Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "financial security"
@article{DBLP:journals/csse/LiWFZZ24, author = {Xiaonan Li and Qiang Wang and Conglai Fan and Wei Zhan and Mingliang Zhang}, title = {A New Malicious Code Classification Method for the Security of Financial Software}, journal = {Comput. Syst. Sci. Eng.}, volume = {48}, number = {3}, pages = {773--792}, year = {2024}, url = {https://doi.org/10.32604/csse.2024.039849}, doi = {10.32604/CSSE.2024.039849}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/LiWFZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/JiangWZNL24, author = {Changjun Jiang and Fei{-}Yue Wang and Mengchu Zhou and Asoke K. Nandi and Guanjun Liu}, title = {Guest Editorial: Special Issue on Big Data and Computational Social Intelligence for Guaranteed Financial Security}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {2}, pages = {1551--1555}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2024.3373929}, doi = {10.1109/TCSS.2024.3373929}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/JiangWZNL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ZhaoHLMW24, author = {Qin Zhao and Jingyi Huang and Gang Liu and Yaru Miao and Pengwei Wang}, title = {A Multiinterest and Social Interest-Field Framework for Financial Security}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {2}, pages = {1685--1695}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2023.3252611}, doi = {10.1109/TCSS.2023.3252611}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/ZhaoHLMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2023-1, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13950}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-47754-6}, doi = {10.1007/978-3-031-47754-6}, isbn = {978-3-031-47753-9}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2023-2, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13951}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-47751-5}, doi = {10.1007/978-3-031-47751-5}, isbn = {978-3-031-47750-8}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2023w, editor = {Aleksander Essex and Shin'ichiro Matsuo and Oksana Kulyk and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez and Sam Werner and Andrea Bracciali and Geoff Goodell}, title = {Financial Cryptography and Data Security. {FC} 2023 International Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia, May 5, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13953}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-48806-1}, doi = {10.1007/978-3-031-48806-1}, isbn = {978-3-031-48805-4}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2023w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejcs/Wang23, author = {Yanzhao Wang}, title = {Intelligent cluster construction of internet financial security protection system in banking industry}, journal = {Open Comput. Sci.}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.1515/comp-2022-0268}, doi = {10.1515/COMP-2022-0268}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejcs/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23, author = {Julija Gavenaite{-}Sirvydiene and Algita Miecinskiene}, title = {The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {497--518}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1243}, doi = {10.13052/JCSM2245-1439.1243}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/GavenaiteSirvydieneM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/SaqibA23, author = {Nazar Abbas Saqib and Shahad Talla AL{-}Talla}, title = {Scaling Up Security and Efficiency in Financial Transactions and Blockchain Systems}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {2}, pages = {31}, year = {2023}, url = {https://doi.org/10.3390/jsan12020031}, doi = {10.3390/JSAN12020031}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/SaqibA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Yu23, author = {Haiping Yu}, title = {Application of blockchain technology in the data processing security system of financial enterprises}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.230}, doi = {10.1002/SPY2.230}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Yu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/DansoMGDS23, author = {Juliana Mantebea Danso and Yaw Marfo Missah and Enoch Opanin Gyamfi and Stephen Dankwa and Kwabena Sarpong}, title = {Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {2}, pages = {124}, year = {2023}, url = {https://doi.org/10.1007/s42979-022-01540-z}, doi = {10.1007/S42979-022-01540-Z}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/DansoMGDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bde/Ji23, author = {Wenjun Ji}, title = {Research and analysis of the security risk management strategy of big data technology in the financial industry}, booktitle = {Proceedings of the 2023 5th International Conference on Big Data Engineering, {BDE} 2023, Zhuhai, China, November 17-20, 2023}, pages = {67--72}, year = {2023}, crossref = {DBLP:conf/bde/2023}, url = {https://doi.org/10.1145/3640872.3640883}, doi = {10.1145/3640872.3640883}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bde/Ji23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/RazaviJEAH23, author = {Hooman Razavi and Mohammad Reza Jamali and Morvaridsadat Emsaki and Ali Ahmadi and Mostafa Hajiaghaei{-}Keshteli}, title = {Quantifying the Financial Impact of Cyber Security Attacks on Banks: {A} Big Data Analytics Approach}, booktitle = {{IEEE} Canadian Conference on Electrical and Computer Engineering, {CCECE} 2023, Regina, SK, Canada, September 24-27, 2023}, pages = {533--538}, year = {2023}, crossref = {DBLP:conf/ccece/2023}, url = {https://doi.org/10.1109/CCECE58730.2023.10288963}, doi = {10.1109/CCECE58730.2023.10288963}, timestamp = {Thu, 09 Nov 2023 15:01:12 +0100}, biburl = {https://dblp.org/rec/conf/ccece/RazaviJEAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/KavunLKLL23, author = {Sergii Kavun and Ruslana Levkina and Yana Kotko and Dmytro Levkin and Artur Levkin}, title = {Information Security in Project Management for the Financial and Budgetary Capacity of the National Economy (short paper)}, booktitle = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2023), Kyiv, Ukraine, October 26, 2023 (online)}, pages = {246--254}, year = {2023}, crossref = {DBLP:conf/cpits/2023-2}, url = {https://ceur-ws.org/Vol-3550/short8.pdf}, timestamp = {Fri, 24 Nov 2023 12:33:41 +0100}, biburl = {https://dblp.org/rec/conf/cpits/KavunLKLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/MehrnezhadA23, author = {Maryam Mehrnezhad and Teresa Almeida}, title = {"My sex-related data is more sensitive than my financial data and {I} want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies}, booktitle = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023}, pages = {1--14}, year = {2023}, crossref = {DBLP:conf/eurousec/2023}, url = {https://doi.org/10.1145/3617072.3617100}, doi = {10.1145/3617072.3617100}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/MehrnezhadA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsci/NurmaraHAJSKI23, author = {Muhammad Azril Kurniawan Nurmara and Muhammad Naufal Hakim and Oey Hans Christian Ardy and Reynaldo Jeffrey and Vincentius Albert Setiono and Bayu Kanigoro and Edy Irwansyah}, title = {A Review of Security in Financial Technology}, booktitle = {Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, {ICCSCI} 2023, 02-03 August 2023, Malang, Indonesia}, pages = {958--965}, year = {2023}, crossref = {DBLP:conf/iccsci/2023}, url = {https://doi.org/10.1016/j.procs.2023.10.603}, doi = {10.1016/J.PROCS.2023.10.603}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsci/NurmaraHAJSKI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/YeWWWYT23, author = {Xin Ye and Shimin Wang and Han Wang and Qinwei Wei and Ting Yang and Yu Tao}, title = {Application of Knowledge Graph in Financial Information Security Strategy}, booktitle = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, pages = {188--192}, year = {2023}, crossref = {DBLP:conf/iccsie/2023}, url = {https://doi.org/10.1145/3617184.3630130}, doi = {10.1145/3617184.3630130}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/YeWWWYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/BurkhanovTUINA23, author = {Aktam Usmanovich Burkhanov and Bobur Ortikmirzaevich Tursunov and Khusniddin Fakhriddinovich Uktamov and Jamshidxon Odilovich Imomov and Jasur Tursunpulotovich Nosirov and Barno Akbarova}, title = {Ways and Prospects of Rational Use of Production Capacity in Ensuring Financial Security in Textile Enterprises In The Conditions of Digital Economy Transformation}, booktitle = {Proceedings of the 7th International Conference on Future Networks and Distributed Systems, {ICFNDS} 2023, Dubai, United Arab Emirates, December 21-22, 2023}, pages = {234--242}, year = {2023}, crossref = {DBLP:conf/icfnds/2023}, url = {https://doi.org/10.1145/3644713.3644744}, doi = {10.1145/3644713.3644744}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/BurkhanovTUINA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitjo/ShalabiAA23, author = {Khawla Shalabi and Mustafa Al{-}Fayoumi and Qasem Abu Al{-}Haija}, title = {Enhancing Financial System Resilience Against Cyber Threats via {SWIFT} Customer Security Framework}, booktitle = {International Conference on Information Technology, {ICIT} 2023, Amman, Jordan, August 9-10, 2023}, pages = {260--265}, year = {2023}, crossref = {DBLP:conf/icitjo/2023}, url = {https://doi.org/10.1109/ICIT58056.2023.10226165}, doi = {10.1109/ICIT58056.2023.10226165}, timestamp = {Wed, 06 Sep 2023 16:07:28 +0200}, biburl = {https://dblp.org/rec/conf/icitjo/ShalabiAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BelliniLBSBR23, author = {Rosanna Bellini and Kevin Lee and Megan A. Brown and Jeremy Shaffer and Rasika Bhalerao and Thomas Ristenpart}, title = {The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {87--104}, year = {2023}, crossref = {DBLP:conf/uss/2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/bellini}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BelliniLBSBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangHMXMFTJ23, author = {Wansen Wang and Wenchao Huang and Zhaoyi Meng and Yan Xiong and Fuyou Miao and Xianjin Fang and Caichang Tu and Renjie Ji}, title = {Automated Inference on Financial Security of Ethereum Smart Contracts}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3367--3383}, year = {2023}, crossref = {DBLP:conf/uss/2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wang-wansen}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangHMXMFTJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2022w, editor = {Shin'ichiro Matsuo and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez Hernandez and Sam Werner and Thomas Haines and Aleksander Essex and Andrea Bracciali and Massimiliano Sala}, title = {Financial Cryptography and Data Security. {FC} 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13412}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-32415-4}, doi = {10.1007/978-3-031-32415-4}, isbn = {978-3-031-32414-7}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2022w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-05956, author = {Maryam Mehrnezhad and Teresa Almeida}, title = {"My sex-related data is more sensitive than my financial data and {I} want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies}, journal = {CoRR}, volume = {abs/2306.05956}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.05956}, doi = {10.48550/ARXIV.2306.05956}, eprinttype = {arXiv}, eprint = {2306.05956}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-05956.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-18668, author = {Prof N. Jeenath Laila and Dr G. Tamilpavai}, title = {FinBTech: Blockchain-Based Video and Voice Authentication System for Enhanced Security in Financial Transactions Utilizing FaceNet512 and Gaussian Mixture Models}, journal = {CoRR}, volume = {abs/2310.18668}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.18668}, doi = {10.48550/ARXIV.2310.18668}, eprinttype = {arXiv}, eprint = {2310.18668}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-18668.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Maikowski22, author = {Alfons Michael Maikowski}, title = {Why do financial institutions implement blockchain technology in security settlement?: {A} conceptual framework for blockchain business cases}, school = {Technical University of Berlin, Germany}, year = {2022}, url = {https://nbn-resolving.org/urn:nbn:de:101:1-2022081002022118546923}, urn = {urn:nbn:de:101:1-2022081002022118546923}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Maikowski22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SunWZ22, author = {Qi Sun and Hong Wu and Binglong Zhao}, title = {Artificial intelligence technology in internet financial edge computing and analysis of security risk}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {39}, number = {4}, pages = {201--210}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.121654}, doi = {10.1504/IJAHUC.2022.121654}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/SunWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/ZhouW22, author = {Xiuying Zhou and Huaqun Weng}, title = {Assessing information security performance of enterprise internal financial sharing in cloud computing environment using analytic hierarchy process}, journal = {Int. J. Grid Util. Comput.}, volume = {13}, number = {2/3}, pages = {256--271}, year = {2022}, url = {https://doi.org/10.1504/IJGUC.2022.124398}, doi = {10.1504/IJGUC.2022.124398}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/ZhouW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfomandi/AmponsahAW22, author = {Anokye Acheampong Amponsah and Adebayo Felix Adekoya and Benjamin Asubam Weyori}, title = {Improving the Financial Security of National Health Insurance using Cloud-Based Blockchain Technology Application}, journal = {Int. J. Inf. Manag. Data Insights}, volume = {2}, number = {1}, pages = {100081}, year = {2022}, url = {https://doi.org/10.1016/j.jjimei.2022.100081}, doi = {10.1016/J.JJIMEI.2022.100081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfomandi/AmponsahAW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ShiZZDLL22, author = {Hongfang Shi and Wenying Zhang and Zimin Zhang and Dewen Ding and Huimin Liu and Hong Lei}, title = {Understanding digit-only financial account passwords: {ID} card, structure, and security}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {11}, pages = {8635--8652}, year = {2022}, url = {https://doi.org/10.1002/int.22959}, doi = {10.1002/INT.22959}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ShiZZDLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KwatengAT22, author = {Kwame Owusu Kwateng and Christopher Amanor and Francis Kamewor Tetteh}, title = {Enterprise risk management and information technology security in the financial sector}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {422--451}, year = {2022}, url = {https://doi.org/10.1108/ICS-11-2020-0185}, doi = {10.1108/ICS-11-2020-0185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KwatengAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jeim/TayaksiAKS22, author = {Cansu Tayaksi and Erhan Ada and Yigit Kazan{\c{c}}oglu and Muhittin Sagnak}, title = {The financial impacts of information systems security breaches on publicly traded companies: reactions of different sectors}, journal = {J. Enterp. Inf. Manag.}, volume = {35}, number = {2}, pages = {650--668}, year = {2022}, url = {https://doi.org/10.1108/JEIM-11-2020-0450}, doi = {10.1108/JEIM-11-2020-0450}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jeim/TayaksiAKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/WuSWL22, author = {Wenqing Wu and Kun Shi and Chia{-}Huei Wu and Jiayue Liu}, title = {Research on the Impact of Information Security Certification and Concealment on Financial Performance: Impact of {ISO} 27001 and Concealment on Performance}, journal = {J. Glob. Inf. Manag.}, volume = {30}, number = {3}, pages = {1--16}, year = {2022}, url = {https://doi.org/10.4018/jgim.20220701.oa2}, doi = {10.4018/JGIM.20220701.OA2}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jgim/WuSWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/QasaimehHYATL22, author = {Malik Qasaimeh and Rand Abu Hammour and Muneer O. Bani Yassein and Raad S. Al{-}Qassas and Juan Alfonso Lara Torralbo and David Lizcano}, title = {Advanced security testing using a cyber-attack forecasting model: {A} case study of financial institutions}, journal = {J. Softw. Evol. Process.}, volume = {34}, number = {11}, year = {2022}, url = {https://doi.org/10.1002/smr.2489}, doi = {10.1002/SMR.2489}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smr/QasaimehHYATL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/systems/DengZDFL22, author = {Shangkun Deng and Yingke Zhu and Shuangyang Duan and Zhe Fu and Zonghua Liu}, title = {Stock Price Crash Warning in the Chinese Security Market Using a Machine Learning-Based Method and Financial Indicators}, journal = {Syst.}, volume = {10}, number = {4}, pages = {108}, year = {2022}, url = {https://doi.org/10.3390/systems10040108}, doi = {10.3390/SYSTEMS10040108}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/systems/DengZDFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/LiF22, author = {Yueqi Li and Ingrid Fisher}, title = {Digital Financial Literacy, Risk Aversion, and College Students' Online Security Behavior}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {4807--4811}, year = {2022}, crossref = {DBLP:conf/bigdataconf/2022}, url = {https://doi.org/10.1109/BigData55660.2022.10020556}, doi = {10.1109/BIGDATA55660.2022.10020556}, timestamp = {Tue, 11 Jun 2024 10:44:02 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/LiF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bisec/MircevskiPAS22, author = {Julijana Mircevski and Nikola B. Popovic and Mirjana Andric and Branko Stanojev}, title = {Security of Financial Software to Support Cryptocurrency Trading}, booktitle = {Proceedings of the 13th International Conference on Business Information Security (BISEC-2022), Belgrade, Serbia, December 02, 2022}, pages = {20--26}, year = {2022}, crossref = {DBLP:conf/bisec/2022}, url = {https://ceur-ws.org/Vol-3529/short\_3.pdf}, timestamp = {Tue, 19 Dec 2023 17:15:12 +0100}, biburl = {https://dblp.org/rec/conf/bisec/MircevskiPAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/Liu22e, author = {Tian Liu}, title = {Research on Information Security of Enterprise Group Financial Sharing in Cloud Computing Environment}, booktitle = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, pages = {1201--1207}, year = {2022}, crossref = {DBLP:conf/eitce/2022}, url = {https://doi.org/10.1145/3573428.3573642}, doi = {10.1145/3573428.3573642}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/Liu22e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TiwariAJDDRG22, author = {Pratyush Ranjan Tiwari and Dhruv Agarwal and Prakhar Jain and Swagam Dasgupta and Preetha Datta and Vineet Reddy and Debayan Gupta}, title = {India's "Aadhaar" Biometric {ID:} Structure, Security, and Vulnerabilities}, booktitle = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, pages = {672--693}, year = {2022}, crossref = {DBLP:conf/fc/2022}, url = {https://doi.org/10.1007/978-3-031-18283-9\_34}, doi = {10.1007/978-3-031-18283-9\_34}, timestamp = {Tue, 25 Oct 2022 22:22:45 +0200}, biburl = {https://dblp.org/rec/conf/fc/TiwariAJDDRG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/CastellanoFP22, author = {Nicola G. Castellano and Carsten Felden and Robert E. Pinsker}, title = {Shadow {IT} Behavior of Financial Executives in Germany and Italy as an Antecedent to Internal Data Security Breaches}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--11}, year = {2022}, crossref = {DBLP:conf/hicss/2022}, url = {http://hdl.handle.net/10125/80105}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/CastellanoFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/Tursunov22a, author = {Bobir Tursunov}, title = {Financial Security in Small Business in period of Digital Economy: in Case of Uzbekistan}, booktitle = {Proceedings of the 6th International Conference on Future Networks {\&} Distributed Systems, {ICFNDS} 2022, Tashkent, Uzbekistan, 15 December 2022}, pages = {491--498}, year = {2022}, crossref = {DBLP:conf/icfnds/2022}, url = {https://doi.org/10.1145/3584202.3584275}, doi = {10.1145/3584202.3584275}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/Tursunov22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/ZarovaT22, author = {Elena Zarova and Bobir Tursunov}, title = {Methodology for Assessing the Financial Security of Enterprises in the Post-Pandemic period of Digital Economy}, booktitle = {Proceedings of the 6th International Conference on Future Networks {\&} Distributed Systems, {ICFNDS} 2022, Tashkent, Uzbekistan, 15 December 2022}, pages = {110--115}, year = {2022}, crossref = {DBLP:conf/icfnds/2022}, url = {https://doi.org/10.1145/3584202.3584219}, doi = {10.1145/3584202.3584219}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/ZarovaT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/LiZX22, author = {Jin Li and Tong Zhang and Shen Xu}, title = {The Impact of Financial Restatement on Reported Data Security Breach}, booktitle = {26th Pacific Asia Conference on Information Systems, {PACIS} 2022, Virtual Event / Taipei, Taiwan / Sydney, Australia, July 5-9, 2022}, pages = {283}, year = {2022}, crossref = {DBLP:conf/pacis/2022}, url = {https://aisel.aisnet.org/pacis2022/283}, timestamp = {Fri, 22 Jul 2022 11:46:17 +0200}, biburl = {https://dblp.org/rec/conf/pacis/LiZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustHKS22, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Financially Backed Covert Security}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, pages = {99--129}, year = {2022}, crossref = {DBLP:conf/pkc/2022-2}, url = {https://doi.org/10.1007/978-3-030-97131-1\_4}, doi = {10.1007/978-3-030-97131-1\_4}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FaustHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2022, editor = {Ittay Eyal and Juan A. Garay}, title = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13411}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18283-9}, doi = {10.1007/978-3-031-18283-9}, isbn = {978-3-031-18282-2}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12960, author = {Wansen Wang and Wenchao Huang and Zhaoyi Meng and Yan Xiong and Fuyou Miao and Xianjin Fang and Caichang Tu and Renjie Ji}, title = {An Automated Analyzer for Financial Security of Ethereum Smart Contracts}, journal = {CoRR}, volume = {abs/2208.12960}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12960}, doi = {10.48550/ARXIV.2208.12960}, eprinttype = {arXiv}, eprint = {2208.12960}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12960.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/GervaisV22, author = {Arthur Gervais and Marie Vasek}, title = {Security of Decentralized Financial Technologies (Dagstuhl Seminar 22421)}, journal = {Dagstuhl Reports}, volume = {12}, number = {10}, pages = {129--142}, year = {2022}, url = {https://doi.org/10.4230/DagRep.12.10.129}, doi = {10.4230/DAGREP.12.10.129}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/GervaisV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/GoelWHW21, author = {Sanjay Goel and Kevin J. Williams and Jingyi Huang and Merrill Warkentin}, title = {Can financial incentives help with the struggle for security policy compliance?}, journal = {Inf. Manag.}, volume = {58}, number = {4}, pages = {103447}, year = {2021}, url = {https://doi.org/10.1016/j.im.2021.103447}, doi = {10.1016/J.IM.2021.103447}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/GoelWHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MassacciN21, author = {Fabio Massacci and Chan Nam Ngo}, title = {Distributed Financial Exchanges: Security Challenges and Design Principles}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {54--64}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.2994826}, doi = {10.1109/MSEC.2020.2994826}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MassacciN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbir/AkhtarSBV21, author = {Shahzeb Akhtar and Pratima Amol Sheorey and Sonali Bhattacharya and Ajith Kumar Vadakki Veetil}, title = {Cyber Security Solutions for Businesses in Financial Services: Challenges, Opportunities, and the Way Forward}, journal = {Int. J. Bus. Intell. Res.}, volume = {12}, number = {1}, pages = {82--97}, year = {2021}, url = {https://doi.org/10.4018/ijbir.20210101.oa5}, doi = {10.4018/IJBIR.20210101.OA5}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbir/AkhtarSBV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/QuLB21, author = {Qiao Qu and Cheng Liu and Xinzhong Bao}, title = {Financial Security Analysis of E-Commerce Platform Based on Supply Chain for Heterogeneous Network Location Verification}, journal = {J. Sensors}, volume = {2021}, pages = {1--14}, year = {2021}, url = {https://doi.org/10.1155/2021/7952123}, doi = {10.1155/2021/7952123}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/QuLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/WeiY21, author = {Ran Wei and Sheng Yao}, title = {Enterprise Financial Risk Identification and Information Security Management and Control in Big Data Environment}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {7188327:1--7188327:6}, year = {2021}, url = {https://doi.org/10.1155/2021/7188327}, doi = {10.1155/2021/7188327}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/WeiY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/EduAA21, author = {Sampson Abeeku Edu and Mary Agoyi and Divine Quazie Agozie}, title = {Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: {FMEA} and {FTOPSIS} analysis}, journal = {PeerJ Comput. Sci.}, volume = {7}, pages = {e658}, year = {2021}, url = {https://doi.org/10.7717/peerj-cs.658}, doi = {10.7717/PEERJ-CS.658}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/EduAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiam/LinX21, author = {Zhisheng Lin and Yan Xia}, title = {Network Security of University Financial Sharing Platform under the Background of Smart Campus}, booktitle = {{AIAM} 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23 - 25, 2021}, pages = {1304--1308}, year = {2021}, crossref = {DBLP:conf/aiam/2021-2}, url = {https://doi.org/10.1145/3495018.3495387}, doi = {10.1145/3495018.3495387}, timestamp = {Thu, 24 Mar 2022 09:42:53 +0100}, biburl = {https://dblp.org/rec/conf/aiam/LinX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/BatorshynaTKCH21, author = {Adilia Batorshyna and Volodymyr Tokar and Natalia Kotenko and Serhii Chekhovych and Andrii Homotiuk}, title = {The Impact of Awareness Stimulating Activities and Events on Global Islamic Finance Assets: Enhancing Financial Risk Management and Economic Security in Non-Muslim Countries}, booktitle = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II.} Volume {I} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2021), Kyiv, Ukraine, October 26, 2021 (online)}, pages = {13--26}, year = {2021}, crossref = {DBLP:conf/cpits/2021-1}, url = {https://ceur-ws.org/Vol-3187/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:31 +0100}, biburl = {https://dblp.org/rec/conf/cpits/BatorshynaTKCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/KreidychKK21, author = {Iryna Kreidych and leksandr Kharchenko and Oksana Kazak}, title = {Solvency Management in the Financial Security System of Housing and Communal Services}, booktitle = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II.} Volume {II} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2021), Kyiv, Ukraine, October 26, 2021 (online)}, pages = {63--75}, year = {2021}, crossref = {DBLP:conf/cpits/2021-2}, url = {https://ceur-ws.org/Vol-3188/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:31 +0100}, biburl = {https://dblp.org/rec/conf/cpits/KreidychKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DasKC21, author = {Sanchari Das and Andrew Kim and L. Jean Camp}, title = {Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for {MFA} Adoption}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, pages = {406--413}, year = {2021}, crossref = {DBLP:conf/fc/2021-2}, url = {https://doi.org/10.1007/978-3-662-64331-0\_21}, doi = {10.1007/978-3-662-64331-0\_21}, timestamp = {Thu, 16 Mar 2023 14:52:53 +0100}, biburl = {https://dblp.org/rec/conf/fc/DasKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icict/MohananSB21, author = {Sudhish Mohanan and Nandagopal Sridhar and Sajal Bhatia}, title = {Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector}, booktitle = {Proceedings of Sixth International Congress on Information and Communication Technology - {ICICT} 2021, London, UK, Volume 2}, pages = {1015--1025}, year = {2021}, crossref = {DBLP:conf/icict/2021-2}, url = {https://doi.org/10.1007/978-981-16-2380-6\_90}, doi = {10.1007/978-981-16-2380-6\_90}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icict/MohananSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icise/FacciaSEB21, author = {Alessio Faccia and Nedal Sawan and Ahmed Eltweri and Zeenat Beebeejaun}, title = {Financial Big Data Security and Privacy in X-Accounting. {A} Step Further to Implement the Triple-Entry Accounting}, booktitle = {{ICISE} 2021: The 6th International Conference on Information Systems Engineering, Shanghai, China, November 12 - 14, 2021}, pages = {7--12}, year = {2021}, crossref = {DBLP:conf/icise/2021}, url = {https://doi.org/10.1145/3503928.3503932}, doi = {10.1145/3503928.3503932}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icise/FacciaSEB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ico/SattarMSPBPK21, author = {Md Rahat Ibne Sattar and Shrabonti Mitra and Sadia Sultana and Umme Salma Pushpa and Dhruba Bhattacharjee and Abhijit Pathak and Mayeen Uddin Khandaker}, title = {A Secured Network Layer and Information Security for Financial Institutions: {A} Case Study}, booktitle = {{ICO}}, pages = {992--1001}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93247-3\_94}, doi = {10.1007/978-3-030-93247-3\_94}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ico/SattarMSPBPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/TanCC21, author = {Vincent Tan and Carmen Cheh and Binbin Chen}, title = {From Application Security Verification Standard {(ASVS)} to Regulation Compliance: {A} Case Study in Financial Services Sector}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021}, pages = {69--76}, year = {2021}, crossref = {DBLP:conf/issre/2021w}, url = {https://doi.org/10.1109/ISSREW53611.2021.00046}, doi = {10.1109/ISSREW53611.2021.00046}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/TanCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021-1, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8}, doi = {10.1007/978-3-662-64322-8}, isbn = {978-3-662-64321-1}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021-2, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0}, doi = {10.1007/978-3-662-64331-0}, isbn = {978-3-662-64330-3}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021w, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0}, doi = {10.1007/978-3-662-63958-0}, isbn = {978-3-662-63957-3}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2021w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHKS21a, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Financially Backed Covert Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1652}, year = {2021}, url = {https://eprint.iacr.org/2021/1652}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustHKS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitdm/Balashunmugaraja20, author = {B. Balashunmugaraja and T. R. Ganeshbabu}, title = {Optimal Key Generation for Data Sanitization and Restoration of Cloud Data: Future of Financial Cyber Security}, journal = {Int. J. Inf. Technol. Decis. Mak.}, volume = {19}, number = {4}, pages = {987--1013}, year = {2020}, url = {https://doi.org/10.1142/S0219622020500200}, doi = {10.1142/S0219622020500200}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitdm/Balashunmugaraja20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DzidzahKA20, author = {Esther Dzidzah and Kwame Owusu Kwateng and Benjamin Kofi Asante}, title = {Security behaviour of mobile financial service users}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {719--741}, year = {2020}, url = {https://doi.org/10.1108/ICS-02-2020-0021}, doi = {10.1108/ICS-02-2020-0021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DzidzahKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbft/KaulH20, author = {Sonam Devgan Kaul and Dimitrios Hatzinakos}, title = {Intelligent {RFID} biometric enabled dual security lock in the banking environment}, journal = {J. Bank. Financial Technol.}, volume = {4}, number = {2}, pages = {159--173}, year = {2020}, url = {https://doi.org/10.1007/s42786-020-00022-1}, doi = {10.1007/S42786-020-00022-1}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbft/KaulH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/PanWH20, author = {Shuang Pan and Jianguo Wei and Shaobo Hu}, title = {A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping and Intelligent Learning in Financial Security System}, journal = {Multim. Tools Appl.}, volume = {79}, number = {13-14}, pages = {9163--9176}, year = {2020}, url = {https://doi.org/10.1007/s11042-018-7144-5}, doi = {10.1007/S11042-018-7144-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/PanWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Moeckel20, author = {Caroline Moeckel}, title = {Attacker-centric thinking in security: perspectives from financial services practitioners}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {1:1--1:10}, year = {2020}, crossref = {DBLP:conf/IEEEares/2020}, url = {https://doi.org/10.1145/3407023.3407082}, doi = {10.1145/3407023.3407082}, timestamp = {Mon, 03 Aug 2020 16:17:13 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Moeckel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/PhamH20, author = {Thai Pham and Farkhondeh Hassandoust}, title = {The Role of External Mechanisms and Transformational Leadership in Information Security Policy Effectiveness: {A} Managerial Perspective of Financial Industry in Vietnam}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2020, Wellington, New Zealand, December 1-4, 2020}, pages = {79}, year = {2020}, crossref = {DBLP:conf/acis/2020}, url = {https://aisel.aisnet.org/acis2020/79}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/PhamH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atci/HuH20, author = {Shuyu Hu and Ming Huang}, title = {Internet Financial Security Based on Big Data}, booktitle = {2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI} 2020), Fuyang, China, 20-22 June, 2020}, pages = {485--490}, year = {2020}, crossref = {DBLP:conf/atci/2020}, url = {https://doi.org/10.1007/978-3-030-53980-1\_72}, doi = {10.1007/978-3-030-53980-1\_72}, timestamp = {Tue, 05 Apr 2022 12:05:39 +0200}, biburl = {https://dblp.org/rec/conf/atci/HuH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dessert/SirenkoAVPMF20, author = {Natalia N. Sirenko and Igor P. Atamanyuk and Yuriy Volosyuk and Anastasiya Poltorak and Olha Melnyk and Polina Fenenko}, title = {Paradigm Changes that Strengthen the Financial Security of the State through {FINTECH} Development}, booktitle = {11th {IEEE} International Conference on Dependable Systems, Services and Technologies, {DESSERT} 2020, Kyiv, Ukraine, May 14-18, 2020}, pages = {110--116}, year = {2020}, crossref = {DBLP:conf/dessert/2020}, url = {https://doi.org/10.1109/DESSERT50317.2020.9125026}, doi = {10.1109/DESSERT50317.2020.9125026}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dessert/SirenkoAVPMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KulykRAMGV20, author = {Oksana Kulyk and Benjamin Reinheimer and Lukas Aldag and Peter Mayer and Nina Gerber and Melanie Volkamer}, title = {Security and Privacy Awareness in Smart Environments - {A} Cross-Country Investigation}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, pages = {84--101}, year = {2020}, crossref = {DBLP:conf/fc/2020w}, url = {https://doi.org/10.1007/978-3-030-54455-3\_7}, doi = {10.1007/978-3-030-54455-3\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KulykRAMGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OyebisiN20, author = {David Oyebisi and Kennedy Njenga}, title = {Behaviour of Outsourced Employees as Sources of Information System Security Threats}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, pages = {137--148}, year = {2020}, crossref = {DBLP:conf/fc/2020w}, url = {https://doi.org/10.1007/978-3-030-54455-3\_10}, doi = {10.1007/978-3-030-54455-3\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/OyebisiN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SuBSUM20, author = {Jianan Su and Michael Bartholic and Andrew Stange and Ryosuke Ushida and Shin'ichiro Matsuo}, title = {How to Dynamically Incentivize Sufficient Level of IoT Security}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, pages = {451--465}, year = {2020}, crossref = {DBLP:conf/fc/2020w}, url = {https://doi.org/10.1007/978-3-030-54455-3\_32}, doi = {10.1007/978-3-030-54455-3\_32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/SuBSUM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Taylor-JacksonM20, author = {Jacqui Taylor{-}Jackson and John McAlaney and Jeffrey L. Foster and Abubakar Bello and Alana Maurushat and John Dale}, title = {Incorporating Psychology into Cyber Security Education: {A} Pedagogical Approach}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, pages = {207--217}, year = {2020}, crossref = {DBLP:conf/fc/2020w}, url = {https://doi.org/10.1007/978-3-030-54455-3\_15}, doi = {10.1007/978-3-030-54455-3\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Taylor-JacksonM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/WangYPB0D020, author = {Qin Wang and Jiangshan Yu and Zhiniang Peng and Van Cuong Bui and Shiping Chen and Yong Ding and Yang Xiang}, title = {Security Analysis on dBFT Protocol of {NEO}}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, pages = {20--31}, year = {2020}, crossref = {DBLP:conf/fc/2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_2}, doi = {10.1007/978-3-030-51280-4\_2}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/WangYPB0D020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/YuenSLAEZG20, author = {Tsz Hon Yuen and Shifeng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu}, title = {RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, pages = {464--483}, year = {2020}, crossref = {DBLP:conf/fc/2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_25}, doi = {10.1007/978-3-030-51280-4\_25}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/YuenSLAEZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ChenGCZL20, author = {Weili Chen and Xiongfeng Guo and Zhiguang Chen and Zibin Zheng and Yutong Lu}, title = {Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem}, booktitle = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, pages = {4506--4512}, year = {2020}, crossref = {DBLP:conf/ijcai/2020}, url = {https://doi.org/10.24963/ijcai.2020/621}, doi = {10.24963/IJCAI.2020/621}, timestamp = {Mon, 20 Jul 2020 12:38:52 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/ChenGCZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isdmci/KulyniakOR20, author = {Ihor Kulyniak and Solomiya Ohinok and Halyna Rachynska}, title = {Scientific and Methodological Approach to Assessing the Level of Banks' Financial Security}, booktitle = {Lecture Notes in Computational Intelligence and Decision Making - Proceedings of the 2020 International Scientific Conference "Intellectual Systems of Decision-making and Problems of Computational Intelligence", {ISDMCI} 2020, Kherson, Ukraine, May 25-29, 2020}, pages = {77--97}, year = {2020}, crossref = {DBLP:conf/isdmci/2020}, url = {https://doi.org/10.1007/978-3-030-54215-3\_6}, doi = {10.1007/978-3-030-54215-3\_6}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isdmci/KulyniakOR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/m3e2/KhrushchHHLPV20, author = {Nila Khrushch and Pavlo Hryhoruk and Tetiana Hovorushchenko and Sergii Lysenko and Liudmyla Prystupa and Liudmyla Vahanova}, title = {Assessment of bank's financial security levels based on a comprehensive index using information technology}, booktitle = {Proceedings of the Selected Papers of the Special Edition of International Conference on Monitoring, Modeling {\&} Management of Emergent Economy {(M3E2-MLPEED} 2020), Odessa, Ukraine, July 13-18, 2020}, pages = {239--260}, year = {2020}, crossref = {DBLP:conf/m3e2/2020}, url = {https://ceur-ws.org/Vol-2713/paper23.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:44 +0100}, biburl = {https://dblp.org/rec/conf/m3e2/KhrushchHHLPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BelloP20, author = {Gabriel Bello and Alfredo J. Perez}, title = {On the Application of Financial Security Standards in Blockchain Platforms}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, pages = {247--267}, year = {2020}, crossref = {DBLP:series/ais/79}, url = {https://doi.org/10.1007/978-3-030-38181-3\_13}, doi = {10.1007/978-3-030-38181-3\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BelloP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2019w, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-43725-1}, doi = {10.1007/978-3-030-43725-1}, isbn = {978-3-030-43724-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2019w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2020, editor = {Joseph Bonneau and Nadia Heninger}, title = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4}, doi = {10.1007/978-3-030-51280-4}, isbn = {978-3-030-51279-8}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2020w, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3}, doi = {10.1007/978-3-030-54455-3}, isbn = {978-3-030-54454-6}, timestamp = {Sun, 09 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2020w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijais/McCalligRR19, author = {John McCallig and D. Alastair Robb and Fiona H. Rohde}, title = {Establishing the representational faithfulness of financial accounting information using multiparty security, network analysis and a blockchain}, journal = {Int. J. Account. Inf. Syst.}, volume = {33}, pages = {47--58}, year = {2019}, url = {https://doi.org/10.1016/j.accinf.2019.03.004}, doi = {10.1016/J.ACCINF.2019.03.004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijais/McCalligRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssmet/Feltus19, author = {Christophe Feltus}, title = {Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector}, journal = {Int. J. Serv. Sci. Manag. Eng. Technol.}, volume = {10}, number = {4}, pages = {1--25}, year = {2019}, url = {https://doi.org/10.4018/IJSSMET.2019100101}, doi = {10.4018/IJSSMET.2019100101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssmet/Feltus19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbft/DasguptaSG19, author = {Dipankar Dasgupta and John M. Shrein and Kishor Datta Gupta}, title = {A survey of blockchain from security perspective}, journal = {J. Bank. Financial Technol.}, volume = {3}, number = {1}, pages = {1--17}, year = {2019}, url = {https://doi.org/10.1007/s42786-018-00002-6}, doi = {10.1007/S42786-018-00002-6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbft/DasguptaSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/BarthJJHR19, author = {Susanne Barth and Menno D. T. de Jong and Marianne Junger and Pieter H. Hartel and Janina C. Roppelt}, title = {Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources}, journal = {Telematics Informatics}, volume = {41}, pages = {55--69}, year = {2019}, url = {https://doi.org/10.1016/j.tele.2019.03.003}, doi = {10.1016/J.TELE.2019.03.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tele/BarthJJHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SleeperMOTWSOSC19, author = {Manya Sleeper and Tara Matthews and Kathleen O'Leary and Anna Turner and Jill Palzkill Woelfer and Martin Shelton and Andrew Oplinger and Andreas Schou and Sunny Consolvo}, title = {Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {89}, year = {2019}, crossref = {DBLP:conf/chi/2019}, url = {https://doi.org/10.1145/3290605.3300319}, doi = {10.1145/3290605.3300319}, timestamp = {Sun, 02 Jun 2019 21:13:35 +0200}, biburl = {https://dblp.org/rec/conf/chi/SleeperMOTWSOSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/MahalleYT19a, author = {Abhishek Mahalle and Jianming Yong and Xiaohui Tao}, title = {Ethics of {IT} Security Team for Cloud Architecture Infrastructure in Banking and Financial Services Industry}, booktitle = {23rd {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2019, Porto, Portugal, May 6-8, 2019}, pages = {506--511}, year = {2019}, crossref = {DBLP:conf/cscwd/2019}, url = {https://doi.org/10.1109/CSCWD.2019.8791928}, doi = {10.1109/CSCWD.2019.8791928}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/MahalleYT19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AchenbachGH0LMM19, author = {Dirk Achenbach and Roland Gr{\"{o}}ll and Timon Hackenjos and Alexander Koch and Bernhard L{\"{o}}we and Jeremias Mechler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Jochen Rill}, title = {Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the {UC} Framework}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, pages = {243--261}, year = {2019}, crossref = {DBLP:conf/fc/2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_16}, doi = {10.1007/978-3-030-32101-7\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AchenbachGH0LMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AvarikiotiK0W19, author = {Georgia Avarikioti and Lukas K{\"{a}}ppeli and Yuyi Wang and Roger Wattenhofer}, title = {Bitcoin Security Under Temporary Dishonest Majority}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, pages = {466--483}, year = {2019}, crossref = {DBLP:conf/fc/2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_28}, doi = {10.1007/978-3-030-32101-7\_28}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AvarikiotiK0W19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OzmenBY19, author = {Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz}, title = {Fast Authentication from Aggregate Signatures with Improved Security}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, pages = {686--705}, year = {2019}, crossref = {DBLP:conf/fc/2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_39}, doi = {10.1007/978-3-030-32101-7\_39}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/OzmenBY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/m3e2/HryhorukKG19, author = {Pavlo Hryhoruk and Nila Khrushch and Svitlana Grygoruk}, title = {Model for Assessment of the Financial Security Level of the Enterprise Based on the Desirability Scale}, booktitle = {Proceedings of the Selected Papers of the 8th International Conference on Monitoring, Modeling {\&} Management of Emergent Economy, {M3E2-EEMLPEED} 2019, Odessa, Ukraine, May 22-24, 2019}, pages = {169--180}, year = {2019}, crossref = {DBLP:conf/m3e2/2019}, url = {https://ceur-ws.org/Vol-2422/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:44 +0100}, biburl = {https://dblp.org/rec/conf/m3e2/HryhorukKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/TroianoSPPMD19, author = {Ernesto Troiano and John Soldatos and Ariana Polyviou and Andreas Polyviou and Alessandro Mamelli and Dimitris Drakoulis}, title = {Big Data Platform for Integrated Cyber and Physical Security of Critical Infrastructures for the Financial Sector: Critical Infrastructures as Cyber-Physical Systems}, booktitle = {11th International Conference on Management of Digital EcoSystems, {MEDES} 2019, Limassol, Cyprus, November, 2019}, pages = {262--269}, year = {2019}, crossref = {DBLP:conf/medes/2019}, url = {https://doi.org/10.1145/3297662.3365787}, doi = {10.1145/3297662.3365787}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/medes/TroianoSPPMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FettHK19, author = {Daniel Fett and Pedram Hosseyni and Ralf K{\"{u}}sters}, title = {An Extensive Formal Security Analysis of the OpenID Financial-Grade {API}}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {453--471}, year = {2019}, crossref = {DBLP:conf/sp/2019}, url = {https://doi.org/10.1109/SP.2019.00067}, doi = {10.1109/SP.2019.00067}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/FettHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mavroudis19, author = {Vasilios Mavroudis}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, pages = {91--103}, year = {2019}, crossref = {DBLP:conf/spw/2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_9}, doi = {10.1007/978-3-030-57043-9\_9}, timestamp = {Mon, 24 Aug 2020 16:33:11 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mavroudis19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mavroudis19a, author = {Vasilios Mavroudis}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, pages = {104--112}, year = {2019}, crossref = {DBLP:conf/spw/2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_10}, doi = {10.1007/978-3-030-57043-9\_10}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mavroudis19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2018w, editor = {Aviv Zohar and Ittay Eyal and Vanessa Teague and Jeremy Clark and Andrea Bracciali and Federico Pintore and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10958}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-662-58820-8}, doi = {10.1007/978-3-662-58820-8}, isbn = {978-3-662-58819-2}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2018w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2019, editor = {Ian Goldberg and Tyler Moore}, title = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7}, doi = {10.1007/978-3-030-32101-7}, isbn = {978-3-030-32100-0}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-11520, author = {Daniel Fett and Pedram Hosseyni and Ralf K{\"{u}}sters}, title = {An Extensive Formal Security Analysis of the OpenID Financial-grade {API}}, journal = {CoRR}, volume = {abs/1901.11520}, year = {2019}, url = {http://arxiv.org/abs/1901.11520}, eprinttype = {arXiv}, eprint = {1901.11520}, timestamp = {Mon, 04 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-11520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Pan18, author = {Liuxuan Pan}, title = {Application of a financial quantitative risk model to information security risk assessment}, school = {Royal Holloway, University of London, Egham, {UK}}, year = {2018}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792802}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Pan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/Nkeki18a, author = {Charles I. Nkeki}, title = {Optimal investment risks and debt management with backup security in a financial crisis}, journal = {J. Comput. Appl. Math.}, volume = {338}, pages = {129--152}, year = {2018}, url = {https://doi.org/10.1016/j.cam.2018.01.032}, doi = {10.1016/J.CAM.2018.01.032}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcam/Nkeki18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taasm/Lee18, author = {Kyoung{-}Joo Lee}, title = {Strategic human resource management for university-industry collaborations in Korea: financial incentives for academic faculty and employment security of industry liaison offices}, journal = {Technol. Anal. Strateg. Manag.}, volume = {30}, number = {4}, pages = {461--472}, year = {2018}, url = {https://doi.org/10.1080/09537325.2017.1337885}, doi = {10.1080/09537325.2017.1337885}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taasm/Lee18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/MahalleYT018, author = {Abhishek Mahalle and Jianming Yong and Xiaohui Tao and Jun Shen}, title = {Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure}, booktitle = {22nd {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2018, Nanjing, China, May 9-11, 2018}, pages = {407--413}, year = {2018}, crossref = {DBLP:conf/cscwd/2018}, url = {https://doi.org/10.1109/CSCWD.2018.8465318}, doi = {10.1109/CSCWD.2018.8465318}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/MahalleYT018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DasDC18, author = {Sanchari Das and Andrew Dingman and L. Jean Camp}, title = {Why Johnny Doesn't Use Two Factor {A} Two-Phase Usability Study of the {FIDO} {U2F} Security Key}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, pages = {160--179}, year = {2018}, crossref = {DBLP:conf/fc/2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_9}, doi = {10.1007/978-3-662-58387-6\_9}, timestamp = {Fri, 30 Aug 2019 11:17:01 +0200}, biburl = {https://dblp.org/rec/conf/fc/DasDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FarhangLG18, author = {Sadegh Farhang and Aron Laszka and Jens Grossklags}, title = {An Economic Study of the Effect of Android Platform Fragmentation on Security Updates}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, pages = {119--137}, year = {2018}, crossref = {DBLP:conf/fc/2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_7}, doi = {10.1007/978-3-662-58387-6\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/FarhangLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Shacham18, author = {Hovav Shacham}, title = {Short Unique Signatures from {RSA} with a Tight Security Reduction (in the Random Oracle Model)}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, pages = {61--79}, year = {2018}, crossref = {DBLP:conf/fc/2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_4}, doi = {10.1007/978-3-662-58387-6\_4}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Shacham18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Massacci18, author = {Fabio Massacci}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, pages = {55--62}, year = {2018}, crossref = {DBLP:conf/spw/2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_6}, doi = {10.1007/978-3-030-03251-7\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Massacci18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciN0W18, author = {Fabio Massacci and Chan Nam Ngo and Daniele Venturi and Julian Williams}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, pages = {45--54}, year = {2018}, crossref = {DBLP:conf/spw/2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_5}, doi = {10.1007/978-3-030-03251-7\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciN0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2018, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6}, doi = {10.1007/978-3-662-58387-6}, isbn = {978-3-662-58386-9}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TraynorBBR17, author = {Patrick Traynor and Kevin R. B. Butler and Jasmine D. Bowers and Bradley Reaves}, title = {FinTechSec: Addressing the Security Challenges of Digital Financial Services}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {5}, pages = {85--89}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.3681060}, doi = {10.1109/MSP.2017.3681060}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TraynorBBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChothiaGHS17, author = {Tom Chothia and Flavio D. Garcia and Chris Heppel and Chris McMahon Stone}, title = {Why Banker Bob (Still) Can't Get {TLS} Right: {A} Security Analysis of {TLS} in Leading {UK} Banking Apps}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, pages = {579--597}, year = {2017}, crossref = {DBLP:conf/fc/2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_33}, doi = {10.1007/978-3-319-70972-7\_33}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChothiaGHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Gjosteen017, author = {Kristian Gj{\o}steen and Martin Strand}, title = {A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, pages = {404--418}, year = {2017}, crossref = {DBLP:conf/fc/2017w}, url = {https://doi.org/10.1007/978-3-319-70278-0\_25}, doi = {10.1007/978-3-319-70278-0\_25}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/Gjosteen017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MalhotraGVKGG17, author = {Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and Haydn Kennedy and Jonathan Gardner and Sharon Goldberg}, title = {The Security of NTP's Datagram Protocol}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, pages = {405--423}, year = {2017}, crossref = {DBLP:conf/fc/2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_23}, doi = {10.1007/978-3-319-70972-7\_23}, timestamp = {Tue, 02 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/MalhotraGVKGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SzalachowskiP17, author = {Pawel Szalachowski and Adrian Perrig}, title = {Short Paper: On Deployment of DNS-Based Security Enhancements}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, pages = {424--433}, year = {2017}, crossref = {DBLP:conf/fc/2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_24}, doi = {10.1007/978-3-319-70972-7\_24}, timestamp = {Tue, 02 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/SzalachowskiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2016, editor = {Jens Grossklags and Bart Preneel}, title = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54970-4}, doi = {10.1007/978-3-662-54970-4}, isbn = {978-3-662-54969-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017, editor = {Aggelos Kiayias}, title = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7}, doi = {10.1007/978-3-319-70972-7}, isbn = {978-3-319-70971-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017w, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0}, doi = {10.1007/978-3-319-70278-0}, isbn = {978-3-319-70277-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/AppanB16, author = {Radha Appan and Dinko Bacic}, title = {Impact of Information Technology {(IT)} Security Information Sharing among Competing {IT} Firms on Firm's Financial Performance: An Empirical Investigation}, journal = {Commun. Assoc. Inf. Syst.}, volume = {39}, pages = {12}, year = {2016}, url = {https://doi.org/10.17705/1cais.03912}, doi = {10.17705/1CAIS.03912}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cais/AppanB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/ChunCS16, author = {Se{-}Hak Chun and Wooje Cho and Ramanath Subramanyam}, title = {Transaction security investments in online marketplaces: An analytical examination of financial liabilities}, journal = {Decis. Support Syst.}, volume = {92}, pages = {91--102}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.015}, doi = {10.1016/J.DSS.2016.09.015}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/ChunCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/PandeyS16, author = {Pankaj Pandey and Einar Snekkenes}, title = {Using Financial Instruments to Transfer the Information Security Risks}, journal = {Future Internet}, volume = {8}, number = {2}, pages = {20}, year = {2016}, url = {https://doi.org/10.3390/fi8020020}, doi = {10.3390/FI8020020}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/PandeyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/RoumaniNR16, author = {Yaman Roumani and Joseph K. Nwankpa and Yazan F. Roumani}, title = {Examining the relationship between firm's financial records and security vulnerabilities}, journal = {Int. J. Inf. Manag.}, volume = {36}, number = {6}, pages = {987--994}, year = {2016}, url = {https://doi.org/10.1016/j.ijinfomgt.2016.05.016}, doi = {10.1016/J.IJINFOMGT.2016.05.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfoman/RoumaniNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lp/LinZ16, author = {Songqing Lin and Lijuan Zhan}, title = {International publishing partnerships for China's English language journals and financial security}, journal = {Learn. Publ.}, volume = {29}, number = {3}, pages = {145--153}, year = {2016}, url = {https://doi.org/10.1002/leap.1029}, doi = {10.1002/LEAP.1029}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lp/LinZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Noh16, author = {Kyoo{-}Sung Noh}, title = {A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment}, journal = {Wirel. Pers. Commun.}, volume = {89}, number = {3}, pages = {761--775}, year = {2016}, url = {https://doi.org/10.1007/s11277-015-3116-5}, doi = {10.1007/S11277-015-3116-5}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Noh16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/GaiQE16a, author = {Keke Gai and Meikang Qiu and Sam Adam Elnagdy}, title = {Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data}, booktitle = {2nd {IEEE} International Conference on Big Data Security on Cloud, BigDataSecurity 2016, {IEEE} International Conference on High Performance and Smart Computing, {HPSC} 2016, and {IEEE} International Conference on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April 9-10, 2016}, pages = {197--202}, year = {2016}, crossref = {DBLP:conf/bigdatasec/2016}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.66}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.66}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/GaiQE16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AlgwilY16, author = {Abdalnaser Algwil and Jeff Yan}, title = {Failures of Security APIs: {A} New Case}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, pages = {283--298}, year = {2016}, crossref = {DBLP:conf/fc/2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_17}, doi = {10.1007/978-3-662-54970-4\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AlgwilY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KrombholzJGW16, author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl}, title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, pages = {555--580}, year = {2016}, crossref = {DBLP:conf/fc/2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_33}, doi = {10.1007/978-3-662-54970-4\_33}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KrombholzJGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LangCBSS16, author = {Juan Lang and Alexei Czeskis and Dirk Balfanz and Marius Schilder and Sampath Srinivas}, title = {Security Keys: Practical Cryptographic Second Factors for the Modern Web}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, pages = {422--440}, year = {2016}, crossref = {DBLP:conf/fc/2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_25}, doi = {10.1007/978-3-662-54970-4\_25}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/LangCBSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/WahlgrenFMK16, author = {Gunnar Wahlgren and Anna Fedotova and Alexandra Musaeva and Stewart Kowalski}, title = {{IT} Security Incidents Escalation in the Swedish Financial Sector: {A} Maturity Model Study}, booktitle = {Tenth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings}, pages = {45--55}, year = {2016}, crossref = {DBLP:conf/haisa/2016}, url = {http://www.cscan.org/openaccess/?paperid=281}, timestamp = {Tue, 06 Jul 2021 12:22:19 +0200}, biburl = {https://dblp.org/rec/conf/haisa/WahlgrenFMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhKC16, author = {Eun Oh and Tae{-}Sung Kim and Tae{-}Hee Cho}, title = {Development of Information Security Management Assessment Model for the Financial Sector}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, pages = {186--197}, year = {2016}, crossref = {DBLP:conf/wisa/2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_16}, doi = {10.1007/978-3-319-56549-1\_16}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2016w, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4}, doi = {10.1007/978-3-662-53357-4}, isbn = {978-3-662-53356-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2016w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijais/Otero15, author = {Angel R. Otero}, title = {An information security control assessment methodology for organizations' financial information}, journal = {Int. J. Account. Inf. Syst.}, volume = {18}, pages = {26--45}, year = {2015}, url = {https://doi.org/10.1016/j.accinf.2015.06.001}, doi = {10.1016/J.ACCINF.2015.06.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijais/Otero15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisss/Ifinedo15, author = {Princely Ifinedo}, title = {Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis}, journal = {Int. J. Inf. Syst. Serv. Sect.}, volume = {7}, number = {2}, pages = {54--70}, year = {2015}, url = {https://doi.org/10.4018/ijisss.2015040104}, doi = {10.4018/IJISSS.2015040104}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisss/Ifinedo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/PandeyH15, author = {Pankaj Pandey and Steven De Haes}, title = {A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security Risk}, booktitle = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015}, pages = {17--25}, year = {2015}, crossref = {DBLP:conf/3pgcic/2015}, url = {https://doi.org/10.1109/3PGCIC.2015.109}, doi = {10.1109/3PGCIC.2015.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/PandeyH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csa2/AhnC15, author = {JungJin Ahn and Eunmi Choi}, title = {Financial Security Protocol and Service Model for Joint Account Banking Transaction}, booktitle = {Advances in Computer Science and Ubiquitous Computing - {CSA} {\&} {CUTE} 2015, Cebu, Philippines, December 15-17, 2015}, pages = {521--527}, year = {2015}, crossref = {DBLP:conf/csa2/2015}, url = {https://doi.org/10.1007/978-981-10-0281-6\_75}, doi = {10.1007/978-981-10-0281-6\_75}, timestamp = {Fri, 08 Mar 2019 11:06:31 +0100}, biburl = {https://dblp.org/rec/conf/csa2/AhnC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Toorani15, author = {Mohsen Toorani}, title = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6 Standard}, booktitle = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, pages = {245--260}, year = {2015}, crossref = {DBLP:conf/fc/2015w}, url = {https://doi.org/10.1007/978-3-662-48051-9\_18}, doi = {10.1007/978-3-662-48051-9\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/GranadilloGDPM15, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar and Christophe Ponchel and Laura Rodriguez Martin}, title = {Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)}, booktitle = {7th International Conference on New Technologies, Mobility and Security, {NTMS} 2015, Paris, France, July 27-29, 2015}, pages = {1--6}, year = {2015}, crossref = {DBLP:conf/ntms/2015}, url = {https://doi.org/10.1109/NTMS.2015.7266480}, doi = {10.1109/NTMS.2015.7266480}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/GranadilloGDPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2015, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7}, doi = {10.1007/978-3-662-47854-7}, isbn = {978-3-662-47853-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2015w, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9}, doi = {10.1007/978-3-662-48051-9}, isbn = {978-3-662-48050-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2015w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Erturk15, author = {Emre Erturk}, title = {Two Trends in Mobile Security: Financial Motives and Transitioning from Static to Dynamic Analysis}, journal = {CoRR}, volume = {abs/1504.06893}, year = {2015}, url = {http://arxiv.org/abs/1504.06893}, eprinttype = {arXiv}, eprint = {1504.06893}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Erturk15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/LiuZA14, author = {Charles Zhechao Liu and Humayun Zafar and Yoris A. Au}, title = {Rethinking {FS-ISAC:} An {IT} Security Information Sharing Network Model for the Financial Services Sector}, journal = {Commun. Assoc. Inf. Syst.}, volume = {34}, pages = {2}, year = {2014}, url = {https://doi.org/10.17705/1cais.03402}, doi = {10.17705/1CAIS.03402}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cais/LiuZA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijebm/Ifinedo14, author = {Princely Ifinedo}, title = {The effects of national culture on the assessment of information security threats and controls in financial services industry}, journal = {Int. J. Electron. Bus. Manag.}, volume = {12}, number = {2}, year = {2014}, url = {http://ijebm-ojs.ie.nthu.edu.tw/IJEBM\_OJS/index.php/IJEBM/article/view/627}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijebm/Ifinedo14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DmitrienkoLRS14, author = {Alexandra Dmitrienko and Christopher Liebchen and Christian Rossow and Ahmad{-}Reza Sadeghi}, title = {On the (In)Security of Mobile Two-Factor Authentication}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, pages = {365--383}, year = {2014}, crossref = {DBLP:conf/fc/2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_24}, doi = {10.1007/978-3-662-45472-5\_24}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/DmitrienkoLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Garman0MR14, author = {Christina Garman and Matthew Green and Ian Miers and Aviel D. Rubin}, title = {Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity}, booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, pages = {140--155}, year = {2014}, crossref = {DBLP:conf/fc/2014w}, url = {https://doi.org/10.1007/978-3-662-44774-1\_10}, doi = {10.1007/978-3-662-44774-1\_10}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/Garman0MR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MigicovskyDRH14, author = {Alex Migicovsky and Zakir Durumeric and Jeff Ringenberg and J. Alex Halderman}, title = {Outsmarting Proctors with Smartwatches: {A} Case Study on Wearable Computing Security}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, pages = {89--96}, year = {2014}, crossref = {DBLP:conf/fc/2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_7}, doi = {10.1007/978-3-662-45472-5\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MigicovskyDRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MurdochA14, author = {Steven J. Murdoch and Ross J. Anderson}, title = {Security Protocols and Evidence: Where Many Payment Systems Fail}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, pages = {21--32}, year = {2014}, crossref = {DBLP:conf/fc/2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_2}, doi = {10.1007/978-3-662-45472-5\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MurdochA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Pape14, author = {Sebastian Pape}, title = {Sample or Random Security - {A} Security Model for Segment-Based Visual Cryptography}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, pages = {291--303}, year = {2014}, crossref = {DBLP:conf/fc/2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_19}, doi = {10.1007/978-3-662-45472-5\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/Pape14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipro/CapkoAT14, author = {Zvonko Capko and Sasa Aksentijevic and Edvard Tijan}, title = {Economic and financial analysis of investments in information security}, booktitle = {37th International Convention on Information and Communication Technology, Electronics and Microelectronics, {MIPRO} 2014, Opatija, Croatia, May 26-30, 2014}, pages = {1550--1556}, year = {2014}, crossref = {DBLP:conf/mipro/2014}, url = {https://doi.org/10.1109/MIPRO.2014.6859812}, doi = {10.1109/MIPRO.2014.6859812}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/mipro/CapkoAT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MartinKA14, author = {Clemens Martin and Amina Kadry and Ghada Abu{-}Shady}, title = {Quantifying the financial impact of it security breaches on business processes}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {149--155}, year = {2014}, crossref = {DBLP:conf/pst/2014}, url = {https://doi.org/10.1109/PST.2014.6890934}, doi = {10.1109/PST.2014.6890934}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MartinKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2014, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5}, doi = {10.1007/978-3-662-45472-5}, isbn = {978-3-662-45471-8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2014w, editor = {Rainer B{\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8438}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44774-1}, doi = {10.1007/978-3-662-44774-1}, isbn = {978-3-662-44773-4}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2014w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Alhayani13, author = {Abdullah Alhayani}, title = {Implementation, management and dissemination of information security : an organisational perspective of financial institution}, school = {Brunel University London, {UK}}, year = {2013}, url = {http://bura.brunel.ac.uk/handle/2438/7668}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Alhayani13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Ifinedo13, author = {Princely Ifinedo}, title = {Relationships Between Relevant Contextual Influences and Information Security Threats and Controls in Global Financial Services Industry}, journal = {J. Comput. Inf. Technol.}, volume = {21}, number = {4}, pages = {235--246}, year = {2013}, url = {https://doi.org/10.2498/cit.1002237}, doi = {10.2498/CIT.1002237}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Ifinedo13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/FloresAS13, author = {Denys A. Flores and Olga Angelopoulou and Richard J. Self}, title = {An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {101--114}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.101}, doi = {10.22667/JISIS.2013.02.31.101}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/FloresAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/ChangKL13, author = {Hangbae Chang and Jungduk Kim and Hosin David Lee}, title = {Financial {IT} and Security}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {1--2}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2013.04.003}, doi = {10.1016/J.MCM.2013.04.003}, timestamp = {Sun, 10 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcm/ChangKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LeeLL13, author = {Jung{-}Hyun Lee and Won Gue Lim and Jong In Lim}, title = {A study of the security of Internet banking and financial private information in South Korea}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {117--131}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.07.019}, doi = {10.1016/J.MCM.2012.07.019}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LeeLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LampeWMS13, author = {Ulrich Lampe and Olga Wenge and Alexander M{\"{u}}ller and Ralf Schaarschmidt}, title = {On the Relevance of Security Risks for Cloud Adoption in the Financial Industry}, booktitle = {19th Americas Conference on Information Systems, {AMCIS} 2013, Chicago, Illinois, USA, August 15-17, 2013}, year = {2013}, crossref = {DBLP:conf/amcis/2013}, url = {http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/15}, timestamp = {Wed, 02 Jul 2014 19:53:07 +0200}, biburl = {https://dblp.org/rec/conf/amcis/LampeWMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/PanjaFMRM13, author = {Biswajit Panja and Dennis Fattaleh and Mark Mercado and Adam Robinson and Priyanka Meharia}, title = {Cybersecurity in banking and financial sector: Security analysis of a mobile banking application}, booktitle = {2013 International Conference on Collaboration Technologies and Systems, {CTS} 2013, San Diego, CA, USA, May 20-24, 2013}, pages = {397--403}, year = {2013}, crossref = {DBLP:conf/cts/2013}, url = {https://doi.org/10.1109/CTS.2013.6567261}, doi = {10.1109/CTS.2013.6567261}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cts/PanjaFMRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ArianezhadSM13, author = {Majid Arianezhad and Douglas Stebila and Behzad Mozaffari}, title = {Usability and Security of Gaze-Based Graphical Grid Passwords}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, pages = {17--33}, year = {2013}, crossref = {DBLP:conf/fc/2013w}, url = {https://doi.org/10.1007/978-3-642-41320-9\_2}, doi = {10.1007/978-3-642-41320-9\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ArianezhadSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Cappos13, author = {Justin Cappos}, title = {Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, pages = {386--394}, year = {2013}, crossref = {DBLP:conf/fc/2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_33}, doi = {10.1007/978-3-642-39884-1\_33}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Cappos13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChuangNWJ13, author = {John C.{-}I. Chuang and Hamilton Nguyen and Charles Wang and Benjamin Johnson}, title = {I Think, Therefore {I} Am: Usability and Security of Authentication Using Brainwaves}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, pages = {1--16}, year = {2013}, crossref = {DBLP:conf/fc/2013w}, url = {https://doi.org/10.1007/978-3-642-41320-9\_1}, doi = {10.1007/978-3-642-41320-9\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChuangNWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/EgelmanS13, author = {Serge Egelman and Stuart E. Schechter}, title = {The Importance of Being Earnest [In Security Warnings]}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, pages = {52--59}, year = {2013}, crossref = {DBLP:conf/fc/2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_5}, doi = {10.1007/978-3-642-39884-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/EgelmanS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FahlHOMS13, author = {Sascha Fahl and Marian Harbach and Marten Oltrogge and Thomas Muders and Matthew Smith}, title = {Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, pages = {144--161}, year = {2013}, crossref = {DBLP:conf/fc/2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_12}, doi = {10.1007/978-3-642-39884-1\_12}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/FahlHOMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GallegoSV13, author = {Alexander Gallego and Nitesh Saxena and Jonathan Voris}, title = {Exploring Extrinsic Motivation for Better Security: {A} Usability Study of Scoring-Enhanced Device Pairing}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, pages = {60--68}, year = {2013}, crossref = {DBLP:conf/fc/2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_6}, doi = {10.1007/978-3-642-39884-1\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GallegoSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KeHY13, author = {Ping Fan Ke and Kai Lung Hui and Wei T. Yue}, title = {Information Security as a Credence Good}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, pages = {83--93}, year = {2013}, crossref = {DBLP:conf/fc/2013w}, url = {https://doi.org/10.1007/978-3-642-41320-9\_6}, doi = {10.1007/978-3-642-41320-9\_6}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KeHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, title = {The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, pages = {34--51}, year = {2013}, crossref = {DBLP:conf/fc/2013w}, url = {https://doi.org/10.1007/978-3-642-41320-9\_3}, doi = {10.1007/978-3-642-41320-9\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KelleyKMSVBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KirlapposBS13, author = {Iacovos Kirlappos and Adam Beautement and Martina Angela Sasse}, title = {"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, pages = {70--82}, year = {2013}, crossref = {DBLP:conf/fc/2013w}, url = {https://doi.org/10.1007/978-3-642-41320-9\_5}, doi = {10.1007/978-3-642-41320-9\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KirlapposBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhouYSQ13, author = {Yuanyuan Zhou and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, title = {On the Need of Physical Security for Small Embedded Devices: {A} Case Study with {COMP128-1} Implementations in {SIM} Cards}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, pages = {230--238}, year = {2013}, crossref = {DBLP:conf/fc/2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_20}, doi = {10.1007/978-3-642-39884-1\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ZhouYSQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indin/RayAGBT13, author = {Apala Ray and Johan {\AA}kerberg and Mikael Gidlund and Mats Bj{\"{o}}rkman and Christophe Tremlet}, title = {Reusability assessment of financial card readers' security mechanisms in process control devices}, booktitle = {11th {IEEE} International Conference on Industrial Informatics, {INDIN} 2013, Bochum, Germany, July 29-31, 2013}, pages = {494--499}, year = {2013}, crossref = {DBLP:conf/indin/2013}, url = {https://doi.org/10.1109/INDIN.2013.6622934}, doi = {10.1109/INDIN.2013.6622934}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indin/RayAGBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/EsanNO13, author = {Omobayo A. Esan and S. M. Ngwira and Isaac Olusegun Osunmakinde}, title = {Bimodal biometrics for financial infrastructure security}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, year = {2013}, crossref = {DBLP:conf/issa/2013}, url = {https://doi.org/10.1109/ISSA.2013.6641045}, doi = {10.1109/ISSA.2013.6641045}, timestamp = {Fri, 14 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/EsanNO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BalboniKM13, author = {Paolo Balboni and Udo Kroon and Milda Macenaite}, title = {Data Protection and Data Security by Design Applied to Financial Intelligence}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {73--85}, year = {2013}, crossref = {DBLP:conf/isse/2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_7}, doi = {10.1007/978-3-658-03371-2\_7}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/BalboniKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istas/MushoreK13, author = {Rutendo Mushore and Michael Kyobe}, title = {Investigating the factors influencing information security compliance in a financial services firm}, booktitle = {Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 {IEEE} International Symposium on Technology and Society, {ISTAS} 2013, Toronto, ON, Canada, 27-29 June, 2013}, pages = {155--173}, year = {2013}, crossref = {DBLP:conf/istas/2013}, url = {https://doi.org/10.1109/ISTAS.2013.6613115}, doi = {10.1109/ISTAS.2013.6613115}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/istas/MushoreK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocc/XuWYWZ13, author = {Jiang{-}pei Xu and Liji Wu and Xiang{-}jun Yang and Yu{-}zhong Wang and Xiangmin Zhang}, title = {A security vulnerability of Java Card on array access in financial system}, booktitle = {22nd Wireless and Optical Communication Conference, {WOCC} 2013, Chongqing, China, May 16-18, 2013}, pages = {707--710}, year = {2013}, crossref = {DBLP:conf/wocc/2013}, url = {https://doi.org/10.1109/WOCC.2013.6676466}, doi = {10.1109/WOCC.2013.6676466}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wocc/XuWYWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2013, editor = {Ahmad{-}Reza Sadeghi}, title = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1}, doi = {10.1007/978-3-642-39884-1}, isbn = {978-3-642-39883-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2013w, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9}, doi = {10.1007/978-3-642-41320-9}, isbn = {978-3-642-41319-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2013w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/LeeRNFJ12, author = {Jong{-}Eun Roselyn Lee and Shailendra Rao and Clifford Nass and Karin Forssell and Jae Min John}, title = {When do online shoppers appreciate security enhancement efforts? Effects of financial risk and security level on evaluations of customer authentication}, journal = {Int. J. Hum. Comput. Stud.}, volume = {70}, number = {5}, pages = {364--376}, year = {2012}, url = {https://doi.org/10.1016/j.ijhcs.2011.12.002}, doi = {10.1016/J.IJHCS.2011.12.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/LeeRNFJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irmj/ZafarKO12, author = {Humayun Zafar and Myung Ko and Kweku{-}Muata Osei{-}Bryson}, title = {Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors}, journal = {Inf. Resour. Manag. J.}, volume = {25}, number = {1}, pages = {21--37}, year = {2012}, url = {https://doi.org/10.4018/irmj.2012010102}, doi = {10.4018/IRMJ.2012010102}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/irmj/ZafarKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LampeWMS12, author = {Ulrich Lampe and Olga Wenge and Alexander M{\"{u}}ller and Ralf Schaarschmidt}, title = {Cloud Computing in the Financial Industry - {A} Road Paved with Security Pitfalls?}, booktitle = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle, Washington, USA, August 9-11, 2012}, year = {2012}, crossref = {DBLP:conf/amcis/2012}, url = {http://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/4}, timestamp = {Thu, 21 Jun 2018 07:22:09 +0200}, biburl = {https://dblp.org/rec/conf/amcis/LampeWMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BenderDFK12, author = {Jens Bender and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Dennis K{\"{u}}gler}, title = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents, and Its Security}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, pages = {344--358}, year = {2012}, crossref = {DBLP:conf/fc/2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_25}, doi = {10.1007/978-3-642-32946-3\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BenderDFK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Bohme12, author = {Rainer B{\"{o}}hme}, title = {Security Audits Revisited}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, pages = {129--147}, year = {2012}, crossref = {DBLP:conf/fc/2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_11}, doi = {10.1007/978-3-642-32946-3\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Bohme12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BonneauPA12, author = {Joseph Bonneau and S{\"{o}}ren Preibusch and Ross J. Anderson}, title = {A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, pages = {25--40}, year = {2012}, crossref = {DBLP:conf/fc/2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_3}, doi = {10.1007/978-3-642-32946-3\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BonneauPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2011, editor = {George Danezis}, title = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27576-0}, doi = {10.1007/978-3-642-27576-0}, isbn = {978-3-642-27575-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2011w, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29889-9}, doi = {10.1007/978-3-642-29889-9}, isbn = {978-3-642-29888-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2011w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2012, editor = {Angelos D. Keromytis}, title = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3}, doi = {10.1007/978-3-642-32946-3}, isbn = {978-3-642-32945-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2012w, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5}, doi = {10.1007/978-3-642-34638-5}, isbn = {978-3-642-34637-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2012w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AycockBDD11, author = {John Aycock and Elizabeth Buchanan and Scott D. Dexter and David Dittrich}, title = {Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, pages = {138--145}, year = {2011}, crossref = {DBLP:conf/fc/2011w}, url = {https://doi.org/10.1007/978-3-642-29889-9\_12}, doi = {10.1007/978-3-642-29889-9\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AycockBDD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChiaK11, author = {Pern Hui Chia and Svein Johan Knapskog}, title = {Re-evaluating the Wisdom of Crowds in Assessing Web Security}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, pages = {299--314}, year = {2011}, crossref = {DBLP:conf/fc/2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_25}, doi = {10.1007/978-3-642-27576-0\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChiaK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChristinEVG11, author = {Nicolas Christin and Serge Egelman and Timothy Vidas and Jens Grossklags}, title = {It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, pages = {16--30}, year = {2011}, crossref = {DBLP:conf/fc/2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_2}, doi = {10.1007/978-3-642-27576-0\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ChristinEVG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JohnsonBK11, author = {Maritza L. Johnson and Steven M. Bellovin and Angelos D. Keromytis}, title = {Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, pages = {131--137}, year = {2011}, crossref = {DBLP:conf/fc/2011w}, url = {https://doi.org/10.1007/978-3-642-29889-9\_11}, doi = {10.1007/978-3-642-29889-9\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JohnsonBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NovakSMH11, author = {Jay Novak and Jonathan Stribley and Kenneth Meagher and J. Alex Halderman}, title = {Absolute Pwnage: {A} Short Paper about the Security Risks of Remote Administration Tools}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, pages = {77--84}, year = {2011}, crossref = {DBLP:conf/fc/2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_6}, doi = {10.1007/978-3-642-27576-0\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/NovakSMH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/PlotzN11, author = {Henryk Pl{\"{o}}tz and Karsten Nohl}, title = {Peeling Away Layers of an {RFID} Security System}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, pages = {205--219}, year = {2011}, crossref = {DBLP:conf/fc/2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_17}, doi = {10.1007/978-3-642-27576-0\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/PlotzN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RobinsonH11, author = {David G. Robinson and J. Alex Halderman}, title = {Ethical Issues in E-Voting Security Analysis}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, pages = {119--130}, year = {2011}, crossref = {DBLP:conf/fc/2011w}, url = {https://doi.org/10.1007/978-3-642-29889-9\_10}, doi = {10.1007/978-3-642-29889-9\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/RobinsonH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/BaekP11, author = {Jong{-}Il Baek and Dea{-}Woo Park}, title = {A Study of Disaster Preparedness Systems Operations Analysis and Financial Security Measures of Large Banking Network}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, pages = {167--173}, year = {2011}, crossref = {DBLP:conf/ichit/2011-2}, url = {https://doi.org/10.1007/978-3-642-24106-2\_22}, doi = {10.1007/978-3-642-24106-2\_22}, timestamp = {Thu, 28 Dec 2017 16:02:42 +0100}, biburl = {https://dblp.org/rec/conf/ichit/BaekP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BarthRSMSB10, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, title = {A Learning-Based Approach to Reactive Security}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {192--206}, year = {2010}, crossref = {DBLP:conf/fc/2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_16}, doi = {10.1007/978-3-642-14577-3\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BarthRSMSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Caballero-GilMCH10, author = {Pino Caballero{-}Gil and Jezabel Molina{-}Gil and C{\'{a}}ndido Caballero{-}Gil and Candelaria Hern{\'{a}}ndez{-}Goya}, title = {Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {427}, year = {2010}, crossref = {DBLP:conf/fc/2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_41}, doi = {10.1007/978-3-642-14577-3\_41}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/Caballero-GilMCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Cranor10, author = {Lorrie Faith Cranor}, title = {Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {3}, year = {2010}, crossref = {DBLP:conf/fc/2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_3}, doi = {10.1007/978-3-642-14577-3\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Cranor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Cranor10a, author = {Lorrie Faith Cranor}, title = {Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {247--249}, year = {2010}, crossref = {DBLP:conf/fc/2010w}, url = {https://doi.org/10.1007/978-3-642-14992-4\_23}, doi = {10.1007/978-3-642-14992-4\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Cranor10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Fleischmann10, author = {Kenneth R. Fleischmann}, title = {Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {197--202}, year = {2010}, crossref = {DBLP:conf/fc/2010w}, url = {https://doi.org/10.1007/978-3-642-14992-4\_18}, doi = {10.1007/978-3-642-14992-4\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Fleischmann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GrossklagsJC10, author = {Jens Grossklags and Benjamin Johnson and Nicolas Christin}, title = {When Information Improves Information Security}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {416--423}, year = {2010}, crossref = {DBLP:conf/fc/2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_37}, doi = {10.1007/978-3-642-14577-3\_37}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/GrossklagsJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Hubaux10, author = {Jean{-}Pierre Hubaux}, title = {Security Mechanisms with Selfish Players in Wireless Networks}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {2}, year = {2010}, crossref = {DBLP:conf/fc/2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_2}, doi = {10.1007/978-3-642-14577-3\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Hubaux10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KenneallyBM10, author = {Erin Kenneally and Michael D. Bailey and Douglas Maughan}, title = {A Framework for Understanding and Applying Ethical Principles in Network and Security Research}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {240--246}, year = {2010}, crossref = {DBLP:conf/fc/2010w}, url = {https://doi.org/10.1007/978-3-642-14992-4\_22}, doi = {10.1007/978-3-642-14992-4\_22}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KenneallyBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MatsuoMOB10, author = {Shin'ichiro Matsuo and Kunihiko Miyazaki and Akira Otsuka and David A. Basin}, title = {How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of {ISO/IEC} 29128 and {CRYPTREC}}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {182--194}, year = {2010}, crossref = {DBLP:conf/fc/2010w}, url = {https://doi.org/10.1007/978-3-642-14992-4\_16}, doi = {10.1007/978-3-642-14992-4\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MatsuoMOB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RuhrmairJHACS10, author = {Ulrich R{\"{u}}hrmair and Christian Jaeger and Christian Hilgers and Michael Algasinger and Gy{\"{o}}rgy Csaba and Martin Stutzmann}, title = {Security Applications of Diodes with Unique Current-Voltage Characteristics}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {328--335}, year = {2010}, crossref = {DBLP:conf/fc/2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_26}, doi = {10.1007/978-3-642-14577-3\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/RuhrmairJHACS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Sassaman10, author = {Len Sassaman}, title = {Ethical Guidelines for Computer Security Researchers: "Be Reasonable"}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, pages = {250--255}, year = {2010}, crossref = {DBLP:conf/fc/2010w}, url = {https://doi.org/10.1007/978-3-642-14992-4\_24}, doi = {10.1007/978-3-642-14992-4\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Sassaman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/BaldoniLCDMM10, author = {Roberto Baldoni and Giorgia Lodi and Gregory V. Chockler and Eliezer Dekel and Barry P. Mulcahy and Giuseppe Martufi}, title = {A Contract-based Event Driven Model for Collaborative Security in Financial Information Systems}, booktitle = {{ICEIS} 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 4, SAIC, Funchal, Madeira, Portugal, June 8 - 12, 2010}, pages = {147--152}, year = {2010}, crossref = {DBLP:conf/iceis/2010-4}, timestamp = {Mon, 14 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceis/BaldoniLCDMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/Bollag10, author = {Josef Bollag}, title = {World Financial Crisis and its Influence on Terror Financing}, booktitle = {Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web}, pages = {13--18}, year = {2010}, crossref = {DBLP:series/natosec/27}, url = {https://doi.org/10.3233/978-1-60750-611-9-13}, doi = {10.3233/978-1-60750-611-9-13}, timestamp = {Tue, 16 May 2017 14:24:21 +0200}, biburl = {https://dblp.org/rec/series/natosec/Bollag10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2010, editor = {Radu Sion}, title = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3}, doi = {10.1007/978-3-642-14577-3}, isbn = {978-3-642-14576-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2010w, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4}, doi = {10.1007/978-3-642-14992-4}, isbn = {978-3-642-14991-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2010w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:reference/crc/2010fcs, editor = {Burton Rosenberg}, title = {Handbook of Financial Cryptography and Security}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823}, doi = {10.1201/9781420059823}, isbn = {978-1-4200-5981-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/2010fcs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Barni010, author = {Mauro Barni and Stefan Katzenbeisser}, title = {Digital Watermarking}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {391--435}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c14}, doi = {10.1201/9781420059823-C14}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Barni010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Belenkiy10, author = {Mira Belenkiy}, title = {E-Cash}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {3--48}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c1}, doi = {10.1201/9781420059823-C1}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Belenkiy10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Brandt10, author = {Felix Brandt}, title = {Auctions}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {49--58}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c2}, doi = {10.1201/9781420059823-C2}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Brandt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Coventry10, author = {Lynne M. Coventry}, title = {Human Factors}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {497--519}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c17}, doi = {10.1201/9781420059823-C17}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Coventry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DanezisDS10, author = {George Danezis and Claudia D{\'{\i}}az and Paul F. Syverson}, title = {Anonymous Communication}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {341--389}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c13}, doi = {10.1201/9781420059823-C13}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DanezisDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DashtiM10, author = {Mohammad Torabi Dashti and Sjouke Mauw}, title = {Fair Exchange}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {109--132}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c5}, doi = {10.1201/9781420059823-C5}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DashtiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Ellison10, author = {Carl M. Ellison}, title = {Public Key Infrastructure}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {455--493}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c16}, doi = {10.1201/9781420059823-C16}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Ellison10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Jackson10, author = {Margaret Jackson}, title = {Legal Issues}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {521--554}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c18}, doi = {10.1201/9781420059823-C18}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Jackson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/JakobssonSS10, author = {Markus Jakobsson and Sid Stamm and Christopher Soghoian}, title = {Phishing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {301--339}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c12}, doi = {10.1201/9781420059823-C12}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/JakobssonSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Kiayias10, author = {Aggelos Kiayias}, title = {Electronic Voting}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {59--81}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c3}, doi = {10.1201/9781420059823-C3}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Kiayias10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Parhonyi10, author = {R{\'{o}}bert P{\'{a}}rhonyi}, title = {Micropayment Systems}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {163--191}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c7}, doi = {10.1201/9781420059823-C7}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Parhonyi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Pehlivanoglu10, author = {Serdar Pehlivanoglu}, title = {Broadcast and Content Distribution}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {133--159}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c6}, doi = {10.1201/9781420059823-C6}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Pehlivanoglu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/SadeghiW10, author = {Ahmad{-}Reza Sadeghi and Christian Wachsmann}, title = {Trusted Computing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {221--256}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c9}, doi = {10.1201/9781420059823-C9}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/SadeghiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Safavi-NainiS10, author = {Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard}, title = {Digital Rights Management}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {193--220}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c8}, doi = {10.1201/9781420059823-C8}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Safavi-NainiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/SionW10, author = {Radu Sion and Marianne Winslett}, title = {Regulatory Compliance}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {555--584}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c19}, doi = {10.1201/9781420059823-C19}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/SionW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Smith10, author = {Sean Smith}, title = {Hardware Security Modules}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {257--278}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c10}, doi = {10.1201/9781420059823-C10}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Smith10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Szydlo10, author = {Michael Szydlo}, title = {Portfolio Trading}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {279--297}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c11}, doi = {10.1201/9781420059823-C11}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Szydlo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Wilton10, author = {Robin Wilton}, title = {Identity Management}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {437--453}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c15}, doi = {10.1201/9781420059823-C15}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Wilton10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Zhou10, author = {Jianying Zhou}, title = {Non-Repudiation}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {83--108}, year = {2010}, crossref = {DBLP:reference/crc/2010fcs}, url = {https://doi.org/10.1201/9781420059823-c4}, doi = {10.1201/9781420059823-C4}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crc/Zhou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/Ifinedo09, author = {Princely Ifinedo}, title = {Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions?}, journal = {Int. J. Inf. Secur. Priv.}, volume = {3}, number = {2}, pages = {68--83}, year = {2009}, url = {https://doi.org/10.4018/jisp.2009040105}, doi = {10.4018/JISP.2009040105}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/Ifinedo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ifinedo09, author = {Princely Ifinedo}, title = {Information technology security management concerns in global financial services institutions: Is national culture a differentiator?}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {372--387}, year = {2009}, url = {https://doi.org/10.1108/09685220911006678}, doi = {10.1108/09685220911006678}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ifinedo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/riga/KryukovS09, author = {Dmitry Kryukov and Raimonds Strauss}, title = {Information security governance as key performance indicator for financial institutions}, journal = {Sci. J. Riga Tech. Univ. Ser. Comput. Sci.}, volume = {38}, pages = {161--167}, year = {2009}, url = {https://doi.org/10.2478/v10143-009-0014-x}, doi = {10.2478/V10143-009-0014-X}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/riga/KryukovS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/ZafarA09, author = {Humayun Zafar and Yoris A. Au}, title = {The Economic Ramifications of Strategic {IT} Security Information Sharing in the Financial Services Industry}, booktitle = {Proceedings of the 15th Americas Conference on Information Systems, {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009}, pages = {281}, year = {2009}, crossref = {DBLP:conf/amcis/2009}, url = {http://aisel.aisnet.org/amcis2009/281}, timestamp = {Mon, 02 Jan 2012 19:01:22 +0100}, biburl = {https://dblp.org/rec/conf/amcis/ZafarA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FultzG09, author = {Neal Fultz and Jens Grossklags}, title = {Blue versus Red: Towards a Model of Distributed Security Attacks}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, pages = {167--183}, year = {2009}, crossref = {DBLP:conf/fc/2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_10}, doi = {10.1007/978-3-642-03549-4\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FultzG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/IoannidisPW09, author = {Christos Ioannidis and David J. Pym and Julian Williams}, title = {Investments and Trade-offs in the Economics of Information Security}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, pages = {148--166}, year = {2009}, crossref = {DBLP:conf/fc/2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_9}, doi = {10.1007/978-3-642-03549-4\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/IoannidisPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/SaghafiNE09, author = {Fatemeh Saghafi and Fatemeh NasserEslami and Maryam Esmaili}, title = {Ranking secure technologies in security provision financial transactions mobile commerce}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, pages = {331--336}, year = {2009}, crossref = {DBLP:conf/interaction/2009}, url = {https://doi.org/10.1145/1655925.1655986}, doi = {10.1145/1655925.1655986}, timestamp = {Sun, 28 Feb 2021 18:18:34 +0100}, biburl = {https://dblp.org/rec/conf/interaction/SaghafiNE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2009, editor = {Roger Dingledine and Philippe Golle}, title = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4}, doi = {10.1007/978-3-642-03549-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SingletonS08, author = {Tommie W. Singleton and Aaron J. Singleton}, title = {The Potential for a Synergistic Relationship Between Information Security and a Financial Audit}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {17}, number = {2}, pages = {80--86}, year = {2008}, url = {https://doi.org/10.1080/19393550801983783}, doi = {10.1080/19393550801983783}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SingletonS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kybernetes/HuangWZ08, author = {Xiangzhao Huang and Hu Wan and Hongtao Zhou}, title = {The synergetic model of the controlling tactics to network financial information security}, journal = {Kybernetes}, volume = {37}, number = {9/10}, pages = {1393--1400}, year = {2008}, url = {https://doi.org/10.1108/03684920810907698}, doi = {10.1108/03684920810907698}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kybernetes/HuangWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HuangD08, author = {Ken Huang and Paul Douthit}, title = {ST{\&}E Is the Most Cost Effective Measure for Comply with Payment Card Industry {(PCI)} Data Security Standard}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, pages = {321--322}, year = {2008}, crossref = {DBLP:conf/fc/2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_32}, doi = {10.1007/978-3-540-85230-8\_32}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HuangD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FibikovaM08, author = {Lenka Fib{\'{\i}}kov{\'{a}} and Roland M{\"{u}}ller}, title = {The Information Security Framework for Daimler Financial Services and its Implementation}, booktitle = {{ISSE} 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain}, pages = {3--19}, year = {2008}, crossref = {DBLP:conf/isse/2008}, url = {https://doi.org/10.1007/978-3-8348-9283-6\_1}, doi = {10.1007/978-3-8348-9283-6\_1}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/FibikovaM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Ifinedo08, author = {Princely Ifinedo}, title = {{IT} Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter?}, booktitle = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada}, pages = {75--84}, year = {2008}, crossref = {DBLP:conf/pst/2008}, url = {https://doi.org/10.1109/PST.2008.24}, doi = {10.1109/PST.2008.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/Ifinedo08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wkdd/XiaBP08, author = {Bin Xia and Hui Bai and Bin Pan}, title = {Research of Information Technology Security in the Financial Industry}, booktitle = {Proceedings of the International Workshop on Knowledge Discovery and Data Mining, {WKDD} 2008, Adelaide, Australia, 23-24 January 2008}, pages = {477--480}, year = {2008}, crossref = {DBLP:conf/wkdd/2008}, url = {https://doi.org/10.1109/WKDD.2008.55}, doi = {10.1109/WKDD.2008.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wkdd/XiaBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2007, editor = {Sven Dietrich and Rachna Dhamija}, title = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77366-5}, doi = {10.1007/978-3-540-77366-5}, isbn = {978-3-540-77365-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2008, editor = {Gene Tsudik}, title = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8}, doi = {10.1007/978-3-540-85230-8}, isbn = {978-3-540-85229-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AsgharpourLC07, author = {Farzaneh Asgharpour and Debin Liu and L. Jean Camp}, title = {Mental Models of Security Risks}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, pages = {367--377}, year = {2007}, crossref = {DBLP:conf/fc/2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_34}, doi = {10.1007/978-3-540-77366-5\_34}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AsgharpourLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Desmedt07, author = {Yvo Desmedt}, title = {Position Statement in {RFID} S{\&}P Panel: From Relative Security to Perceived Secure}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, pages = {53--56}, year = {2007}, crossref = {DBLP:conf/fc/2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_8}, doi = {10.1007/978-3-540-77366-5\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Desmedt07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Fu07, author = {Kevin Fu}, title = {Panel: {RFID} Security and Privacy}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, pages = {45}, year = {2007}, crossref = {DBLP:conf/fc/2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_5}, doi = {10.1007/978-3-540-77366-5\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Fu07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Jutla07, author = {Dawn N. Jutla}, title = {Usable {SPACE:} Security, Privacy, and Context for the Mobile User}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, pages = {245}, year = {2007}, crossref = {DBLP:conf/fc/2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_22}, doi = {10.1007/978-3-540-77366-5\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Jutla07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KuoWP07, author = {Cynthia Kuo and Jesse Walker and Adrian Perrig}, title = {Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, pages = {325--340}, year = {2007}, crossref = {DBLP:conf/fc/2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_30}, doi = {10.1007/978-3-540-77366-5\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KuoWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MitchellK07, author = {April Slayden Mitchell and Alan H. Karp}, title = {Improving Usability by Adding Security to Video Conferencing Systems}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, pages = {378--382}, year = {2007}, crossref = {DBLP:conf/fc/2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_35}, doi = {10.1007/978-3-540-77366-5\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MitchellK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/PagterP07, author = {Jakob Illeborg Pagter and Marianne Graves Petersen}, title = {A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, pages = {383--388}, year = {2007}, crossref = {DBLP:conf/fc/2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_36}, doi = {10.1007/978-3-540-77366-5\_36}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/PagterP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/ChangHYH06, author = {I{-}Chiu Chang and Hsin{-}Ginn Hwang and David C. Yen and Hen{-}Yi Huang}, title = {An empirical study of the factors affecting Internet security for the financial industry in Taiwan}, journal = {Telematics Informatics}, volume = {23}, number = {4}, pages = {343--364}, year = {2006}, url = {https://doi.org/10.1016/j.tele.2005.11.001}, doi = {10.1016/J.TELE.2005.11.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tele/ChangHYH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2006, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663}, doi = {10.1007/11889663}, isbn = {3-540-46255-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KeshR05, author = {Someswar Kesh and M. K. Raja}, title = {Development of a qualitative reasoning model for financial forecasting}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {167--179}, year = {2005}, url = {https://doi.org/10.1108/09685220510582638}, doi = {10.1108/09685220510582638}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KeshR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/Locher05, author = {Christian Locher}, title = {Methodologies for Evaluating Information Security Investments - What Basel {II} Can Change in the Financial Industry}, booktitle = {Proceedings of the 13th European Conference on Information Systems, Information Systems in a Rapidly Changing Economy, {ECIS} 2005, Regensburg, Germany, May 26-28, 2005}, pages = {1561--1572}, year = {2005}, crossref = {DBLP:conf/ecis/2005}, url = {http://aisel.aisnet.org/ecis2005/122}, timestamp = {Wed, 24 Jul 2019 16:44:04 +0200}, biburl = {https://dblp.org/rec/conf/ecis/Locher05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Friedman05, author = {Allan Friedman}, title = {Panel Summary: Incentives, Markets and Information Security}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, pages = {372--373}, year = {2005}, crossref = {DBLP:conf/fc/2005}, url = {https://doi.org/10.1007/11507840\_33}, doi = {10.1007/11507840\_33}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Friedman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TuylsSSAO05, author = {Pim Tuyls and Boris Skoric and S. Stallinga and Anton H. M. Akkermans and W. Ophey}, title = {Information-Theoretic Security Analysis of Physical Uncloneable Functions}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, pages = {141--155}, year = {2005}, crossref = {DBLP:conf/fc/2005}, url = {https://doi.org/10.1007/11507840\_15}, doi = {10.1007/11507840\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/TuylsSSAO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Ghernaouti-Helie05, author = {Solange Ghernaouti{-}Helie and Mohamed Ali Sfaxi}, title = {Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment}, booktitle = {E-business and Telecommunication Networks - Second International Conference, {ICETE} 2005, Reading, UK, October 3-7, 2005. Selected Papers}, pages = {139--149}, year = {2005}, crossref = {DBLP:conf/icete/2005s}, url = {https://doi.org/10.1007/978-3-540-75993-5\_12}, doi = {10.1007/978-3-540-75993-5\_12}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/Ghernaouti-Helie05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Ghernaouti-HelieS05, author = {Solange Ghernaouti{-}Helie and Mohamed Ali Sfaxi}, title = {Guaranteerring security of financial transaction by using quantum cryptography in banking environment}, booktitle = {{ICETE} 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005}, pages = {268--274}, year = {2005}, crossref = {DBLP:conf/icete/2005}, timestamp = {Tue, 07 Nov 2006 14:13:57 +0100}, biburl = {https://dblp.org/rec/conf/icete/Ghernaouti-HelieS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Baloyi05, author = {Norman Tinyiko Baloyi}, title = {Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, year = {2005}, crossref = {DBLP:conf/issa/2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/080\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Baloyi05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/05/PietruszkiewiczR05, author = {Wieslaw Pietruszkiewicz and Leonard Rozenberg}, title = {Financial Distress Prediction Using Different Pattern Recognition Methods}, booktitle = {Information Processing and Security Systems}, pages = {103--111}, year = {2005}, crossref = {DBLP:books/sp/SP2005}, url = {https://doi.org/10.1007/0-387-26325-X\_11}, doi = {10.1007/0-387-26325-X\_11}, timestamp = {Sun, 02 Jun 2019 20:42:31 +0200}, biburl = {https://dblp.org/rec/books/sp/05/PietruszkiewiczR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2005, editor = {Andrew S. Patrick and Moti Yung}, title = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137875}, doi = {10.1007/B137875}, isbn = {3-540-26656-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMicec/AgrawalPPRU04, author = {Manish Agrawal and Hemant Padmanabhan and Lokesh Pandey and H. Raghav Rao and Shambhu J. Upadhyaya}, title = {A conceptual approach to information security in financial account aggregation}, booktitle = {Proceedings of the 6th International Conference on Electronic Commerce, {ICEC} 2004, Delft, The Netherlands, October 25-27, 2004}, pages = {619--626}, year = {2004}, crossref = {DBLP:conf/ACMicec/2004}, url = {https://doi.org/10.1145/1052220.1052299}, doi = {10.1145/1052220.1052299}, timestamp = {Fri, 08 Sep 2023 14:37:35 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/AgrawalPPRU04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Camp04, author = {L. Jean Camp}, title = {Mental Models of Computer Security}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, pages = {106--111}, year = {2004}, crossref = {DBLP:conf/fc/2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_12}, doi = {10.1007/978-3-540-27809-2\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Camp04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Patrick04, author = {Andrew S. Patrick}, title = {Usability and Acceptability of Biometric Security Systems}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, pages = {105}, year = {2004}, crossref = {DBLP:conf/fc/2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_11}, doi = {10.1007/978-3-540-27809-2\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Patrick04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Pugh04, author = {Simon Pugh}, title = {PayPass Security and Risk (Abstract)}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, pages = {70--71}, year = {2004}, crossref = {DBLP:conf/fc/2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_8}, doi = {10.1007/978-3-540-27809-2\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Pugh04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Yurick04, author = {William Yurcik}, title = {Visualization Tools for Security Administrators}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, pages = {112--113}, year = {2004}, crossref = {DBLP:conf/fc/2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_13}, doi = {10.1007/978-3-540-27809-2\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Yurick04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijstm/Shoniregun03, author = {Charles A. Shoniregun}, title = {Are existing internet security measures guaranteed to protect user identity in the financial services industry?}, journal = {Int. J. Serv. Technol. Manag.}, volume = {4}, number = {2}, pages = {194--216}, year = {2003}, url = {https://doi.org/10.1504/IJSTM.2003.002579}, doi = {10.1504/IJSTM.2003.002579}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijstm/Shoniregun03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GargCH03, author = {Ashish Garg and Jeffrey Curtis and Hilary Halper}, title = {Quantifying the financial impact of {IT} security breaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {74--83}, year = {2003}, url = {https://doi.org/10.1108/09685220310468646}, doi = {10.1108/09685220310468646}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GargCH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GargCH03, author = {Ashish Garg and Jeffrey Curtis and Hilary Halper}, title = {The Financial Impact of {IT} Security Breaches: What Do Investors Think?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {12}, number = {1}, pages = {22--33}, year = {2003}, url = {https://doi.org/10.1201/1086/43325.12.1.20030301/41478.5}, doi = {10.1201/1086/43325.12.1.20030301/41478.5}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GargCH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Odlyzko03a, author = {Andrew M. Odlyzko}, title = {Economics, Psychology, and Sociology of Security}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, pages = {182--189}, year = {2003}, crossref = {DBLP:conf/fc/2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_13}, doi = {10.1007/978-3-540-45126-6\_13}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/Odlyzko03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SchechterS03, author = {Stuart E. Schechter and Michael D. Smith}, title = {How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, pages = {122--137}, year = {2003}, crossref = {DBLP:conf/fc/2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_9}, doi = {10.1007/978-3-540-45126-6\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/SchechterS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/Mayhew02, author = {Stewart Mayhew}, title = {Problems in financial engineering: security price dynamics and simulation in financial engineering}, booktitle = {Proceedings of the 34th Winter Simulation Conference: Exploring New Frontiers, San Diego, California, USA, December 8-11, 2002}, pages = {1568--1574}, year = {2002}, crossref = {DBLP:conf/wsc/2002}, url = {https://doi.org/10.1109/WSC.2002.1166434}, doi = {10.1109/WSC.2002.1166434}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsc/Mayhew02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BellareNPS01, author = {Mihir Bellare and Chanathip Namprempre and David Pointcheval and Michael Semanko}, title = {The Power of {RSA} Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, pages = {309--328}, year = {2001}, crossref = {DBLP:conf/fc/2001}, url = {https://doi.org/10.1007/3-540-46088-8\_25}, doi = {10.1007/3-540-46088-8\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BellareNPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JaulmesP01, author = {{\'{E}}liane Jaulmes and Guillaume Poupard}, title = {On the Security of Homage Group Authentication Protocol}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, pages = {97--107}, year = {2001}, crossref = {DBLP:conf/fc/2001}, url = {https://doi.org/10.1007/3-540-46088-8\_11}, doi = {10.1007/3-540-46088-8\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JaulmesP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Kravitz01, author = {David W. Kravitz}, title = {Aspects of Digital Rights Management and the Use of Hardware Security Devices}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, pages = {45--49}, year = {2001}, crossref = {DBLP:conf/fc/2001}, url = {https://doi.org/10.1007/3-540-46088-8\_5}, doi = {10.1007/3-540-46088-8\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Kravitz01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Tsiounis01, author = {Yiannis Tsiounis}, title = {A Security Framework for Card-Based Systems}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, pages = {201--222}, year = {2001}, crossref = {DBLP:conf/fc/2001}, url = {https://doi.org/10.1007/3-540-46088-8\_19}, doi = {10.1007/3-540-46088-8\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Tsiounis01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Jolish00, author = {Barak D. Jolish}, title = {The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, pages = {202--224}, year = {2000}, crossref = {DBLP:conf/fc/2000}, url = {https://doi.org/10.1007/3-540-45472-1\_15}, doi = {10.1007/3-540-45472-1\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Jolish00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Zane00, author = {Francis Zane}, title = {Efficient Watermark Detection and Collusion Security}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, pages = {21--32}, year = {2000}, crossref = {DBLP:conf/fc/2000}, url = {https://doi.org/10.1007/3-540-45472-1\_2}, doi = {10.1007/3-540-45472-1\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Zane00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/GuptaCMV00, author = {Mukul Gupta and Alok R. Chaturvedi and Shailendra Raj Mehta and Lorenzo Valeri}, title = {The experimental analysis of information security management issues for online financial services}, booktitle = {Proceedings of the Twenty-First International Conference on Information Systems, {ICIS} 2000, Brisbane, Australia, December 10-13, 2000}, pages = {667--675}, year = {2000}, crossref = {DBLP:conf/icis/2000}, url = {http://aisel.aisnet.org/icis2000/73}, timestamp = {Wed, 28 Nov 2018 12:57:14 +0100}, biburl = {https://dblp.org/rec/conf/icis/GuptaCMV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-1/Stanley99, author = {Terry Stanley}, title = {Designing a Secure System for Implementing Chip Cards in the Financial Services Industry}, booktitle = {Information Security Management {\&} Small Systems Security, {IFIP} {TC11} {WG11.1/WG11.2} Seventh Annual Working Conference on Information Security Management {\&} Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands}, pages = {213--220}, year = {1999}, crossref = {DBLP:conf/ifip11-1/1999}, timestamp = {Mon, 14 Oct 2002 13:57:28 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-1/Stanley99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MathesonMSTZ98, author = {Lesley R. Matheson and Stephen G. Mitchell and Talal Shamoon and Robert Endre Tarjan and Francis Zane}, title = {Robustness and Security of Digital Watermarks}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, pages = {227--240}, year = {1998}, crossref = {DBLP:conf/fc/1998}, url = {https://doi.org/10.1007/BFb0055486}, doi = {10.1007/BFB0055486}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MathesonMSTZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FranklinM97, author = {Matthew K. Franklin and Dahlia Malkhi}, title = {Auditable Metering with Lightweight Security}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, pages = {151--160}, year = {1997}, crossref = {DBLP:conf/fc/1997}, url = {https://doi.org/10.1007/3-540-63594-7\_75}, doi = {10.1007/3-540-63594-7\_75}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FranklinM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Goldstein97, author = {Theodore C. Goldstein}, title = {The Gateway Security Model in the Java Electronic Commerce Framework}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, pages = {340--354}, year = {1997}, crossref = {DBLP:conf/fc/1997}, url = {https://doi.org/10.1007/3-540-63594-7\_90}, doi = {10.1007/3-540-63594-7\_90}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Goldstein97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Lelieveldt97, author = {Simon L. Lelieveldt}, title = {Evaluating the Security of Electronic Money}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, pages = {91--94}, year = {1997}, crossref = {DBLP:conf/fc/1997}, url = {https://doi.org/10.1007/3-540-63594-7\_69}, doi = {10.1007/3-540-63594-7\_69}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Lelieveldt97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/Geer94, author = {Daniel E. Geer Jr.}, title = {Breaking into Banks: Security Lessons Learned from Financial Services}, booktitle = {Proceedings of the 8th Conference on Systems Administration {(LISA} 1994), San Diego, California, USA, September 19-23, 1994}, year = {1994}, crossref = {DBLP:conf/lisa/1994}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lisa/Geer94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cl, title = {Controlling computer security: {A} guide for financial institutions: by James Essinger {(FT} Business Information Ltd, 1992 {ISBN} 1-85334-163-0)}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {226}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90021-E}, doi = {10.1016/0267-3649(93)90021-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cl.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X92aq, title = {Information security in financial services: by Ken Slater, 1991 (Hardcover)(MacMillan - Stockton Press), 275 pp, {ISBN} 0-333-54702-0}, journal = {Comput. Law Secur. Rev.}, volume = {8}, number = {4}, pages = {165}, year = {1992}, url = {https://doi.org/10.1016/0267-3649(92)90032-5}, doi = {10.1016/0267-3649(92)90032-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X92aq.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GaronO91, author = {Gilles Garon and Richard Outerbridge}, title = {Des Watch: an Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990's}, journal = {Cryptologia}, volume = {15}, number = {3}, pages = {177--193}, year = {1991}, url = {https://doi.org/10.1080/0161-119191865849}, doi = {10.1080/0161-119191865849}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GaronO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bde/2023, title = {Proceedings of the 2023 5th International Conference on Big Data Engineering, {BDE} 2023, Zhuhai, China, November 17-20, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640872}, doi = {10.1145/3640872}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/bde/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccece/2023, title = {{IEEE} Canadian Conference on Electrical and Computer Engineering, {CCECE} 2023, Regina, SK, Canada, September 24-27, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCECE58730.2023}, doi = {10.1109/CCECE58730.2023}, isbn = {979-8-3503-2397-9}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/ccece/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cpits/2023-2, editor = {Volodymyr Sokolov and Tamara Radivilova and Vasyl Ustimenko and Mariya Nazarkevych}, title = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2023), Kyiv, Ukraine, October 26, 2023 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3550}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3550}, urn = {urn:nbn:de:0074-3550-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/cpits/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurousec/2023, title = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617072}, doi = {10.1145/3617072}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccsci/2023, editor = {Alexander Agung Santoso Gunawan}, title = {Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, {ICCSCI} 2023, 02-03 August 2023, Malang, Indonesia}, series = {Procedia Computer Science}, volume = {227}, publisher = {Elsevier}, year = {2023}, url = {https://www.sciencedirect.com/science/journal/18770509/227}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/iccsci/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccsie/2023, title = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617184}, doi = {10.1145/3617184}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/iccsie/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icfnds/2023, title = {Proceedings of the 7th International Conference on Future Networks and Distributed Systems, {ICFNDS} 2023, Dubai, United Arab Emirates, December 21-22, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3644713}, doi = {10.1145/3644713}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitjo/2023, title = {International Conference on Information Technology, {ICIT} 2023, Amman, Jordan, August 9-10, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICIT58056.2023}, doi = {10.1109/ICIT58056.2023}, isbn = {979-8-3503-2006-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/icitjo/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2023, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/uss/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bigdataconf/2022, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022}, doi = {10.1109/BIGDATA55660.2022}, isbn = {978-1-6654-8045-1}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bisec/2022, editor = {Nemanja Zdravkovic and Dragan Domazet and Sonsoles L{\'{o}}pez{-}Pernas and Miguel {\'{A}}ngel Conde and Ponnusamy Vijayakumar}, title = {Proceedings of the 13th International Conference on Business Information Security (BISEC-2022), Belgrade, Serbia, December 02, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3529}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3529}, urn = {urn:nbn:de:0074-3529-5}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/bisec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eitce/2022, title = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573428}, doi = {10.1145/3573428}, isbn = {978-1-4503-9714-8}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/eitce/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2022, editor = {Ittay Eyal and Juan A. Garay}, title = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13411}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18283-9}, doi = {10.1007/978-3-031-18283-9}, isbn = {978-3-031-18282-2}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hicss/2022, title = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, publisher = {ScholarSpace}, year = {2022}, url = {https://scholarspace.manoa.hawaii.edu/handle/10125/79139}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/hicss/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icfnds/2022, title = {Proceedings of the 6th International Conference on Future Networks {\&} Distributed Systems, {ICFNDS} 2022, Tashkent, Uzbekistan, 15 December 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584202}, doi = {10.1145/3584202}, isbn = {978-1-4503-9905-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pacis/2022, editor = {Ming{-}Hui Huang and Guy Gable and Christy M. K. Cheung and Dongming Xu}, title = {26th Pacific Asia Conference on Information Systems, {PACIS} 2022, Virtual Event / Taipei, Taiwan / Sydney, Australia, July 5-9, 2022}, year = {2022}, url = {http://aisel.aisnet.org/pacis2022/}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/pacis/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2022-2, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1}, doi = {10.1007/978-3-030-97131-1}, isbn = {978-3-030-97130-4}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aiam/2021-2, title = {{AIAM} 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23 - 25, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3495018}, doi = {10.1145/3495018}, isbn = {978-1-4503-8504-6}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/aiam/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cpits/2021-1, editor = {Anatoly Bessalov and Dmytro Ageyev and Valeriy Lahno and Volodymyr Sokolov}, title = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II.} Volume {I} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2021), Kyiv, Ukraine, October 26, 2021 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3187}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3187}, urn = {urn:nbn:de:0074-3187-1}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/cpits/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cpits/2021-2, editor = {Anatoly Bessalov and Dmytro Ageyev and Valeriy Lahno and Volodymyr Sokolov}, title = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II.} Volume {II} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2021), Kyiv, Ukraine, October 26, 2021 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3188}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3188}, urn = {urn:nbn:de:0074-3188-5}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/cpits/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021-2, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0}, doi = {10.1007/978-3-662-64331-0}, isbn = {978-3-662-64330-3}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fc/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icict/2021-2, editor = {Xin{-}She Yang and Simon Sherratt and Nilanjan Dey and Amit Joshi}, title = {Proceedings of Sixth International Congress on Information and Communication Technology - {ICICT} 2021, London, UK, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {236}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-16-2380-6}, doi = {10.1007/978-981-16-2380-6}, isbn = {978-981-16-2379-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/icict/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icise/2021, title = {{ICISE} 2021: The 6th International Conference on Information Systems Engineering, Shanghai, China, November 12 - 14, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3503928}, doi = {10.1145/3503928}, isbn = {978-1-4503-8522-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/icise/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issre/2021w, title = {{IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSREW53611.2021}, doi = {10.1109/ISSREW53611.2021}, isbn = {978-1-6654-2603-9}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/issre/2021w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEares/2020, editor = {Melanie Volkamer and Christian Wressnegger}, title = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023}, doi = {10.1145/3407023}, isbn = {978-1-4503-8833-7}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acis/2020, title = {Australasian Conference on Information Systems, {ACIS} 2020, Wellington, New Zealand, December 1-4, 2020}, year = {2020}, url = {https://aisel.aisnet.org/acis2020/}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/acis/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atci/2020, editor = {Jemal H. Abawajy and Kim{-}Kwang Raymond Choo and Zheng Xu and Mohammed Atiquzzaman}, title = {2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI} 2020), Fuyang, China, 20-22 June, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1244}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-53980-1}, doi = {10.1007/978-3-030-53980-1}, isbn = {978-3-030-53979-5}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/atci/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dessert/2020, title = {11th {IEEE} International Conference on Dependable Systems, Services and Technologies, {DESSERT} 2020, Kyiv, Ukraine, May 14-18, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9122248/proceeding}, isbn = {978-1-7281-9957-3}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/dessert/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2020w, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3}, doi = {10.1007/978-3-030-54455-3}, isbn = {978-3-030-54454-6}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fc/2020w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2020, editor = {Joseph Bonneau and Nadia Heninger}, title = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4}, doi = {10.1007/978-3-030-51280-4}, isbn = {978-3-030-51279-8}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fc/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ijcai/2020, editor = {Christian Bessiere}, title = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, publisher = {ijcai.org}, year = {2020}, note = {Scheduled for July 2020, Yokohama, Japan, postponed due to the Corona pandemic.}, url = {https://www.ijcai.org/Proceedings/2020/}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isdmci/2020, editor = {Sergii Babichev and Volodymyr Lytvynenko and Waldemar W{\'{o}}jcik and Svetlana Vyshemyrskaya}, title = {Lecture Notes in Computational Intelligence and Decision Making - Proceedings of the 2020 International Scientific Conference "Intellectual Systems of Decision-making and Problems of Computational Intelligence", {ISDMCI} 2020, Kherson, Ukraine, May 25-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1246}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-54215-3}, doi = {10.1007/978-3-030-54215-3}, isbn = {978-3-030-54214-6}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/isdmci/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/m3e2/2020, editor = {Arnold Kiv}, title = {Proceedings of the Selected Papers of the Special Edition of International Conference on Monitoring, Modeling {\&} Management of Emergent Economy {(M3E2-MLPEED} 2020), Odessa, Ukraine, July 13-18, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2713}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2713}, urn = {urn:nbn:de:0074-2713-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/m3e2/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/79, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3}, doi = {10.1007/978-3-030-38181-3}, isbn = {978-3-030-38180-6}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/series/ais/79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/chi/2019, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605}, doi = {10.1145/3290605}, isbn = {978-1-4503-5970-2}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/chi/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cscwd/2019, editor = {Weiming Shen and Hugo Paredes and Junzhou Luo and Jean{-}Paul A. Barth{\`{e}}s}, title = {23rd {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2019, Porto, Portugal, May 6-8, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8785422/proceeding}, isbn = {978-1-7281-0350-1}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2019, editor = {Ian Goldberg and Tyler Moore}, title = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7}, doi = {10.1007/978-3-030-32101-7}, isbn = {978-3-030-32100-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/m3e2/2019, editor = {Arnold Kiv and Serhiy Semerikov and Vladimir N. Soloviev and Liubov Kibalnyk and Hanna Danylchuk and Andriy Matviychuk}, title = {Proceedings of the Selected Papers of the 8th International Conference on Monitoring, Modeling {\&} Management of Emergent Economy, {M3E2-EEMLPEED} 2019, Odessa, Ukraine, May 22-24, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2422}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2422}, urn = {urn:nbn:de:0074-2422-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/m3e2/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/medes/2019, editor = {Richard Chbeir and Yannis Manolopoulos and Sergio Ilarri and Apostolos Papadopoulos}, title = {11th International Conference on Management of Digital EcoSystems, {MEDES} 2019, Limassol, Cyprus, November, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297662}, doi = {10.1145/3297662}, isbn = {978-1-4503-6238-2}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/medes/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2019, title = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8826229/proceeding}, isbn = {978-1-5386-6660-9}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/sp/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2019, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57043-9}, doi = {10.1007/978-3-030-57043-9}, isbn = {978-3-030-57042-2}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/spw/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cscwd/2018, editor = {Weiming Shen and Junzhou Luo and Jean{-}Paul A. Barth{\`{e}}s and Fang Dong and Jinghui Zhang and Haibin Zhu}, title = {22nd {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2018, Nanjing, China, May 9-11, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8455506/proceeding}, isbn = {978-1-5386-1482-2}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2018, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6}, doi = {10.1007/978-3-662-58387-6}, isbn = {978-3-662-58386-9}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spw/2018, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7}, doi = {10.1007/978-3-030-03251-7}, isbn = {978-3-030-03250-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/spw/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017, editor = {Aggelos Kiayias}, title = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7}, doi = {10.1007/978-3-319-70972-7}, isbn = {978-3-319-70971-0}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017w, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0}, doi = {10.1007/978-3-319-70278-0}, isbn = {978-3-319-70277-3}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bigdatasec/2016, title = {2nd {IEEE} International Conference on Big Data Security on Cloud, BigDataSecurity 2016, {IEEE} International Conference on High Performance and Smart Computing, {HPSC} 2016, and {IEEE} International Conference on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April 9-10, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BigDataSecurity/HPSC37848.2016}, doi = {10.1109/BIGDATASECURITY/HPSC37848.2016}, isbn = {978-1-5090-2403-2}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/haisa/2016, editor = {Nathan L. Clarke and Steven Furnell}, title = {Tenth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings}, publisher = {University of Plymouth}, year = {2016}, url = {http://www.cscan.org/default.asp?page=openaccess\&eid=17}, isbn = {978-1-84102-413-4}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/haisa/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2016, editor = {Dooho Choi and Sylvain Guilley}, title = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56549-1}, doi = {10.1007/978-3-319-56549-1}, isbn = {978-3-319-56548-4}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/3pgcic/2015, editor = {Fatos Xhafa and Leonard Barolli and Fabrizio Messina and Marek R. Ogiela}, title = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7422216/proceeding}, isbn = {978-1-4673-9473-4}, timestamp = {Tue, 18 Jun 2024 12:55:03 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csa2/2015, editor = {Doo{-}Soon Park and Han{-}Chieh Chao and Young{-}Sik Jeong and James Jong Hyuk Park}, title = {Advances in Computer Science and Ubiquitous Computing - {CSA} {\&} {CUTE} 2015, Cebu, Philippines, December 15-17, 2015}, series = {Lecture Notes in Electrical Engineering}, volume = {373}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-981-10-0281-6}, doi = {10.1007/978-981-10-0281-6}, isbn = {978-981-10-0280-9}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/csa2/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2015w, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9}, doi = {10.1007/978-3-662-48051-9}, isbn = {978-3-662-48050-2}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2015w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ntms/2015, editor = {Mohamad Badra and Azzedine Boukerche and Pascal Urien}, title = {7th International Conference on New Technologies, Mobility and Security, {NTMS} 2015, Paris, France, July 27-29, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7210292/proceeding}, isbn = {978-1-4799-8784-9}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/ntms/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2014, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5}, doi = {10.1007/978-3-662-45472-5}, isbn = {978-3-662-45471-8}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2014w, editor = {Rainer B{\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8438}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44774-1}, doi = {10.1007/978-3-662-44774-1}, isbn = {978-3-662-44773-4}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2014w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mipro/2014, title = {37th International Convention on Information and Communication Technology, Electronics and Microelectronics, {MIPRO} 2014, Opatija, Croatia, May 26-30, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6849597/proceeding}, isbn = {978-953-233-081-6}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/mipro/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pst/2014, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6883276/proceeding}, isbn = {978-1-4799-3502-4}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/pst/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/amcis/2013, title = {19th Americas Conference on Information Systems, {AMCIS} 2013, Chicago, Illinois, USA, August 15-17, 2013}, publisher = {Association for Information Systems}, year = {2013}, url = {http://aisel.aisnet.org/amcis2013/}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/amcis/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cts/2013, editor = {Geoffrey Charles Fox and Waleed W. Smari}, title = {2013 International Conference on Collaboration Technologies and Systems, {CTS} 2013, San Diego, CA, USA, May 20-24, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6558543/proceeding}, isbn = {978-1-4673-6403-4}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/cts/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2013w, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9}, doi = {10.1007/978-3-642-41320-9}, isbn = {978-3-642-41319-3}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2013w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2013, editor = {Ahmad{-}Reza Sadeghi}, title = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1}, doi = {10.1007/978-3-642-39884-1}, isbn = {978-3-642-39883-4}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indin/2013, title = {11th {IEEE} International Conference on Industrial Informatics, {INDIN} 2013, Bochum, Germany, July 29-31, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6599026/proceeding}, isbn = {978-1-4799-0752-6}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/indin/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2013, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6621627/proceeding}, isbn = {978-1-4799-0808-0}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/issa/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isse/2013, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2}, doi = {10.1007/978-3-658-03371-2}, isbn = {978-3-658-03370-5}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/isse/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/istas/2013, title = {Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 {IEEE} International Symposium on Technology and Society, {ISTAS} 2013, Toronto, ON, Canada, 27-29 June, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6596466/proceeding}, isbn = {978-1-4799-1242-1}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/istas/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wocc/2013, title = {22nd Wireless and Optical Communication Conference, {WOCC} 2013, Chongqing, China, May 16-18, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6657106/proceeding}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/wocc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/amcis/2012, title = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle, Washington, USA, August 9-11, 2012}, publisher = {Association for Information Systems}, year = {2012}, url = {http://aisel.aisnet.org/amcis2012/}, isbn = {978-0-615-66346-3}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/amcis/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2012, editor = {Angelos D. Keromytis}, title = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3}, doi = {10.1007/978-3-642-32946-3}, isbn = {978-3-642-32945-6}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ichit/2011-2, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, title = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24106-2}, doi = {10.1007/978-3-642-24106-2}, isbn = {978-3-642-24105-5}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/ichit/2011-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2010, editor = {Radu Sion}, title = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3}, doi = {10.1007/978-3-642-14577-3}, isbn = {978-3-642-14576-6}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2010w, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4}, doi = {10.1007/978-3-642-14992-4}, isbn = {978-3-642-14991-7}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2010w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iceis/2010-4, editor = {Joaquim Filipe and Jos{\'{e}} Cordeiro}, title = {{ICEIS} 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 4, SAIC, Funchal, Madeira, Portugal, June 8 - 12, 2010}, publisher = {SciTePress}, year = {2010}, isbn = {978-989-8425-07-2}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/iceis/2010-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/natosec/27, editor = {Mark Last and Abraham Kandel}, title = {Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {27}, publisher = {{IOS} Press}, year = {2010}, url = {https://doi.org/10.3233/978-1-60750-611-9}, doi = {10.3233/978-1-60750-611-9}, isbn = {978-1-60750-610-2}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/series/natosec/27.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/amcis/2009, editor = {Robert C. Nickerson and Ramesh Sharda}, title = {Proceedings of the 15th Americas Conference on Information Systems, {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009}, publisher = {Association for Information Systems}, year = {2009}, url = {http://aisel.aisnet.org/amcis2009/}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/amcis/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2009, editor = {Roger Dingledine and Philippe Golle}, title = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4}, doi = {10.1007/978-3-642-03549-4}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/interaction/2009, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-710-3}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/interaction/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2008, editor = {Gene Tsudik}, title = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8}, doi = {10.1007/978-3-540-85230-8}, isbn = {978-3-540-85229-2}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isse/2008, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {{ISSE} 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain}, publisher = {Vieweg+Teubner}, year = {2009}, url = {https://doi.org/10.1007/978-3-8348-9283-6}, doi = {10.1007/978-3-8348-9283-6}, isbn = {978-3-8348-0660-4}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/isse/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pst/2008, editor = {Larry Korba and Stephen Marsh and Reihaneh Safavi{-}Naini}, title = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4641258/proceeding}, isbn = {978-0-7695-3390-2}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/pst/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wkdd/2008, title = {Proceedings of the International Workshop on Knowledge Discovery and Data Mining, {WKDD} 2008, Adelaide, Australia, 23-24 January 2008}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4470328/proceeding}, isbn = {0-7695-3090-7}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/wkdd/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecis/2005, editor = {Dieter Bartmann and Federico Rajola and Jannis Kallinikos and David E. Avison and Robert Winter and Phillip Ein{-}Dor and J{\"{o}}rg Becker and Freimut Bodendorf and Christof Weinhardt}, title = {Proceedings of the 13th European Conference on Information Systems, Information Systems in a Rapidly Changing Economy, {ECIS} 2005, Regensburg, Germany, May 26-28, 2005}, year = {2005}, url = {http://aisel.aisnet.org/ecis2005}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/ecis/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2005, editor = {Andrew S. Patrick and Moti Yung}, title = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137875}, doi = {10.1007/B137875}, isbn = {3-540-26656-9}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icete/2005s, editor = {Joaquim Filipe and Helder Coelhas and M{\'{o}}nica Saramago}, title = {E-business and Telecommunication Networks - Second International Conference, {ICETE} 2005, Reading, UK, October 3-7, 2005. Selected Papers}, series = {Communications in Computer and Information Science}, volume = {3}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75993-5}, doi = {10.1007/978-3-540-75993-5}, isbn = {978-3-540-75992-8}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/icete/2005s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icete/2005, editor = {Joaquim Filipe and Luminita Vasiu}, title = {{ICETE} 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005}, publisher = {{INSTICC} Press}, year = {2005}, isbn = {972-8865-32-5}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/icete/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/issa/2005, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, isbn = {1-86854-625-X}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/issa/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/SP2005, editor = {Khalid Saeed and Jerzy Pejas}, title = {Information Processing and Security Systems}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137371}, doi = {10.1007/B137371}, isbn = {978-0-387-25091-5}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/books/sp/SP2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ACMicec/2004, editor = {Marijn Janssen and Henk G. Sol and Ren{\'{e}} W. Wagenaar}, title = {Proceedings of the 6th International Conference on Electronic Commerce, {ICEC} 2004, Delft, The Netherlands, October 25-27, 2004}, series = {{ACM} International Conference Proceeding Series}, volume = {60}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1052220}, doi = {10.1145/1052220}, isbn = {1-58113-930-6}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2004, editor = {Ari Juels}, title = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98935}, doi = {10.1007/B98935}, isbn = {3-540-22420-3}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2003, editor = {Rebecca N. Wright}, title = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6}, doi = {10.1007/978-3-540-45126-6}, isbn = {3-540-40663-8}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wsc/2002, editor = {Jane L. Snowdon and John M. Charnes}, title = {Proceedings of the 34th Winter Simulation Conference: Exploring New Frontiers, San Diego, California, USA, December 8-11, 2002}, publisher = {{WSC}}, year = {2002}, url = {https://ieeexplore.ieee.org/xpl/conhome/8343/proceeding}, isbn = {0-7803-7615-3}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/wsc/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2001, editor = {Paul F. Syverson}, title = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46088-8}, doi = {10.1007/3-540-46088-8}, isbn = {3-540-44079-8}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2000, editor = {Yair Frankel}, title = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45472-1}, doi = {10.1007/3-540-45472-1}, isbn = {3-540-42700-7}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icis/2000, editor = {Soon Ang and Helmut Krcmar and Wanda J. Orlikowski and Peter Weill and Janice I. DeGross}, title = {Proceedings of the Twenty-First International Conference on Information Systems, {ICIS} 2000, Brisbane, Australia, December 10-13, 2000}, publisher = {Association for Information Systems}, year = {2000}, url = {http://aisel.aisnet.org/icis2000}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/icis/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11-1/1999, editor = {Jan H. P. Eloff and Les Labuschagne and Rossouw von Solms and Jan Verschuren}, title = {Information Security Management {\&} Small Systems Security, {IFIP} {TC11} {WG11.1/WG11.2} Seventh Annual Working Conference on Information Security Management {\&} Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands}, series = {{IFIP} Conference Proceedings}, volume = {154}, publisher = {Kluwer}, year = {1999}, isbn = {0-7923-8626-4}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-1/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/1998, editor = {Rafael Hirschfeld}, title = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055468}, doi = {10.1007/BFB0055468}, isbn = {3-540-64951-4}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/1997, editor = {Rafael Hirschfeld}, title = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7}, doi = {10.1007/3-540-63594-7}, isbn = {3-540-63594-7}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/fc/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/lisa/1994, title = {Proceedings of the 8th Conference on Systems Administration {(LISA} 1994), San Diego, California, USA, September 19-23, 1994}, publisher = {{USENIX}}, year = {1994}, isbn = {1-880446-64-2}, timestamp = {Tue, 18 Jun 2024 12:55:04 +0200}, biburl = {https://dblp.org/rec/conf/lisa/1994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.