {Jong{-}Il Baek and Dea{-}Woo Park}, title = {A Study of Disaster Preparedness Systems Operations Analysis and Financial Security Measures of Large Banking Network}, booktitle = {{ICHIT} {(2)}}, series = {Communications in Computer and Information Science}, volume = {206}, pages = {167--173}, publisher = {Springer}, year = {2011} }
@inproceedings{DBLP:conf/fc/BarthRSMSB10, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, title = {A Learning-Based Approach to Reactive Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {192--206}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/Caballero-GilMCH10, author = {Pino Caballero{-}Gil and Jezabel Molina{-}Gil and C{\'{a}}ndido Caballero{-}Gil and Candelaria Hern{\'{a}}ndez{-}Goya}, title = {Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {427}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/Cranor10, author = {Lorrie Faith Cranor}, title = {Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {3}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/Cranor10a, author = {Lorrie Faith Cranor}, title = {Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {247--249}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/Fleischmann10, author = {Kenneth R. Fleischmann}, title = {Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {197--202}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/GrossklagsJC10, author = {Jens Grossklags and Benjamin Johnson and Nicolas Christin}, title = {When Information Improves Information Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {416--423}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/Hubaux10, author = {Jean{-}Pierre Hubaux}, title = {Security Mechanisms with Selfish Players in Wireless Networks}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {2}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/KenneallyBM10, author = {Erin Kenneally and Michael D. Bailey and Douglas Maughan}, title = {A Framework for Understanding and Applying Ethical Principles in Network and Security Research}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {240--246}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/MatsuoMOB10, author = {Shin'ichiro Matsuo and Kunihiko Miyazaki and Akira Otsuka and David A. Basin}, title = {How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of {ISO/IEC} 29128 and {CRYPTREC}}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {182--194}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/RuhrmairJHACS10, author = {Ulrich R{\"{u}}hrmair and Christian Jaeger and Christian Hilgers and Michael Algasinger and Gy{\"{o}}rgy Csaba and Martin Stutzmann}, title = {Security Applications of Diodes with Unique Current-Voltage Characteristics}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {328--335}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/fc/Sassaman10, author = {Len Sassaman}, title = {Ethical Guidelines for Computer Security Researchers: "Be Reasonable"}, booktitle = {Financial Cryptography Workshops}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {250--255}, publisher = {Springer}, year = {2010} }
@inproceedings{DBLP:conf/iceis/BaldoniLCDMM10, author = {Roberto Baldoni and Giorgia Lodi and Gregory V. Chockler and Eliezer Dekel and Barry P. Mulcahy and Giuseppe Martufi}, title = {A Contract-based Event Driven Model for Collaborative Security in Financial Information Systems}, booktitle = {{ICEIS} {(4)}}, pages = {147--152}, publisher = {SciTePress}, year = {2010} }
@incollection{DBLP:series/natosec/Bollag10, author = {Josef Bollag}, title = {World Financial Crisis and its Influence on Terror Financing}, booktitle = {Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {27}, pages = {13--18}, publisher = {{IOS} Press}, year = {2010} }
@proceedings{DBLP:conf/fc/2010, editor = {Radu Sion}, title = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, publisher = {Springer}, year = {2010} }
@proceedings{DBLP:conf/fc/2010w, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, publisher = {Springer}, year = {2010} }
@book{DBLP:reference/crc/2010fcs, editor = {Burton Rosenberg}, title = {Handbook of Financial Cryptography and Security}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Barni010, author = {Mauro Barni and Stefan Katzenbeisser}, title = {Digital Watermarking}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {391--435}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Belenkiy10, author = {Mira Belenkiy}, title = {E-Cash}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {3--48}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Brandt10, author = {Felix Brandt}, title = {Auctions}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {49--58}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Coventry10, author = {Lynne M. Coventry}, title = {Human Factors}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {497--519}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/DanezisDS10, author = {George Danezis and Claudia D{\'{\i}}az and Paul F. Syverson}, title = {Anonymous Communication}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {341--389}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/DashtiM10, author = {Mohammad Torabi Dashti and Sjouke Mauw}, title = {Fair Exchange}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {109--132}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Ellison10, author = {Carl M. Ellison}, title = {Public Key Infrastructure}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {455--493}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Jackson10, author = {Margaret Jackson}, title = {Legal Issues}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {521--554}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/JakobssonSS10, author = {Markus Jakobsson and Sid Stamm and Christopher Soghoian}, title = {Phishing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {301--339}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Kiayias10, author = {Aggelos Kiayias}, title = {Electronic Voting}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {59--81}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Parhonyi10, author = {R{\'{o}}bert P{\'{a}}rhonyi}, title = {Micropayment Systems}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {163--191}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Pehlivanoglu10, author = {Serdar Pehlivanoglu}, title = {Broadcast and Content Distribution}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {133--159}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/SadeghiW10, author = {Ahmad{-}Reza Sadeghi and Christian Wachsmann}, title = {Trusted Computing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {221--256}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Safavi-NainiS10, author = {Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard}, title = {Digital Rights Management}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {193--220}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/SionW10, author = {Radu Sion and Marianne Winslett}, title = {Regulatory Compliance}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {555--584}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Smith10, author = {Sean Smith}, title = {Hardware Security Modules}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {257--278}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Szydlo10, author = {Michael Szydlo}, title = {Portfolio Trading}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {279--297}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Wilton10, author = {Robin Wilton}, title = {Identity Management}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {437--453}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@incollection{DBLP:reference/crc/Zhou10, author = {Jianying Zhou}, title = {Non-Repudiation}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {83--108}, publisher = {Chapman and Hall/CRC}, year = {2010} }
@article{DBLP:journals/ijisp/Ifinedo09, author = {Princely Ifinedo}, title = {Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions?}, journal = {Int. J. Inf. Secur. Priv.}, volume = {3}, number = {2}, pages = {68--83}, year = {2009} }
@article{DBLP:journals/imcs/Ifinedo09, author = {Princely Ifinedo}, title = {Information technology security management concerns in global financial services institutions: Is national culture a differentiator?}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {372--387}, year = {2009} }
@article{DBLP:journals/riga/KryukovS09, author = {Dmitry Kryukov and Raimonds Strauss}, title = {Information security governance as key performance indicator for financial institutions}, journal = {Sci. J. Riga Tech. Univ. Ser. Comput. Sci.}, volume = {38}, pages = {161--167}, year = {2009} }
@inproceedings{DBLP:conf/amcis/ZafarA09, author = {Humayun Zafar and Yoris A. Au}, title = {The Economic Ramifications of Strategic {IT} Security Information Sharing in the Financial Services Industry}, booktitle = {{AMCIS}}, pages = {281}, publisher = {Association for Information Systems}, year = {2009} }
@inproceedings{DBLP:conf/fc/FultzG09, author = {Neal Fultz and Jens Grossklags}, title = {Blue versus Red: Towards a Model of Distributed Security Attacks}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {167--183}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/fc/IoannidisPW09, author = {Christos Ioannidis and David J. Pym and Julian Williams}, title = {Investments and Trade-offs in the Economics of Information Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {148--166}, publisher = {Springer}, year = {2009} }
@inproceedings{DBLP:conf/interaction/SaghafiNE09, author = {Fatemeh Saghafi and Fatemeh NasserEslami and Maryam Esmaili}, title = {Ranking secure technologies in security provision financial transactions mobile commerce}, booktitle = {{ICIS}}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {331--336}, publisher = {{ACM}}, year = {2009} }
@proceedings{DBLP:conf/fc/2009, editor = {Roger Dingledine and Philippe Golle}, title = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, publisher = {Springer}, year = {2009} }
@article{DBLP:journals/isjgp/SingletonS08, author = {Tommie W. Singleton and Aaron J. Singleton}, title = {The Potential for a Synergistic Relationship Between Information Security and a Financial Audit}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {17}, number = {2}, pages = {80--86}, year = {2008} }
@article{DBLP:journals/kybernetes/HuangWZ08, author = {Xiangzhao Huang and Hu Wan and Hongtao Zhou}, title = {The synergetic model of the controlling tactics to network financial information security}, journal = {Kybernetes}, volume = {37}, number = {9/10}, pages = {1393--1400}, year = {2008} }
@inproceedings{DBLP:conf/fc/HuangD08, author = {Ken Huang and Paul Douthit}, title = {ST{\&}E Is the Most Cost Effective Measure for Comply with Payment Card Industry {(PCI)} Data Security Standard}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {321--322}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/isse/FibikovaM08, author = {Lenka Fib{\'{\i}}kov{\'{a}} and Roland M{\"{u}}ller}, title = {The Information Security Framework for Daimler Financial Services and its Implementation}, booktitle = {{ISSE}}, pages = {3--19}, publisher = {Vieweg+Teubner}, year = {2008} }
@inproceedings{DBLP:conf/pst/Ifinedo08, author = {Princely Ifinedo}, title = {{IT} Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter?}, booktitle = {{PST}}, pages = {75--84}, publisher = {{IEEE} Computer Society}, year = {2008} }
@inproceedings{DBLP:conf/wkdd/XiaBP08, author = {Bin Xia and Hui Bai and Bin Pan}, title = {Research of Information Technology Security in the Financial Industry}, booktitle = {{WKDD}}, pages = {477--480}, publisher = {{IEEE} Computer Society}, year = {2008} }
@proceedings{DBLP:conf/fc/2007, editor = {Sven Dietrich and Rachna Dhamija}, title = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, publisher = {Springer}, year = {2008} }
@proceedings{DBLP:conf/fc/2008, editor = {Gene Tsudik}, title = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, publisher = {Springer}, year = {2008} }
@inproceedings{DBLP:conf/fc/AsgharpourLC07, author = {Farzaneh Asgharpour and Debin Liu and L. Jean Camp}, title = {Mental Models of Security Risks}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {367--377}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/fc/Desmedt07, author = {Yvo Desmedt}, title = {Position Statement in {RFID} S{\&}P Panel: From Relative Security to Perceived Secure}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {53--56}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/fc/Fu07, author = {Kevin Fu}, title = {Panel: {RFID} Security and Privacy}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {45}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/fc/Jutla07, author = {Dawn N. Jutla}, title = {Usable {SPACE:} Security, Privacy, and Context for the Mobile User}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {245}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/fc/KuoWP07, author = {Cynthia Kuo and Jesse Walker and Adrian Perrig}, title = {Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {325--340}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/fc/MitchellK07, author = {April Slayden Mitchell and Alan H. Karp}, title = {Improving Usability by Adding Security to Video Conferencing Systems}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {378--382}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/fc/PagterP07, author = {Jakob Illeborg Pagter and Marianne Graves Petersen}, title = {A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {383--388}, publisher = {Springer}, year = {2007} }
@article{DBLP:journals/tele/ChangHYH06, author = {I{-}Chiu Chang and Hsin{-}Ginn Hwang and David C. Yen and Hen{-}Yi Huang}, title = {An empirical study of the factors affecting Internet security for the financial industry in Taiwan}, journal = {Telematics Informatics}, volume = {23}, number = {4}, pages = {343--364}, year = {2006} }
@proceedings{DBLP:conf/fc/2006, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, publisher = {Springer}, year = {2006} }
@article{DBLP:journals/imcs/KeshR05, author = {Someswar Kesh and M. K. Raja}, title = {Development of a qualitative reasoning model for financial forecasting}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {167--179}, year = {2005} }
@inproceedings{DBLP:conf/ecis/Locher05, author = {Christian Locher}, title = {Methodologies for Evaluating Information Security Investments - What Basel {II} Can Change in the Financial Industry}, booktitle = {{ECIS}}, pages = {1561--1572}, year = {2005} }
@inproceedings{DBLP:conf/fc/Friedman05, author = {Allan Friedman}, title = {Panel Summary: Incentives, Markets and Information Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {372--373}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/fc/TuylsSSAO05, author = {Pim Tuyls and Boris Skoric and S. Stallinga and Anton H. M. Akkermans and W. Ophey}, title = {Information-Theoretic Security Analysis of Physical Uncloneable Functions}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {141--155}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/icete/Ghernaouti-Helie05, author = {Solange Ghernaouti{-}Helie and Mohamed Ali Sfaxi}, title = {Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment}, booktitle = {{ICETE} (Selected Papers)}, series = {Communications in Computer and Information Science}, volume = {3}, pages = {139--149}, year = {2005} }
@inproceedings{DBLP:conf/icete/Ghernaouti-HelieS05, author = {Solange Ghernaouti{-}Helie and Mohamed Ali Sfaxi}, title = {Guaranteerring security of financial transaction by using quantum cryptography in banking environment}, booktitle = {{ICETE}}, pages = {268--274}, publisher = {{INSTICC} Press}, year = {2005} }
@inproceedings{DBLP:conf/issa/Baloyi05, author = {Norman Tinyiko Baloyi}, title = {Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical}, booktitle = {{ISSA}}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005} }
@incollection{DBLP:books/sp/05/PietruszkiewiczR05, author = {Wieslaw Pietruszkiewicz and Leonard Rozenberg}, title = {Financial Distress Prediction Using Different Pattern Recognition Methods}, booktitle = {Information Processing and Security Systems}, pages = {103--111}, publisher = {Springer}, year = {2005} }
@proceedings{DBLP:conf/fc/2005, editor = {Andrew S. Patrick and Moti Yung}, title = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, publisher = {Springer}, year = {2005} }
@inproceedings{DBLP:conf/ACMicec/AgrawalPPRU04, author = {Manish Agrawal and Hemant Padmanabhan and Lokesh Pandey and H. Raghav Rao and Shambhu J. Upadhyaya}, title = {A conceptual approach to information security in financial account aggregation}, booktitle = {{ICEC}}, series = {{ACM} International Conference Proceeding Series}, volume = {60}, pages = {619--626}, publisher = {{ACM}}, year = {2004} }
@inproceedings{DBLP:conf/fc/Camp04, author = {L. Jean Camp}, title = {Mental Models of Computer Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {106--111}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/fc/Patrick04, author = {Andrew S. Patrick}, title = {Usability and Acceptability of Biometric Security Systems}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {105}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/fc/Pugh04, author = {Simon Pugh}, title = {PayPass Security and Risk (Abstract)}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {70--71}, publisher = {Springer}, year = {2004} }
@inproceedings{DBLP:conf/fc/Yurick04, author = {William Yurcik}, title = {Visualization Tools for Security Administrators}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {112--113}, publisher = {Springer}, year = {2004} }
@article{DBLP:journals/ijstm/Shoniregun03, author = {Charles A. Shoniregun}, title = {Are existing internet security measures guaranteed to protect user identity in the financial services industry?}, journal = {Int. J. Serv. Technol. Manag.}, volume = {4}, number = {2}, pages = {194--216}, year = {2003} }
@article{DBLP:journals/imcs/GargCH03, author = {Ashish Garg and Jeffrey Curtis and Hilary Halper}, title = {Quantifying the financial impact of {IT} security breaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {74--83}, year = {2003} }
@article{DBLP:journals/isjgp/GargCH03, author = {Ashish Garg and Jeffrey Curtis and Hilary Halper}, title = {The Financial Impact of {IT} Security Breaches: What Do Investors Think?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {12}, number = {1}, pages = {22--33}, year = {2003} }
@inproceedings{DBLP:conf/fc/Odlyzko03a, author = {Andrew M. Odlyzko}, title = {Economics, Psychology, and Sociology of Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {182--189}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/fc/SchechterS03, author = {Stuart E. Schechter and Michael D. Smith}, title = {How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {122--137}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/wsc/Mayhew02, author = {Stewart Mayhew}, title = {Problems in financial engineering: security price dynamics and simulation in financial engineering}, booktitle = {{WSC}}, pages = {1568--1574}, publisher = {{WSC}}, year = {2002} }
@inproceedings{DBLP:conf/fc/BellareNPS01, author = {Mihir Bellare and Chanathip Namprempre and David Pointcheval and Michael Semanko}, title = {The Power of {RSA} Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {309--328}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/fc/JaulmesP01, author = {{\'{E}}liane Jaulmes and Guillaume Poupard}, title = {On the Security of Homage Group Authentication Protocol}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {97--107}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/fc/Kravitz01, author = {David W. Kravitz}, title = {Aspects of Digital Rights Management and the Use of Hardware Security Devices}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {45--49}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/fc/Tsiounis01, author = {Yiannis Tsiounis}, title = {A Security Framework for Card-Based Systems}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {201--222}, publisher = {Springer}, year = {2001} }
@inproceedings{DBLP:conf/fc/Jolish00, author = {Barak D. Jolish}, title = {The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {202--224}, publisher = {Springer}, year = {2000} }
@inproceedings{DBLP:conf/fc/Zane00, author = {Francis Zane}, title = {Efficient Watermark Detection and Collusion Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {21--32}, publisher = {Springer}, year = {2000} }
@inproceedings{DBLP:conf/icis/GuptaCMV00, author = {Mukul Gupta and Alok R. Chaturvedi and Shailendra Raj Mehta and Lorenzo Valeri}, title = {The experimental analysis of information security management issues for online financial services}, booktitle = {{ICIS}}, pages = {667--675}, publisher = {Association for Information Systems}, year = {2000} }
@inproceedings{DBLP:conf/ifip11-1/Stanley99, author = {Terry Stanley}, title = {Designing a Secure System for Implementing Chip Cards in the Financial Services Industry}, booktitle = {Conference on Information Security Management {\&} Small Systems Security}, series = {{IFIP} Conference Proceedings}, volume = {154}, pages = {213--220}, publisher = {Kluwer}, year = {1999} }
@inproceedings{DBLP:conf/fc/MathesonMSTZ98, author = {Lesley R. Matheson and Stephen G. Mitchell and Talal Shamoon and Robert Endre Tarjan and Francis Zane}, title = {Robustness and Security of Digital Watermarks}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {227--240}, publisher = {Springer}, year = {1998} }
@inproceedings{DBLP:conf/fc/FranklinM97, author = {Matthew K. Franklin and Dahlia Malkhi}, title = {Auditable Metering with Lightweight Security}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {151--160}, publisher = {Springer}, year = {1997} }
@inproceedings{DBLP:conf/fc/Goldstein97, author = {Theodore C. Goldstein}, title = {The Gateway Security Model in the Java Electronic Commerce Framework}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {340--354}, publisher = {Springer}, year = {1997} }
@inproceedings{DBLP:conf/fc/Lelieveldt97, author = {Simon L. Lelieveldt}, title = {Evaluating the Security of Electronic Money}, booktitle = {Financial Cryptography}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {91--94}, publisher = {Springer}, year = {1997} }
@inproceedings{DBLP:conf/lisa/Geer94, author = {Daniel E. Geer Jr.}, title = {Breaking into Banks: Security Lessons Learned from Financial Services}, booktitle = {{LISA}}, publisher = {{USENIX}}, year = {1994} }
@article{DBLP:journals/clsr/X93cl, title = {Controlling computer security: {A} guide for financial institutions: by James Essinger {(FT} Business Information Ltd, 1992 {ISBN} 1-85334-163-0)}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {226}, year = {1993} }
@article{DBLP:journals/clsr/X92aq, title = {Information security in financial services: by Ken Slater, 1991 (Hardcover)(MacMillan - Stockton Press), 275 pp, {ISBN} 0-333-54702-0}, journal = {Comput. Law Secur. Rev.}, volume = {8}, number = {4}, pages = {165}, year = {1992} }
@article{DBLP:journals/cryptologia/GaronO91, author = {Gilles Garon and Richard Outerbridge}, title = {Des Watch: an Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990's}, journal = {Cryptologia}, volume = {15}, number = {3}, pages = {177--193}, year = {1991} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.