Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "financial security"
@article{DBLP:journals/tcss/JiangWZNL24, author = {Changjun Jiang and Fei{-}Yue Wang and Mengchu Zhou and Asoke K. Nandi and Guanjun Liu}, title = {Guest Editorial: Special Issue on Big Data and Computational Social Intelligence for Guaranteed Financial Security}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {2}, pages = {1551--1555}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2024.3373929}, doi = {10.1109/TCSS.2024.3373929}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/JiangWZNL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ZhaoHLMW24, author = {Qin Zhao and Jingyi Huang and Gang Liu and Yaru Miao and Pengwei Wang}, title = {A Multiinterest and Social Interest-Field Framework for Financial Security}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {2}, pages = {1685--1695}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2023.3252611}, doi = {10.1109/TCSS.2023.3252611}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/ZhaoHLMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2023-1, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13950}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-47754-6}, doi = {10.1007/978-3-031-47754-6}, isbn = {978-3-031-47753-9}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2023-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2023-2, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13951}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-47751-5}, doi = {10.1007/978-3-031-47751-5}, isbn = {978-3-031-47750-8}, timestamp = {Sat, 09 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2023-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2023w, editor = {Aleksander Essex and Shin'ichiro Matsuo and Oksana Kulyk and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez and Sam Werner and Andrea Bracciali and Geoff Goodell}, title = {Financial Cryptography and Data Security. {FC} 2023 International Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia, May 5, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13953}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-48806-1}, doi = {10.1007/978-3-031-48806-1}, isbn = {978-3-031-48805-4}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2023w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejcs/Wang23, author = {Yanzhao Wang}, title = {Intelligent cluster construction of internet financial security protection system in banking industry}, journal = {Open Comput. Sci.}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.1515/comp-2022-0268}, doi = {10.1515/COMP-2022-0268}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cejcs/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23, author = {Julija Gavenaite{-}Sirvydiene and Algita Miecinskiene}, title = {The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {497--518}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1243}, doi = {10.13052/JCSM2245-1439.1243}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/GavenaiteSirvydieneM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/SaqibA23, author = {Nazar Abbas Saqib and Shahad Talla AL{-}Talla}, title = {Scaling Up Security and Efficiency in Financial Transactions and Blockchain Systems}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {2}, pages = {31}, year = {2023}, url = {https://doi.org/10.3390/jsan12020031}, doi = {10.3390/JSAN12020031}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/SaqibA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Yu23, author = {Haiping Yu}, title = {Application of blockchain technology in the data processing security system of financial enterprises}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.230}, doi = {10.1002/SPY2.230}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Yu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/DansoMGDS23, author = {Juliana Mantebea Danso and Yaw Marfo Missah and Enoch Opanin Gyamfi and Stephen Dankwa and Kwabena Sarpong}, title = {Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {2}, pages = {124}, year = {2023}, url = {https://doi.org/10.1007/s42979-022-01540-z}, doi = {10.1007/S42979-022-01540-Z}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/DansoMGDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bde/Ji23, author = {Wenjun Ji}, title = {Research and analysis of the security risk management strategy of big data technology in the financial industry}, booktitle = {Proceedings of the 2023 5th International Conference on Big Data Engineering, {BDE} 2023, Zhuhai, China, November 17-20, 2023}, pages = {67--72}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3640872.3640883}, doi = {10.1145/3640872.3640883}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bde/Ji23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/RazaviJEAH23, author = {Hooman Razavi and Mohammad Reza Jamali and Morvaridsadat Emsaki and Ali Ahmadi and Mostafa Hajiaghaei{-}Keshteli}, title = {Quantifying the Financial Impact of Cyber Security Attacks on Banks: {A} Big Data Analytics Approach}, booktitle = {{IEEE} Canadian Conference on Electrical and Computer Engineering, {CCECE} 2023, Regina, SK, Canada, September 24-27, 2023}, pages = {533--538}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CCECE58730.2023.10288963}, doi = {10.1109/CCECE58730.2023.10288963}, timestamp = {Thu, 09 Nov 2023 15:01:12 +0100}, biburl = {https://dblp.org/rec/conf/ccece/RazaviJEAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/KavunLKLL23, author = {Sergii Kavun and Ruslana Levkina and Yana Kotko and Dmytro Levkin and Artur Levkin}, editor = {Volodymyr Sokolov and Tamara Radivilova and Vasyl Ustimenko and Mariya Nazarkevych}, title = {Information Security in Project Management for the Financial and Budgetary Capacity of the National Economy (short paper)}, booktitle = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2023), Kyiv, Ukraine, October 26, 2023 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3550}, pages = {246--254}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3550/short8.pdf}, timestamp = {Fri, 24 Nov 2023 12:33:41 +0100}, biburl = {https://dblp.org/rec/conf/cpits/KavunLKLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurousec/MehrnezhadA23, author = {Maryam Mehrnezhad and Teresa Almeida}, title = {"My sex-related data is more sensitive than my financial data and {I} want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies}, booktitle = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023}, pages = {1--14}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617072.3617100}, doi = {10.1145/3617072.3617100}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurousec/MehrnezhadA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsci/NurmaraHAJSKI23, author = {Muhammad Azril Kurniawan Nurmara and Muhammad Naufal Hakim and Oey Hans Christian Ardy and Reynaldo Jeffrey and Vincentius Albert Setiono and Bayu Kanigoro and Edy Irwansyah}, editor = {Alexander Agung Santoso Gunawan}, title = {A Review of Security in Financial Technology}, booktitle = {Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, {ICCSCI} 2023, 02-03 August 2023, Malang, Indonesia}, series = {Procedia Computer Science}, volume = {227}, pages = {958--965}, publisher = {Elsevier}, year = {2023}, url = {https://doi.org/10.1016/j.procs.2023.10.603}, doi = {10.1016/J.PROCS.2023.10.603}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsci/NurmaraHAJSKI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/YeWWWYT23, author = {Xin Ye and Shimin Wang and Han Wang and Qinwei Wei and Ting Yang and Yu Tao}, title = {Application of Knowledge Graph in Financial Information Security Strategy}, booktitle = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, pages = {188--192}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617184.3630130}, doi = {10.1145/3617184.3630130}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/YeWWWYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/BurkhanovTUINA23, author = {Aktam Usmanovich Burkhanov and Bobur Ortikmirzaevich Tursunov and Khusniddin Fakhriddinovich Uktamov and Jamshidxon Odilovich Imomov and Jasur Tursunpulotovich Nosirov and Barno Akbarova}, title = {Ways and Prospects of Rational Use of Production Capacity in Ensuring Financial Security in Textile Enterprises In The Conditions of Digital Economy Transformation}, booktitle = {Proceedings of the 7th International Conference on Future Networks and Distributed Systems, {ICFNDS} 2023, Dubai, United Arab Emirates, December 21-22, 2023}, pages = {234--242}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3644713.3644744}, doi = {10.1145/3644713.3644744}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/BurkhanovTUINA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitjo/ShalabiAA23, author = {Khawla Shalabi and Mustafa Al{-}Fayoumi and Qasem Abu Al{-}Haija}, title = {Enhancing Financial System Resilience Against Cyber Threats via {SWIFT} Customer Security Framework}, booktitle = {International Conference on Information Technology, {ICIT} 2023, Amman, Jordan, August 9-10, 2023}, pages = {260--265}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICIT58056.2023.10226165}, doi = {10.1109/ICIT58056.2023.10226165}, timestamp = {Wed, 06 Sep 2023 16:07:28 +0200}, biburl = {https://dblp.org/rec/conf/icitjo/ShalabiAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BelliniLBSBR23, author = {Rosanna Bellini and Kevin Lee and Megan A. Brown and Jeremy Shaffer and Rasika Bhalerao and Thomas Ristenpart}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {87--104}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/bellini}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BelliniLBSBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangHMXMFTJ23, author = {Wansen Wang and Wenchao Huang and Zhaoyi Meng and Yan Xiong and Fuyou Miao and Xianjin Fang and Caichang Tu and Renjie Ji}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Automated Inference on Financial Security of Ethereum Smart Contracts}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3367--3383}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wang-wansen}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WangHMXMFTJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2022w, editor = {Shin'ichiro Matsuo and Lewis Gudgeon and Ariah Klages{-}Mundt and Daniel Perez Hernandez and Sam Werner and Thomas Haines and Aleksander Essex and Andrea Bracciali and Massimiliano Sala}, title = {Financial Cryptography and Data Security. {FC} 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13412}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-32415-4}, doi = {10.1007/978-3-031-32415-4}, isbn = {978-3-031-32414-7}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2022w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-05956, author = {Maryam Mehrnezhad and Teresa Almeida}, title = {"My sex-related data is more sensitive than my financial data and {I} want the same level of security and privacy": User Risk Perceptions and Protective Actions in Female-oriented Technologies}, journal = {CoRR}, volume = {abs/2306.05956}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.05956}, doi = {10.48550/ARXIV.2306.05956}, eprinttype = {arXiv}, eprint = {2306.05956}, timestamp = {Wed, 14 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-05956.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-18668, author = {Prof N. Jeenath Laila and Dr G. Tamilpavai}, title = {FinBTech: Blockchain-Based Video and Voice Authentication System for Enhanced Security in Financial Transactions Utilizing FaceNet512 and Gaussian Mixture Models}, journal = {CoRR}, volume = {abs/2310.18668}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.18668}, doi = {10.48550/ARXIV.2310.18668}, eprinttype = {arXiv}, eprint = {2310.18668}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-18668.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Maikowski22, author = {Alfons Michael Maikowski}, title = {Why do financial institutions implement blockchain technology in security settlement?: {A} conceptual framework for blockchain business cases}, school = {Technical University of Berlin, Germany}, year = {2022}, url = {https://nbn-resolving.org/urn:nbn:de:101:1-2022081002022118546923}, urn = {urn:nbn:de:101:1-2022081002022118546923}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Maikowski22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/SunWZ22, author = {Qi Sun and Hong Wu and Binglong Zhao}, title = {Artificial intelligence technology in internet financial edge computing and analysis of security risk}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {39}, number = {4}, pages = {201--210}, year = {2022}, url = {https://doi.org/10.1504/IJAHUC.2022.121654}, doi = {10.1504/IJAHUC.2022.121654}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijahuc/SunWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/ZhouW22, author = {Xiuying Zhou and Huaqun Weng}, title = {Assessing information security performance of enterprise internal financial sharing in cloud computing environment using analytic hierarchy process}, journal = {Int. J. Grid Util. Comput.}, volume = {13}, number = {2/3}, pages = {256--271}, year = {2022}, url = {https://doi.org/10.1504/IJGUC.2022.124398}, doi = {10.1504/IJGUC.2022.124398}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/ZhouW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfomandi/AmponsahAW22, author = {Anokye Acheampong Amponsah and Adebayo Felix Adekoya and Benjamin Asubam Weyori}, title = {Improving the Financial Security of National Health Insurance using Cloud-Based Blockchain Technology Application}, journal = {Int. J. Inf. Manag. Data Insights}, volume = {2}, number = {1}, pages = {100081}, year = {2022}, url = {https://doi.org/10.1016/j.jjimei.2022.100081}, doi = {10.1016/J.JJIMEI.2022.100081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfomandi/AmponsahAW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ShiZZDLL22, author = {Hongfang Shi and Wenying Zhang and Zimin Zhang and Dewen Ding and Huimin Liu and Hong Lei}, title = {Understanding digit-only financial account passwords: {ID} card, structure, and security}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {11}, pages = {8635--8652}, year = {2022}, url = {https://doi.org/10.1002/int.22959}, doi = {10.1002/INT.22959}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ShiZZDLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KwatengAT22, author = {Kwame Owusu Kwateng and Christopher Amanor and Francis Kamewor Tetteh}, title = {Enterprise risk management and information technology security in the financial sector}, journal = {Inf. Comput. Secur.}, volume = {30}, number = {3}, pages = {422--451}, year = {2022}, url = {https://doi.org/10.1108/ICS-11-2020-0185}, doi = {10.1108/ICS-11-2020-0185}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KwatengAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jeim/TayaksiAKS22, author = {Cansu Tayaksi and Erhan Ada and Yigit Kazan{\c{c}}oglu and Muhittin Sagnak}, title = {The financial impacts of information systems security breaches on publicly traded companies: reactions of different sectors}, journal = {J. Enterp. Inf. Manag.}, volume = {35}, number = {2}, pages = {650--668}, year = {2022}, url = {https://doi.org/10.1108/JEIM-11-2020-0450}, doi = {10.1108/JEIM-11-2020-0450}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jeim/TayaksiAKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/WuSWL22, author = {Wenqing Wu and Kun Shi and Chia{-}Huei Wu and Jiayue Liu}, title = {Research on the Impact of Information Security Certification and Concealment on Financial Performance: Impact of {ISO} 27001 and Concealment on Performance}, journal = {J. Glob. Inf. Manag.}, volume = {30}, number = {3}, pages = {1--16}, year = {2022}, url = {https://doi.org/10.4018/jgim.20220701.oa2}, doi = {10.4018/JGIM.20220701.OA2}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jgim/WuSWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smr/QasaimehHYATL22, author = {Malik Qasaimeh and Rand Abu Hammour and Muneer O. Bani Yassein and Raad S. Al{-}Qassas and Juan Alfonso Lara Torralbo and David Lizcano}, title = {Advanced security testing using a cyber-attack forecasting model: {A} case study of financial institutions}, journal = {J. Softw. Evol. Process.}, volume = {34}, number = {11}, year = {2022}, url = {https://doi.org/10.1002/smr.2489}, doi = {10.1002/SMR.2489}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smr/QasaimehHYATL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/systems/DengZDFL22, author = {Shangkun Deng and Yingke Zhu and Shuangyang Duan and Zhe Fu and Zonghua Liu}, title = {Stock Price Crash Warning in the Chinese Security Market Using a Machine Learning-Based Method and Financial Indicators}, journal = {Syst.}, volume = {10}, number = {4}, pages = {108}, year = {2022}, url = {https://doi.org/10.3390/systems10040108}, doi = {10.3390/SYSTEMS10040108}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/systems/DengZDFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/LiF22, author = {Yueqi Li and Ingrid Fisher}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {Digital Financial Literacy, Risk Aversion, and College Students' Online Security Behavior}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {4807--4811}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10020556}, doi = {10.1109/BIGDATA55660.2022.10020556}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/LiF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bisec/MircevskiPAS22, author = {Julijana Mircevski and Nikola B. Popovic and Mirjana Andric and Branko Stanojev}, editor = {Nemanja Zdravkovic and Dragan Domazet and Sonsoles L{\'{o}}pez{-}Pernas and Miguel {\'{A}}ngel Conde and Ponnusamy Vijayakumar}, title = {Security of Financial Software to Support Cryptocurrency Trading}, booktitle = {Proceedings of the 13th International Conference on Business Information Security (BISEC-2022), Belgrade, Serbia, December 02, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3529}, pages = {20--26}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3529/short\_3.pdf}, timestamp = {Tue, 19 Dec 2023 17:15:12 +0100}, biburl = {https://dblp.org/rec/conf/bisec/MircevskiPAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/Liu22e, author = {Tian Liu}, title = {Research on Information Security of Enterprise Group Financial Sharing in Cloud Computing Environment}, booktitle = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, pages = {1201--1207}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573428.3573642}, doi = {10.1145/3573428.3573642}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/Liu22e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TiwariAJDDRG22, author = {Pratyush Ranjan Tiwari and Dhruv Agarwal and Prakhar Jain and Swagam Dasgupta and Preetha Datta and Vineet Reddy and Debayan Gupta}, editor = {Ittay Eyal and Juan A. Garay}, title = {India's "Aadhaar" Biometric {ID:} Structure, Security, and Vulnerabilities}, booktitle = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13411}, pages = {672--693}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18283-9\_34}, doi = {10.1007/978-3-031-18283-9\_34}, timestamp = {Tue, 25 Oct 2022 22:22:45 +0200}, biburl = {https://dblp.org/rec/conf/fc/TiwariAJDDRG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/CastellanoFP22, author = {Nicola G. Castellano and Carsten Felden and Robert E. Pinsker}, title = {Shadow {IT} Behavior of Financial Executives in Germany and Italy as an Antecedent to Internal Data Security Breaches}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--11}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/80105}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/CastellanoFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/Tursunov22a, author = {Bobir Tursunov}, title = {Financial Security in Small Business in period of Digital Economy: in Case of Uzbekistan}, booktitle = {Proceedings of the 6th International Conference on Future Networks {\&} Distributed Systems, {ICFNDS} 2022, Tashkent, Uzbekistan, 15 December 2022}, pages = {491--498}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584202.3584275}, doi = {10.1145/3584202.3584275}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/Tursunov22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/ZarovaT22, author = {Elena Zarova and Bobir Tursunov}, title = {Methodology for Assessing the Financial Security of Enterprises in the Post-Pandemic period of Digital Economy}, booktitle = {Proceedings of the 6th International Conference on Future Networks {\&} Distributed Systems, {ICFNDS} 2022, Tashkent, Uzbekistan, 15 December 2022}, pages = {110--115}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3584202.3584219}, doi = {10.1145/3584202.3584219}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/ZarovaT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/LiZX22, author = {Jin Li and Tong Zhang and Shen Xu}, editor = {Ming{-}Hui Huang and Guy Gable and Christy M. K. Cheung and Dongming Xu}, title = {The Impact of Financial Restatement on Reported Data Security Breach}, booktitle = {26th Pacific Asia Conference on Information Systems, {PACIS} 2022, Virtual Event / Taipei, Taiwan / Sydney, Australia, July 5-9, 2022}, pages = {283}, year = {2022}, url = {https://aisel.aisnet.org/pacis2022/283}, timestamp = {Fri, 22 Jul 2022 11:46:17 +0200}, biburl = {https://dblp.org/rec/conf/pacis/LiZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustHKS22, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Financially Backed Covert Security}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {99--129}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_4}, doi = {10.1007/978-3-030-97131-1\_4}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FaustHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2022, editor = {Ittay Eyal and Juan A. Garay}, title = {Financial Cryptography and Data Security - 26th International Conference, {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13411}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18283-9}, doi = {10.1007/978-3-031-18283-9}, isbn = {978-3-031-18282-2}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12960, author = {Wansen Wang and Wenchao Huang and Zhaoyi Meng and Yan Xiong and Fuyou Miao and Xianjin Fang and Caichang Tu and Renjie Ji}, title = {An Automated Analyzer for Financial Security of Ethereum Smart Contracts}, journal = {CoRR}, volume = {abs/2208.12960}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12960}, doi = {10.48550/ARXIV.2208.12960}, eprinttype = {arXiv}, eprint = {2208.12960}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12960.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/GervaisV22, author = {Arthur Gervais and Marie Vasek}, title = {Security of Decentralized Financial Technologies (Dagstuhl Seminar 22421)}, journal = {Dagstuhl Reports}, volume = {12}, number = {10}, pages = {129--142}, year = {2022}, url = {https://doi.org/10.4230/DagRep.12.10.129}, doi = {10.4230/DAGREP.12.10.129}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/GervaisV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iam/GoelWHW21, author = {Sanjay Goel and Kevin J. Williams and Jingyi Huang and Merrill Warkentin}, title = {Can financial incentives help with the struggle for security policy compliance?}, journal = {Inf. Manag.}, volume = {58}, number = {4}, pages = {103447}, year = {2021}, url = {https://doi.org/10.1016/j.im.2021.103447}, doi = {10.1016/J.IM.2021.103447}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iam/GoelWHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MassacciN21, author = {Fabio Massacci and Chan Nam Ngo}, title = {Distributed Financial Exchanges: Security Challenges and Design Principles}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {54--64}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.2994826}, doi = {10.1109/MSEC.2020.2994826}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/MassacciN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbir/AkhtarSBV21, author = {Shahzeb Akhtar and Pratima Amol Sheorey and Sonali Bhattacharya and Ajith Kumar Vadakki Veetil}, title = {Cyber Security Solutions for Businesses in Financial Services: Challenges, Opportunities, and the Way Forward}, journal = {Int. J. Bus. Intell. Res.}, volume = {12}, number = {1}, pages = {82--97}, year = {2021}, url = {https://doi.org/10.4018/ijbir.20210101.oa5}, doi = {10.4018/IJBIR.20210101.OA5}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbir/AkhtarSBV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/QuLB21, author = {Qiao Qu and Cheng Liu and Xinzhong Bao}, title = {Financial Security Analysis of E-Commerce Platform Based on Supply Chain for Heterogeneous Network Location Verification}, journal = {J. Sensors}, volume = {2021}, pages = {1--14}, year = {2021}, url = {https://doi.org/10.1155/2021/7952123}, doi = {10.1155/2021/7952123}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/QuLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/WeiY21, author = {Ran Wei and Sheng Yao}, title = {Enterprise Financial Risk Identification and Information Security Management and Control in Big Data Environment}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {7188327:1--7188327:6}, year = {2021}, url = {https://doi.org/10.1155/2021/7188327}, doi = {10.1155/2021/7188327}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/WeiY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/EduAA21, author = {Sampson Abeeku Edu and Mary Agoyi and Divine Quazie Agozie}, title = {Digital security vulnerabilities and threats implications for financial institutions deploying digital technology platforms and application: {FMEA} and {FTOPSIS} analysis}, journal = {PeerJ Comput. Sci.}, volume = {7}, pages = {e658}, year = {2021}, url = {https://doi.org/10.7717/peerj-cs.658}, doi = {10.7717/PEERJ-CS.658}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/peerj-cs/EduAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiam/LinX21, author = {Zhisheng Lin and Yan Xia}, title = {Network Security of University Financial Sharing Platform under the Background of Smart Campus}, booktitle = {{AIAM} 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23 - 25, 2021}, pages = {1304--1308}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3495018.3495387}, doi = {10.1145/3495018.3495387}, timestamp = {Thu, 24 Mar 2022 09:42:53 +0100}, biburl = {https://dblp.org/rec/conf/aiam/LinX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/BatorshynaTKCH21, author = {Adilia Batorshyna and Volodymyr Tokar and Natalia Kotenko and Serhii Chekhovych and Andrii Homotiuk}, editor = {Anatoly Bessalov and Dmytro Ageyev and Valeriy Lahno and Volodymyr Sokolov}, title = {The Impact of Awareness Stimulating Activities and Events on Global Islamic Finance Assets: Enhancing Financial Risk Management and Economic Security in Non-Muslim Countries}, booktitle = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II.} Volume {I} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2021), Kyiv, Ukraine, October 26, 2021 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3187}, pages = {13--26}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3187/paper2.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:31 +0100}, biburl = {https://dblp.org/rec/conf/cpits/BatorshynaTKCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpits/KreidychKK21, author = {Iryna Kreidych and leksandr Kharchenko and Oksana Kazak}, editor = {Anatoly Bessalov and Dmytro Ageyev and Valeriy Lahno and Volodymyr Sokolov}, title = {Solvency Management in the Financial Security System of Housing and Communal Services}, booktitle = {Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems {II.} Volume {II} co-located with International Conference on Problems of Infocommunications. Science and Technology {(PICST} 2021), Kyiv, Ukraine, October 26, 2021 (online)}, series = {{CEUR} Workshop Proceedings}, volume = {3188}, pages = {63--75}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-3188/paper7.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:31 +0100}, biburl = {https://dblp.org/rec/conf/cpits/KreidychKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DasKC21, author = {Sanchari Das and Andrew Kim and L. Jean Camp}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for {MFA} Adoption}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {406--413}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0\_21}, doi = {10.1007/978-3-662-64331-0\_21}, timestamp = {Thu, 16 Mar 2023 14:52:53 +0100}, biburl = {https://dblp.org/rec/conf/fc/DasKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icict/MohananSB21, author = {Sudhish Mohanan and Nandagopal Sridhar and Sajal Bhatia}, editor = {Xin{-}She Yang and Simon Sherratt and Nilanjan Dey and Amit Joshi}, title = {Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector}, booktitle = {Proceedings of Sixth International Congress on Information and Communication Technology - {ICICT} 2021, London, UK, Volume 2}, series = {Lecture Notes in Networks and Systems}, volume = {236}, pages = {1015--1025}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-2380-6\_90}, doi = {10.1007/978-981-16-2380-6\_90}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icict/MohananSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icise/FacciaSEB21, author = {Alessio Faccia and Nedal Sawan and Ahmed Eltweri and Zeenat Beebeejaun}, title = {Financial Big Data Security and Privacy in X-Accounting. {A} Step Further to Implement the Triple-Entry Accounting}, booktitle = {{ICISE} 2021: The 6th International Conference on Information Systems Engineering, Shanghai, China, November 12 - 14, 2021}, pages = {7--12}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3503928.3503932}, doi = {10.1145/3503928.3503932}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icise/FacciaSEB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ico/SattarMSPBPK21, author = {Md Rahat Ibne Sattar and Shrabonti Mitra and Sadia Sultana and Umme Salma Pushpa and Dhruba Bhattacharjee and Abhijit Pathak and Mayeen Uddin Khandaker}, title = {A Secured Network Layer and Information Security for Financial Institutions: {A} Case Study}, booktitle = {{ICO}}, pages = {992--1001}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93247-3\_94}, doi = {10.1007/978-3-030-93247-3\_94}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ico/SattarMSPBPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/TanCC21, author = {Vincent Tan and Carmen Cheh and Binbin Chen}, title = {From Application Security Verification Standard {(ASVS)} to Regulation Compliance: {A} Case Study in Financial Services Sector}, booktitle = {{IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021}, pages = {69--76}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSREW53611.2021.00046}, doi = {10.1109/ISSREW53611.2021.00046}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/TanCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021-1, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8}, doi = {10.1007/978-3-662-64322-8}, isbn = {978-3-662-64321-1}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021-2, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0}, doi = {10.1007/978-3-662-64331-0}, isbn = {978-3-662-64330-3}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2021w, editor = {Matthew Bernhard and Andrea Bracciali and Lewis Gudgeon and Thomas Haines and Ariah Klages{-}Mundt and Shin'ichiro Matsuo and Daniel Perez and Massimiliano Sala and Sam Werner}, title = {Financial Cryptography and Data Security. {FC} 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12676}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-63958-0}, doi = {10.1007/978-3-662-63958-0}, isbn = {978-3-662-63957-3}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2021w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHKS21a, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Financially Backed Covert Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1652}, year = {2021}, url = {https://eprint.iacr.org/2021/1652}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustHKS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitdm/Balashunmugaraja20, author = {B. Balashunmugaraja and T. R. Ganeshbabu}, title = {Optimal Key Generation for Data Sanitization and Restoration of Cloud Data: Future of Financial Cyber Security}, journal = {Int. J. Inf. Technol. Decis. Mak.}, volume = {19}, number = {4}, pages = {987--1013}, year = {2020}, url = {https://doi.org/10.1142/S0219622020500200}, doi = {10.1142/S0219622020500200}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitdm/Balashunmugaraja20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DzidzahKA20, author = {Esther Dzidzah and Kwame Owusu Kwateng and Benjamin Kofi Asante}, title = {Security behaviour of mobile financial service users}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {719--741}, year = {2020}, url = {https://doi.org/10.1108/ICS-02-2020-0021}, doi = {10.1108/ICS-02-2020-0021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DzidzahKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbft/KaulH20, author = {Sonam Devgan Kaul and Dimitrios Hatzinakos}, title = {Intelligent {RFID} biometric enabled dual security lock in the banking environment}, journal = {J. Bank. Financial Technol.}, volume = {4}, number = {2}, pages = {159--173}, year = {2020}, url = {https://doi.org/10.1007/s42786-020-00022-1}, doi = {10.1007/S42786-020-00022-1}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbft/KaulH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/PanWH20, author = {Shuang Pan and Jianguo Wei and Shaobo Hu}, title = {A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping and Intelligent Learning in Financial Security System}, journal = {Multim. Tools Appl.}, volume = {79}, number = {13-14}, pages = {9163--9176}, year = {2020}, url = {https://doi.org/10.1007/s11042-018-7144-5}, doi = {10.1007/S11042-018-7144-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/PanWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Moeckel20, author = {Caroline Moeckel}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Attacker-centric thinking in security: perspectives from financial services practitioners}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {1:1--1:10}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407082}, doi = {10.1145/3407023.3407082}, timestamp = {Mon, 03 Aug 2020 16:17:13 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/Moeckel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/PhamH20, author = {Thai Pham and Farkhondeh Hassandoust}, title = {The Role of External Mechanisms and Transformational Leadership in Information Security Policy Effectiveness: {A} Managerial Perspective of Financial Industry in Vietnam}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2020, Wellington, New Zealand, December 1-4, 2020}, pages = {79}, year = {2020}, url = {https://aisel.aisnet.org/acis2020/79}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/PhamH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atci/HuH20, author = {Shuyu Hu and Ming Huang}, editor = {Jemal H. Abawajy and Kim{-}Kwang Raymond Choo and Zheng Xu and Mohammed Atiquzzaman}, title = {Internet Financial Security Based on Big Data}, booktitle = {2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI} 2020), Fuyang, China, 20-22 June, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1244}, pages = {485--490}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-53980-1\_72}, doi = {10.1007/978-3-030-53980-1\_72}, timestamp = {Tue, 05 Apr 2022 12:05:39 +0200}, biburl = {https://dblp.org/rec/conf/atci/HuH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dessert/SirenkoAVPMF20, author = {Natalia N. Sirenko and Igor P. Atamanyuk and Yuriy Volosyuk and Anastasiya Poltorak and Olha Melnyk and Polina Fenenko}, title = {Paradigm Changes that Strengthen the Financial Security of the State through {FINTECH} Development}, booktitle = {11th {IEEE} International Conference on Dependable Systems, Services and Technologies, {DESSERT} 2020, Kyiv, Ukraine, May 14-18, 2020}, pages = {110--116}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DESSERT50317.2020.9125026}, doi = {10.1109/DESSERT50317.2020.9125026}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dessert/SirenkoAVPMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KulykRAMGV20, author = {Oksana Kulyk and Benjamin Reinheimer and Lukas Aldag and Peter Mayer and Nina Gerber and Melanie Volkamer}, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Security and Privacy Awareness in Smart Environments - {A} Cross-Country Investigation}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {84--101}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3\_7}, doi = {10.1007/978-3-030-54455-3\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KulykRAMGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OyebisiN20, author = {David Oyebisi and Kennedy Njenga}, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Behaviour of Outsourced Employees as Sources of Information System Security Threats}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {137--148}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3\_10}, doi = {10.1007/978-3-030-54455-3\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/OyebisiN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SuBSUM20, author = {Jianan Su and Michael Bartholic and Andrew Stange and Ryosuke Ushida and Shin'ichiro Matsuo}, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {How to Dynamically Incentivize Sufficient Level of IoT Security}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {451--465}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3\_32}, doi = {10.1007/978-3-030-54455-3\_32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/SuBSUM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Taylor-JacksonM20, author = {Jacqui Taylor{-}Jackson and John McAlaney and Jeffrey L. Foster and Abubakar Bello and Alana Maurushat and John Dale}, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Incorporating Psychology into Cyber Security Education: {A} Pedagogical Approach}, booktitle = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, pages = {207--217}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3\_15}, doi = {10.1007/978-3-030-54455-3\_15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Taylor-JacksonM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/WangYPB0D020, author = {Qin Wang and Jiangshan Yu and Zhiniang Peng and Van Cuong Bui and Shiping Chen and Yong Ding and Yang Xiang}, editor = {Joseph Bonneau and Nadia Heninger}, title = {Security Analysis on dBFT Protocol of {NEO}}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {20--31}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_2}, doi = {10.1007/978-3-030-51280-4\_2}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/WangYPB0D020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/YuenSLAEZG20, author = {Tsz Hon Yuen and Shifeng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu}, editor = {Joseph Bonneau and Nadia Heninger}, title = {RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {464--483}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_25}, doi = {10.1007/978-3-030-51280-4\_25}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/YuenSLAEZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ChenGCZL20, author = {Weili Chen and Xiongfeng Guo and Zhiguang Chen and Zibin Zheng and Yutong Lu}, editor = {Christian Bessiere}, title = {Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem}, booktitle = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, pages = {4506--4512}, publisher = {ijcai.org}, year = {2020}, url = {https://doi.org/10.24963/ijcai.2020/621}, doi = {10.24963/IJCAI.2020/621}, timestamp = {Mon, 20 Jul 2020 12:38:52 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/ChenGCZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isdmci/KulyniakOR20, author = {Ihor Kulyniak and Solomiya Ohinok and Halyna Rachynska}, editor = {Sergii Babichev and Volodymyr Lytvynenko and Waldemar W{\'{o}}jcik and Svetlana Vyshemyrskaya}, title = {Scientific and Methodological Approach to Assessing the Level of Banks' Financial Security}, booktitle = {Lecture Notes in Computational Intelligence and Decision Making - Proceedings of the 2020 International Scientific Conference "Intellectual Systems of Decision-making and Problems of Computational Intelligence", {ISDMCI} 2020, Kherson, Ukraine, May 25-29, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1246}, pages = {77--97}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54215-3\_6}, doi = {10.1007/978-3-030-54215-3\_6}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isdmci/KulyniakOR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/m3e2/KhrushchHHLPV20, author = {Nila Khrushch and Pavlo Hryhoruk and Tetiana Hovorushchenko and Sergii Lysenko and Liudmyla Prystupa and Liudmyla Vahanova}, editor = {Arnold Kiv}, title = {Assessment of bank's financial security levels based on a comprehensive index using information technology}, booktitle = {Proceedings of the Selected Papers of the Special Edition of International Conference on Monitoring, Modeling {\&} Management of Emergent Economy {(M3E2-MLPEED} 2020), Odessa, Ukraine, July 13-18, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2713}, pages = {239--260}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2713/paper23.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:44 +0100}, biburl = {https://dblp.org/rec/conf/m3e2/KhrushchHHLPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BelloP20, author = {Gabriel Bello and Alfredo J. Perez}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {On the Application of Financial Security Standards in Blockchain Platforms}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {247--267}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_13}, doi = {10.1007/978-3-030-38181-3\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BelloP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2019w, editor = {Andrea Bracciali and Jeremy Clark and Federico Pintore and Peter B. R{\o}nne and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2019 International Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11599}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-43725-1}, doi = {10.1007/978-3-030-43725-1}, isbn = {978-3-030-43724-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2019w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2020, editor = {Joseph Bonneau and Nadia Heninger}, title = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4}, doi = {10.1007/978-3-030-51280-4}, isbn = {978-3-030-51279-8}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2020w, editor = {Matthew Bernhard and Andrea Bracciali and L. Jean Camp and Shin'ichiro Matsuo and Alana Maurushat and Peter B. R{\o}nne and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12063}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-54455-3}, doi = {10.1007/978-3-030-54455-3}, isbn = {978-3-030-54454-6}, timestamp = {Sun, 09 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2020w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijais/McCalligRR19, author = {John McCallig and D. Alastair Robb and Fiona H. Rohde}, title = {Establishing the representational faithfulness of financial accounting information using multiparty security, network analysis and a blockchain}, journal = {Int. J. Account. Inf. Syst.}, volume = {33}, pages = {47--58}, year = {2019}, url = {https://doi.org/10.1016/j.accinf.2019.03.004}, doi = {10.1016/J.ACCINF.2019.03.004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijais/McCalligRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijssmet/Feltus19, author = {Christophe Feltus}, title = {Deriving Information System Security and Privacy From Value Cocreation Theory: Case Study in the Financial Sector}, journal = {Int. J. Serv. Sci. Manag. Eng. Technol.}, volume = {10}, number = {4}, pages = {1--25}, year = {2019}, url = {https://doi.org/10.4018/IJSSMET.2019100101}, doi = {10.4018/IJSSMET.2019100101}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijssmet/Feltus19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbft/DasguptaSG19, author = {Dipankar Dasgupta and John M. Shrein and Kishor Datta Gupta}, title = {A survey of blockchain from security perspective}, journal = {J. Bank. Financial Technol.}, volume = {3}, number = {1}, pages = {1--17}, year = {2019}, url = {https://doi.org/10.1007/s42786-018-00002-6}, doi = {10.1007/S42786-018-00002-6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbft/DasguptaSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/BarthJJHR19, author = {Susanne Barth and Menno D. T. de Jong and Marianne Junger and Pieter H. Hartel and Janina C. Roppelt}, title = {Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources}, journal = {Telematics Informatics}, volume = {41}, pages = {55--69}, year = {2019}, url = {https://doi.org/10.1016/j.tele.2019.03.003}, doi = {10.1016/J.TELE.2019.03.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tele/BarthJJHR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/SleeperMOTWSOSC19, author = {Manya Sleeper and Tara Matthews and Kathleen O'Leary and Anna Turner and Jill Palzkill Woelfer and Martin Shelton and Andrew Oplinger and Andreas Schou and Sunny Consolvo}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {Tough Times at Transitional Homeless Shelters: Considering the Impact of Financial Insecurity on Digital Security and Privacy}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {89}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300319}, doi = {10.1145/3290605.3300319}, timestamp = {Sun, 02 Jun 2019 21:13:35 +0200}, biburl = {https://dblp.org/rec/conf/chi/SleeperMOTWSOSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/MahalleYT19a, author = {Abhishek Mahalle and Jianming Yong and Xiaohui Tao}, editor = {Weiming Shen and Hugo Paredes and Junzhou Luo and Jean{-}Paul A. Barth{\`{e}}s}, title = {Ethics of {IT} Security Team for Cloud Architecture Infrastructure in Banking and Financial Services Industry}, booktitle = {23rd {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2019, Porto, Portugal, May 6-8, 2019}, pages = {506--511}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSCWD.2019.8791928}, doi = {10.1109/CSCWD.2019.8791928}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/MahalleYT19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AchenbachGH0LMM19, author = {Dirk Achenbach and Roland Gr{\"{o}}ll and Timon Hackenjos and Alexander Koch and Bernhard L{\"{o}}we and Jeremias Mechler and J{\"{o}}rn M{\"{u}}ller{-}Quade and Jochen Rill}, editor = {Ian Goldberg and Tyler Moore}, title = {Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the {UC} Framework}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {243--261}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_16}, doi = {10.1007/978-3-030-32101-7\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AchenbachGH0LMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AvarikiotiK0W19, author = {Georgia Avarikioti and Lukas K{\"{a}}ppeli and Yuyi Wang and Roger Wattenhofer}, editor = {Ian Goldberg and Tyler Moore}, title = {Bitcoin Security Under Temporary Dishonest Majority}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {466--483}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_28}, doi = {10.1007/978-3-030-32101-7\_28}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AvarikiotiK0W19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OzmenBY19, author = {Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz}, editor = {Ian Goldberg and Tyler Moore}, title = {Fast Authentication from Aggregate Signatures with Improved Security}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {686--705}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_39}, doi = {10.1007/978-3-030-32101-7\_39}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/OzmenBY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/m3e2/HryhorukKG19, author = {Pavlo Hryhoruk and Nila Khrushch and Svitlana Grygoruk}, editor = {Arnold Kiv and Serhiy Semerikov and Vladimir N. Soloviev and Liubov Kibalnyk and Hanna Danylchuk and Andriy Matviychuk}, title = {Model for Assessment of the Financial Security Level of the Enterprise Based on the Desirability Scale}, booktitle = {Proceedings of the Selected Papers of the 8th International Conference on Monitoring, Modeling {\&} Management of Emergent Economy, {M3E2-EEMLPEED} 2019, Odessa, Ukraine, May 22-24, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2422}, pages = {169--180}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2422/paper14.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:44 +0100}, biburl = {https://dblp.org/rec/conf/m3e2/HryhorukKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/TroianoSPPMD19, author = {Ernesto Troiano and John Soldatos and Ariana Polyviou and Andreas Polyviou and Alessandro Mamelli and Dimitris Drakoulis}, editor = {Richard Chbeir and Yannis Manolopoulos and Sergio Ilarri and Apostolos Papadopoulos}, title = {Big Data Platform for Integrated Cyber and Physical Security of Critical Infrastructures for the Financial Sector: Critical Infrastructures as Cyber-Physical Systems}, booktitle = {11th International Conference on Management of Digital EcoSystems, {MEDES} 2019, Limassol, Cyprus, November, 2019}, pages = {262--269}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297662.3365787}, doi = {10.1145/3297662.3365787}, timestamp = {Thu, 31 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/medes/TroianoSPPMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FettHK19, author = {Daniel Fett and Pedram Hosseyni and Ralf K{\"{u}}sters}, title = {An Extensive Formal Security Analysis of the OpenID Financial-Grade {API}}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {453--471}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00067}, doi = {10.1109/SP.2019.00067}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/FettHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mavroudis19, author = {Vasilios Mavroudis}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {91--103}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_9}, doi = {10.1007/978-3-030-57043-9\_9}, timestamp = {Mon, 24 Aug 2020 16:33:11 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mavroudis19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Mavroudis19a, author = {Vasilios Mavroudis}, editor = {Jonathan Anderson and Frank Stajano and Bruce Christianson and Vashek Maty{\'{a}}s}, title = {Bounded Temporal Fairness for {FIFO} Financial Markets (Transcript of Discussion)}, booktitle = {Security Protocols {XXVII} - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12287}, pages = {104--112}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-57043-9\_10}, doi = {10.1007/978-3-030-57043-9\_10}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Mavroudis19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2018w, editor = {Aviv Zohar and Ittay Eyal and Vanessa Teague and Jeremy Clark and Andrea Bracciali and Federico Pintore and Massimiliano Sala}, title = {Financial Cryptography and Data Security - {FC} 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10958}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-662-58820-8}, doi = {10.1007/978-3-662-58820-8}, isbn = {978-3-662-58819-2}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2018w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2019, editor = {Ian Goldberg and Tyler Moore}, title = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7}, doi = {10.1007/978-3-030-32101-7}, isbn = {978-3-030-32100-0}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-11520, author = {Daniel Fett and Pedram Hosseyni and Ralf K{\"{u}}sters}, title = {An Extensive Formal Security Analysis of the OpenID Financial-grade {API}}, journal = {CoRR}, volume = {abs/1901.11520}, year = {2019}, url = {http://arxiv.org/abs/1901.11520}, eprinttype = {arXiv}, eprint = {1901.11520}, timestamp = {Mon, 04 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-11520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Pan18, author = {Liuxuan Pan}, title = {Application of a financial quantitative risk model to information security risk assessment}, school = {Royal Holloway, University of London, Egham, {UK}}, year = {2018}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792802}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Pan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/Nkeki18a, author = {Charles I. Nkeki}, title = {Optimal investment risks and debt management with backup security in a financial crisis}, journal = {J. Comput. Appl. Math.}, volume = {338}, pages = {129--152}, year = {2018}, url = {https://doi.org/10.1016/j.cam.2018.01.032}, doi = {10.1016/J.CAM.2018.01.032}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcam/Nkeki18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taasm/Lee18, author = {Kyoung{-}Joo Lee}, title = {Strategic human resource management for university-industry collaborations in Korea: financial incentives for academic faculty and employment security of industry liaison offices}, journal = {Technol. Anal. Strateg. Manag.}, volume = {30}, number = {4}, pages = {461--472}, year = {2018}, url = {https://doi.org/10.1080/09537325.2017.1337885}, doi = {10.1080/09537325.2017.1337885}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taasm/Lee18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/MahalleYT018, author = {Abhishek Mahalle and Jianming Yong and Xiaohui Tao and Jun Shen}, editor = {Weiming Shen and Junzhou Luo and Jean{-}Paul A. Barth{\`{e}}s and Fang Dong and Jinghui Zhang and Haibin Zhu}, title = {Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure}, booktitle = {22nd {IEEE} International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2018, Nanjing, China, May 9-11, 2018}, pages = {407--413}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CSCWD.2018.8465318}, doi = {10.1109/CSCWD.2018.8465318}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/MahalleYT018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DasDC18, author = {Sanchari Das and Andrew Dingman and L. Jean Camp}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Why Johnny Doesn't Use Two Factor {A} Two-Phase Usability Study of the {FIDO} {U2F} Security Key}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {160--179}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_9}, doi = {10.1007/978-3-662-58387-6\_9}, timestamp = {Fri, 30 Aug 2019 11:17:01 +0200}, biburl = {https://dblp.org/rec/conf/fc/DasDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FarhangLG18, author = {Sadegh Farhang and Aron Laszka and Jens Grossklags}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {An Economic Study of the Effect of Android Platform Fragmentation on Security Updates}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {119--137}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_7}, doi = {10.1007/978-3-662-58387-6\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/FarhangLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Shacham18, author = {Hovav Shacham}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Short Unique Signatures from {RSA} with a Tight Security Reduction (in the Random Oracle Model)}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {61--79}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_4}, doi = {10.1007/978-3-662-58387-6\_4}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Shacham18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Massacci18, author = {Fabio Massacci}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {55--62}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_6}, doi = {10.1007/978-3-030-03251-7\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Massacci18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/MassacciN0W18, author = {Fabio Massacci and Chan Nam Ngo and Daniele Venturi and Julian Williams}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Non-monotonic Security Protocols and Failures in Financial Intermediation}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {45--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_5}, doi = {10.1007/978-3-030-03251-7\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/MassacciN0W18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2018, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6}, doi = {10.1007/978-3-662-58387-6}, isbn = {978-3-662-58386-9}, timestamp = {Fri, 30 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TraynorBBR17, author = {Patrick Traynor and Kevin R. B. Butler and Jasmine D. Bowers and Bradley Reaves}, title = {FinTechSec: Addressing the Security Challenges of Digital Financial Services}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {5}, pages = {85--89}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.3681060}, doi = {10.1109/MSP.2017.3681060}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TraynorBBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChothiaGHS17, author = {Tom Chothia and Flavio D. Garcia and Chris Heppel and Chris McMahon Stone}, editor = {Aggelos Kiayias}, title = {Why Banker Bob (Still) Can't Get {TLS} Right: {A} Security Analysis of {TLS} in Leading {UK} Banking Apps}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {579--597}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_33}, doi = {10.1007/978-3-319-70972-7\_33}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChothiaGHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Gjosteen017, author = {Kristian Gj{\o}steen and Martin Strand}, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {404--418}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0\_25}, doi = {10.1007/978-3-319-70278-0\_25}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/Gjosteen017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MalhotraGVKGG17, author = {Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and Haydn Kennedy and Jonathan Gardner and Sharon Goldberg}, editor = {Aggelos Kiayias}, title = {The Security of NTP's Datagram Protocol}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {405--423}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_23}, doi = {10.1007/978-3-319-70972-7\_23}, timestamp = {Tue, 02 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/MalhotraGVKGG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SzalachowskiP17, author = {Pawel Szalachowski and Adrian Perrig}, editor = {Aggelos Kiayias}, title = {Short Paper: On Deployment of DNS-Based Security Enhancements}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {424--433}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_24}, doi = {10.1007/978-3-319-70972-7\_24}, timestamp = {Tue, 02 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/SzalachowskiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2016, editor = {Jens Grossklags and Bart Preneel}, title = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54970-4}, doi = {10.1007/978-3-662-54970-4}, isbn = {978-3-662-54969-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017, editor = {Aggelos Kiayias}, title = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7}, doi = {10.1007/978-3-319-70972-7}, isbn = {978-3-319-70971-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2017w, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0}, doi = {10.1007/978-3-319-70278-0}, isbn = {978-3-319-70277-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2017w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/AppanB16, author = {Radha Appan and Dinko Bacic}, title = {Impact of Information Technology {(IT)} Security Information Sharing among Competing {IT} Firms on Firm's Financial Performance: An Empirical Investigation}, journal = {Commun. Assoc. Inf. Syst.}, volume = {39}, pages = {12}, year = {2016}, url = {https://doi.org/10.17705/1cais.03912}, doi = {10.17705/1CAIS.03912}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cais/AppanB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/ChunCS16, author = {Se{-}Hak Chun and Wooje Cho and Ramanath Subramanyam}, title = {Transaction security investments in online marketplaces: An analytical examination of financial liabilities}, journal = {Decis. Support Syst.}, volume = {92}, pages = {91--102}, year = {2016}, url = {https://doi.org/10.1016/j.dss.2016.09.015}, doi = {10.1016/J.DSS.2016.09.015}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/ChunCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/PandeyS16, author = {Pankaj Pandey and Einar Snekkenes}, title = {Using Financial Instruments to Transfer the Information Security Risks}, journal = {Future Internet}, volume = {8}, number = {2}, pages = {20}, year = {2016}, url = {https://doi.org/10.3390/fi8020020}, doi = {10.3390/FI8020020}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/PandeyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/RoumaniNR16, author = {Yaman Roumani and Joseph K. Nwankpa and Yazan F. Roumani}, title = {Examining the relationship between firm's financial records and security vulnerabilities}, journal = {Int. J. Inf. Manag.}, volume = {36}, number = {6}, pages = {987--994}, year = {2016}, url = {https://doi.org/10.1016/j.ijinfomgt.2016.05.016}, doi = {10.1016/J.IJINFOMGT.2016.05.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfoman/RoumaniNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lp/LinZ16, author = {Songqing Lin and Lijuan Zhan}, title = {International publishing partnerships for China's English language journals and financial security}, journal = {Learn. Publ.}, volume = {29}, number = {3}, pages = {145--153}, year = {2016}, url = {https://doi.org/10.1002/leap.1029}, doi = {10.1002/LEAP.1029}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lp/LinZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Noh16, author = {Kyoo{-}Sung Noh}, title = {A Study on the Authentication and Security of Financial Settlement Using the Finger Vein Technology in Wireless Internet Environment}, journal = {Wirel. Pers. Commun.}, volume = {89}, number = {3}, pages = {761--775}, year = {2016}, url = {https://doi.org/10.1007/s11277-015-3116-5}, doi = {10.1007/S11277-015-3116-5}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/Noh16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/GaiQE16a, author = {Keke Gai and Meikang Qiu and Sam Adam Elnagdy}, title = {Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data}, booktitle = {2nd {IEEE} International Conference on Big Data Security on Cloud, BigDataSecurity 2016, {IEEE} International Conference on High Performance and Smart Computing, {HPSC} 2016, and {IEEE} International Conference on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April 9-10, 2016}, pages = {197--202}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.66}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.66}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/GaiQE16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AlgwilY16, author = {Abdalnaser Algwil and Jeff Yan}, editor = {Jens Grossklags and Bart Preneel}, title = {Failures of Security APIs: {A} New Case}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {283--298}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_17}, doi = {10.1007/978-3-662-54970-4\_17}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AlgwilY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KrombholzJGW16, author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl}, editor = {Jens Grossklags and Bart Preneel}, title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {555--580}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_33}, doi = {10.1007/978-3-662-54970-4\_33}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KrombholzJGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LangCBSS16, author = {Juan Lang and Alexei Czeskis and Dirk Balfanz and Marius Schilder and Sampath Srinivas}, editor = {Jens Grossklags and Bart Preneel}, title = {Security Keys: Practical Cryptographic Second Factors for the Modern Web}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {422--440}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_25}, doi = {10.1007/978-3-662-54970-4\_25}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/LangCBSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/WahlgrenFMK16, author = {Gunnar Wahlgren and Anna Fedotova and Alexandra Musaeva and Stewart Kowalski}, editor = {Nathan L. Clarke and Steven Furnell}, title = {{IT} Security Incidents Escalation in the Swedish Financial Sector: {A} Maturity Model Study}, booktitle = {Tenth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings}, pages = {45--55}, publisher = {University of Plymouth}, year = {2016}, url = {http://www.cscan.org/openaccess/?paperid=281}, timestamp = {Tue, 06 Jul 2021 12:22:19 +0200}, biburl = {https://dblp.org/rec/conf/haisa/WahlgrenFMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhKC16, author = {Eun Oh and Tae{-}Sung Kim and Tae{-}Hee Cho}, editor = {Dooho Choi and Sylvain Guilley}, title = {Development of Information Security Management Assessment Model for the Financial Sector}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {186--197}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_16}, doi = {10.1007/978-3-319-56549-1\_16}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2016w, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4}, doi = {10.1007/978-3-662-53357-4}, isbn = {978-3-662-53356-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2016w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijais/Otero15, author = {Angel R. Otero}, title = {An information security control assessment methodology for organizations' financial information}, journal = {Int. J. Account. Inf. Syst.}, volume = {18}, pages = {26--45}, year = {2015}, url = {https://doi.org/10.1016/j.accinf.2015.06.001}, doi = {10.1016/J.ACCINF.2015.06.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijais/Otero15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisss/Ifinedo15, author = {Princely Ifinedo}, title = {Socio-Economic Correlates of Information Security Threats and Controls in Global Financial Services Industry: An Analysis}, journal = {Int. J. Inf. Syst. Serv. Sect.}, volume = {7}, number = {2}, pages = {54--70}, year = {2015}, url = {https://doi.org/10.4018/ijisss.2015040104}, doi = {10.4018/IJISSS.2015040104}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisss/Ifinedo15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/PandeyH15, author = {Pankaj Pandey and Steven De Haes}, editor = {Fatos Xhafa and Leonard Barolli and Fabrizio Messina and Marek R. Ogiela}, title = {A Variable Payout Information Security Financial Instrument and Trading Mechanism to Address Information Security Risk}, booktitle = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015}, pages = {17--25}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/3PGCIC.2015.109}, doi = {10.1109/3PGCIC.2015.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/PandeyH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csa2/AhnC15, author = {JungJin Ahn and Eunmi Choi}, editor = {Doo{-}Soon Park and Han{-}Chieh Chao and Young{-}Sik Jeong and James Jong Hyuk Park}, title = {Financial Security Protocol and Service Model for Joint Account Banking Transaction}, booktitle = {Advances in Computer Science and Ubiquitous Computing - {CSA} {\&} {CUTE} 2015, Cebu, Philippines, December 15-17, 2015}, series = {Lecture Notes in Electrical Engineering}, volume = {373}, pages = {521--527}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-981-10-0281-6\_75}, doi = {10.1007/978-981-10-0281-6\_75}, timestamp = {Fri, 08 Mar 2019 11:06:31 +0100}, biburl = {https://dblp.org/rec/conf/csa2/AhnC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Toorani15, author = {Mohsen Toorani}, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6 Standard}, booktitle = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, pages = {245--260}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9\_18}, doi = {10.1007/978-3-662-48051-9\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Toorani15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/GranadilloGDPM15, author = {Gustavo {Gonzalez Granadillo} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar and Christophe Ponchel and Laura Rodriguez Martin}, editor = {Mohamad Badra and Azzedine Boukerche and Pascal Urien}, title = {Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)}, booktitle = {7th International Conference on New Technologies, Mobility and Security, {NTMS} 2015, Paris, France, July 27-29, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NTMS.2015.7266480}, doi = {10.1109/NTMS.2015.7266480}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/GranadilloGDPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2015, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7}, doi = {10.1007/978-3-662-47854-7}, isbn = {978-3-662-47853-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2015w, editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff}, title = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8976}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48051-9}, doi = {10.1007/978-3-662-48051-9}, isbn = {978-3-662-48050-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2015w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Erturk15, author = {Emre Erturk}, title = {Two Trends in Mobile Security: Financial Motives and Transitioning from Static to Dynamic Analysis}, journal = {CoRR}, volume = {abs/1504.06893}, year = {2015}, url = {http://arxiv.org/abs/1504.06893}, eprinttype = {arXiv}, eprint = {1504.06893}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Erturk15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/LiuZA14, author = {Charles Zhechao Liu and Humayun Zafar and Yoris A. Au}, title = {Rethinking {FS-ISAC:} An {IT} Security Information Sharing Network Model for the Financial Services Sector}, journal = {Commun. Assoc. Inf. Syst.}, volume = {34}, pages = {2}, year = {2014}, url = {https://doi.org/10.17705/1cais.03402}, doi = {10.17705/1CAIS.03402}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cais/LiuZA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijebm/Ifinedo14, author = {Princely Ifinedo}, title = {The effects of national culture on the assessment of information security threats and controls in financial services industry}, journal = {Int. J. Electron. Bus. Manag.}, volume = {12}, number = {2}, year = {2014}, url = {http://ijebm-ojs.ie.nthu.edu.tw/IJEBM\_OJS/index.php/IJEBM/article/view/627}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijebm/Ifinedo14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DmitrienkoLRS14, author = {Alexandra Dmitrienko and Christopher Liebchen and Christian Rossow and Ahmad{-}Reza Sadeghi}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {On the (In)Security of Mobile Two-Factor Authentication}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {365--383}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_24}, doi = {10.1007/978-3-662-45472-5\_24}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/DmitrienkoLRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Garman0MR14, author = {Christina Garman and Matthew Green and Ian Miers and Aviel D. Rubin}, editor = {Rainer B{\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith}, title = {Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity}, booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {140--155}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44774-1\_10}, doi = {10.1007/978-3-662-44774-1\_10}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/Garman0MR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MigicovskyDRH14, author = {Alex Migicovsky and Zakir Durumeric and Jeff Ringenberg and J. Alex Halderman}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Outsmarting Proctors with Smartwatches: {A} Case Study on Wearable Computing Security}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {89--96}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_7}, doi = {10.1007/978-3-662-45472-5\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MigicovskyDRH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MurdochA14, author = {Steven J. Murdoch and Ross J. Anderson}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Security Protocols and Evidence: Where Many Payment Systems Fail}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {21--32}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_2}, doi = {10.1007/978-3-662-45472-5\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MurdochA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Pape14, author = {Sebastian Pape}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Sample or Random Security - {A} Security Model for Segment-Based Visual Cryptography}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {291--303}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_19}, doi = {10.1007/978-3-662-45472-5\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/Pape14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipro/CapkoAT14, author = {Zvonko Capko and Sasa Aksentijevic and Edvard Tijan}, title = {Economic and financial analysis of investments in information security}, booktitle = {37th International Convention on Information and Communication Technology, Electronics and Microelectronics, {MIPRO} 2014, Opatija, Croatia, May 26-30, 2014}, pages = {1550--1556}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/MIPRO.2014.6859812}, doi = {10.1109/MIPRO.2014.6859812}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/mipro/CapkoAT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MartinKA14, author = {Clemens Martin and Amina Kadry and Ghada Abu{-}Shady}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Quantifying the financial impact of it security breaches on business processes}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {149--155}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890934}, doi = {10.1109/PST.2014.6890934}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/MartinKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2014, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5}, doi = {10.1007/978-3-662-45472-5}, isbn = {978-3-662-45471-8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2014w, editor = {Rainer B{\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8438}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44774-1}, doi = {10.1007/978-3-662-44774-1}, isbn = {978-3-662-44773-4}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2014w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Alhayani13, author = {Abdullah Alhayani}, title = {Implementation, management and dissemination of information security : an organisational perspective of financial institution}, school = {Brunel University London, {UK}}, year = {2013}, url = {http://bura.brunel.ac.uk/handle/2438/7668}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Alhayani13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cit/Ifinedo13, author = {Princely Ifinedo}, title = {Relationships Between Relevant Contextual Influences and Information Security Threats and Controls in Global Financial Services Industry}, journal = {J. Comput. Inf. Technol.}, volume = {21}, number = {4}, pages = {235--246}, year = {2013}, url = {https://doi.org/10.2498/cit.1002237}, doi = {10.2498/CIT.1002237}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cit/Ifinedo13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/FloresAS13, author = {Denys A. Flores and Olga Angelopoulou and Richard J. Self}, title = {An Anti-Money Laundering Methodology: Financial Regulations, Information Security and Digital Forensics Working Together}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {1/2}, pages = {101--114}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.02.31.101}, doi = {10.22667/JISIS.2013.02.31.101}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/FloresAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/ChangKL13, author = {Hangbae Chang and Jungduk Kim and Hosin David Lee}, title = {Financial {IT} and Security}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {1--2}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2013.04.003}, doi = {10.1016/J.MCM.2013.04.003}, timestamp = {Sun, 10 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mcm/ChangKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LeeLL13, author = {Jung{-}Hyun Lee and Won Gue Lim and Jong In Lim}, title = {A study of the security of Internet banking and financial private information in South Korea}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {117--131}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.07.019}, doi = {10.1016/J.MCM.2012.07.019}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LeeLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LampeWMS13, author = {Ulrich Lampe and Olga Wenge and Alexander M{\"{u}}ller and Ralf Schaarschmidt}, title = {On the Relevance of Security Risks for Cloud Adoption in the Financial Industry}, booktitle = {19th Americas Conference on Information Systems, {AMCIS} 2013, Chicago, Illinois, USA, August 15-17, 2013}, publisher = {Association for Information Systems}, year = {2013}, url = {http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/15}, timestamp = {Wed, 02 Jul 2014 19:53:07 +0200}, biburl = {https://dblp.org/rec/conf/amcis/LampeWMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/PanjaFMRM13, author = {Biswajit Panja and Dennis Fattaleh and Mark Mercado and Adam Robinson and Priyanka Meharia}, editor = {Geoffrey Charles Fox and Waleed W. Smari}, title = {Cybersecurity in banking and financial sector: Security analysis of a mobile banking application}, booktitle = {2013 International Conference on Collaboration Technologies and Systems, {CTS} 2013, San Diego, CA, USA, May 20-24, 2013}, pages = {397--403}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CTS.2013.6567261}, doi = {10.1109/CTS.2013.6567261}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cts/PanjaFMRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ArianezhadSM13, author = {Majid Arianezhad and Douglas Stebila and Behzad Mozaffari}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Usability and Security of Gaze-Based Graphical Grid Passwords}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {17--33}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_2}, doi = {10.1007/978-3-642-41320-9\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ArianezhadSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Cappos13, author = {Justin Cappos}, editor = {Ahmad{-}Reza Sadeghi}, title = {Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {386--394}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_33}, doi = {10.1007/978-3-642-39884-1\_33}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Cappos13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChuangNWJ13, author = {John C.{-}I. Chuang and Hamilton Nguyen and Charles Wang and Benjamin Johnson}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {I Think, Therefore {I} Am: Usability and Security of Authentication Using Brainwaves}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_1}, doi = {10.1007/978-3-642-41320-9\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChuangNWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/EgelmanS13, author = {Serge Egelman and Stuart E. Schechter}, editor = {Ahmad{-}Reza Sadeghi}, title = {The Importance of Being Earnest [In Security Warnings]}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {52--59}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_5}, doi = {10.1007/978-3-642-39884-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/EgelmanS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FahlHOMS13, author = {Sascha Fahl and Marian Harbach and Marten Oltrogge and Thomas Muders and Matthew Smith}, editor = {Ahmad{-}Reza Sadeghi}, title = {Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {144--161}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_12}, doi = {10.1007/978-3-642-39884-1\_12}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/FahlHOMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GallegoSV13, author = {Alexander Gallego and Nitesh Saxena and Jonathan Voris}, editor = {Ahmad{-}Reza Sadeghi}, title = {Exploring Extrinsic Motivation for Better Security: {A} Usability Study of Scoring-Enhanced Device Pairing}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {60--68}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_6}, doi = {10.1007/978-3-642-39884-1\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GallegoSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KeHY13, author = {Ping Fan Ke and Kai Lung Hui and Wei T. Yue}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Information Security as a Credence Good}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {83--93}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_6}, doi = {10.1007/978-3-642-41320-9\_6}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KeHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {34--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_3}, doi = {10.1007/978-3-642-41320-9\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KelleyKMSVBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KirlapposBS13, author = {Iacovos Kirlappos and Adam Beautement and Martina Angela Sasse}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {70--82}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_5}, doi = {10.1007/978-3-642-41320-9\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KirlapposBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ZhouYSQ13, author = {Yuanyuan Zhou and Yu Yu and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Ahmad{-}Reza Sadeghi}, title = {On the Need of Physical Security for Small Embedded Devices: {A} Case Study with {COMP128-1} Implementations in {SIM} Cards}, booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, pages = {230--238}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1\_20}, doi = {10.1007/978-3-642-39884-1\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ZhouYSQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indin/RayAGBT13, author = {Apala Ray and Johan {\AA}kerberg and Mikael Gidlund and Mats Bj{\"{o}}rkman and Christophe Tremlet}, title = {Reusability assessment of financial card readers' security mechanisms in process control devices}, booktitle = {11th {IEEE} International Conference on Industrial Informatics, {INDIN} 2013, Bochum, Germany, July 29-31, 2013}, pages = {494--499}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INDIN.2013.6622934}, doi = {10.1109/INDIN.2013.6622934}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indin/RayAGBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/EsanNO13, author = {Omobayo A. Esan and S. M. Ngwira and Isaac Olusegun Osunmakinde}, editor = {Hein S. Venter and Marianne Loock and Marijke Coetzee}, title = {Bimodal biometrics for financial infrastructure security}, booktitle = {2013 Information Security for South Africa, Johannesburg, South Africa, August 14-16, 2013}, pages = {1--8}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSA.2013.6641045}, doi = {10.1109/ISSA.2013.6641045}, timestamp = {Fri, 14 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issa/EsanNO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/BalboniKM13, author = {Paolo Balboni and Udo Kroon and Milda Macenaite}, editor = {Helmut Reimer and Norbert Pohlmann and Wolfgang Schneider}, title = {Data Protection and Data Security by Design Applied to Financial Intelligence}, booktitle = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of the Information Security Solutions Europe 2013 Conference, Brussels, Belgium, October 22-23, 2013}, pages = {73--85}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-658-03371-2\_7}, doi = {10.1007/978-3-658-03371-2\_7}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/BalboniKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istas/MushoreK13, author = {Rutendo Mushore and Michael Kyobe}, title = {Investigating the factors influencing information security compliance in a financial services firm}, booktitle = {Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 {IEEE} International Symposium on Technology and Society, {ISTAS} 2013, Toronto, ON, Canada, 27-29 June, 2013}, pages = {155--173}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISTAS.2013.6613115}, doi = {10.1109/ISTAS.2013.6613115}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/istas/MushoreK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocc/XuWYWZ13, author = {Jiang{-}pei Xu and Liji Wu and Xiang{-}jun Yang and Yu{-}zhong Wang and Xiangmin Zhang}, title = {A security vulnerability of Java Card on array access in financial system}, booktitle = {22nd Wireless and Optical Communication Conference, {WOCC} 2013, Chongqing, China, May 16-18, 2013}, pages = {707--710}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WOCC.2013.6676466}, doi = {10.1109/WOCC.2013.6676466}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wocc/XuWYWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2013, editor = {Ahmad{-}Reza Sadeghi}, title = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7859}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39884-1}, doi = {10.1007/978-3-642-39884-1}, isbn = {978-3-642-39883-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2013w, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9}, doi = {10.1007/978-3-642-41320-9}, isbn = {978-3-642-41319-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2013w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/LeeRNFJ12, author = {Jong{-}Eun Roselyn Lee and Shailendra Rao and Clifford Nass and Karin Forssell and Jae Min John}, title = {When do online shoppers appreciate security enhancement efforts? Effects of financial risk and security level on evaluations of customer authentication}, journal = {Int. J. Hum. Comput. Stud.}, volume = {70}, number = {5}, pages = {364--376}, year = {2012}, url = {https://doi.org/10.1016/j.ijhcs.2011.12.002}, doi = {10.1016/J.IJHCS.2011.12.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/LeeRNFJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irmj/ZafarKO12, author = {Humayun Zafar and Myung Ko and Kweku{-}Muata Osei{-}Bryson}, title = {Financial Impact of Information Security Breaches on Breached Firms and their Non-Breached Competitors}, journal = {Inf. Resour. Manag. J.}, volume = {25}, number = {1}, pages = {21--37}, year = {2012}, url = {https://doi.org/10.4018/irmj.2012010102}, doi = {10.4018/IRMJ.2012010102}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/irmj/ZafarKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/LampeWMS12, author = {Ulrich Lampe and Olga Wenge and Alexander M{\"{u}}ller and Ralf Schaarschmidt}, title = {Cloud Computing in the Financial Industry - {A} Road Paved with Security Pitfalls?}, booktitle = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle, Washington, USA, August 9-11, 2012}, publisher = {Association for Information Systems}, year = {2012}, url = {http://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/4}, timestamp = {Thu, 21 Jun 2018 07:22:09 +0200}, biburl = {https://dblp.org/rec/conf/amcis/LampeWMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BenderDFK12, author = {Jens Bender and {\"{O}}zg{\"{u}}r Dagdelen and Marc Fischlin and Dennis K{\"{u}}gler}, editor = {Angelos D. Keromytis}, title = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents, and Its Security}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {344--358}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_25}, doi = {10.1007/978-3-642-32946-3\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BenderDFK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Bohme12, author = {Rainer B{\"{o}}hme}, editor = {Angelos D. Keromytis}, title = {Security Audits Revisited}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {129--147}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_11}, doi = {10.1007/978-3-642-32946-3\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Bohme12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BonneauPA12, author = {Joseph Bonneau and S{\"{o}}ren Preibusch and Ross J. Anderson}, editor = {Angelos D. Keromytis}, title = {A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {25--40}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_3}, doi = {10.1007/978-3-642-32946-3\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BonneauPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2011, editor = {George Danezis}, title = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27576-0}, doi = {10.1007/978-3-642-27576-0}, isbn = {978-3-642-27575-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2011w, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29889-9}, doi = {10.1007/978-3-642-29889-9}, isbn = {978-3-642-29888-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2011w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2012, editor = {Angelos D. Keromytis}, title = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3}, doi = {10.1007/978-3-642-32946-3}, isbn = {978-3-642-32945-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2012w, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5}, doi = {10.1007/978-3-642-34638-5}, isbn = {978-3-642-34637-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2012w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AycockBDD11, author = {John Aycock and Elizabeth Buchanan and Scott D. Dexter and David Dittrich}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {138--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_12}, doi = {10.1007/978-3-642-29889-9\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AycockBDD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChiaK11, author = {Pern Hui Chia and Svein Johan Knapskog}, editor = {George Danezis}, title = {Re-evaluating the Wisdom of Crowds in Assessing Web Security}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {299--314}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_25}, doi = {10.1007/978-3-642-27576-0\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChiaK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChristinEVG11, author = {Nicolas Christin and Serge Egelman and Timothy Vidas and Jens Grossklags}, editor = {George Danezis}, title = {It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {16--30}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_2}, doi = {10.1007/978-3-642-27576-0\_2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/ChristinEVG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JohnsonBK11, author = {Maritza L. Johnson and Steven M. Bellovin and Angelos D. Keromytis}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {131--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_11}, doi = {10.1007/978-3-642-29889-9\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JohnsonBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NovakSMH11, author = {Jay Novak and Jonathan Stribley and Kenneth Meagher and J. Alex Halderman}, editor = {George Danezis}, title = {Absolute Pwnage: {A} Short Paper about the Security Risks of Remote Administration Tools}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {77--84}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_6}, doi = {10.1007/978-3-642-27576-0\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/NovakSMH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/PlotzN11, author = {Henryk Pl{\"{o}}tz and Karsten Nohl}, editor = {George Danezis}, title = {Peeling Away Layers of an {RFID} Security System}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {205--219}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_17}, doi = {10.1007/978-3-642-27576-0\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/PlotzN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RobinsonH11, author = {David G. Robinson and J. Alex Halderman}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Ethical Issues in E-Voting Security Analysis}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {119--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_10}, doi = {10.1007/978-3-642-29889-9\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/RobinsonH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/BaekP11, author = {Jong{-}Il Baek and Dea{-}Woo Park}, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, title = {A Study of Disaster Preparedness Systems Operations Analysis and Financial Security Measures of Large Banking Network}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {206}, pages = {167--173}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24106-2\_22}, doi = {10.1007/978-3-642-24106-2\_22}, timestamp = {Thu, 28 Dec 2017 16:02:42 +0100}, biburl = {https://dblp.org/rec/conf/ichit/BaekP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BarthRSMSB10, author = {Adam Barth and Benjamin I. P. Rubinstein and Mukund Sundararajan and John C. Mitchell and Dawn Song and Peter L. Bartlett}, editor = {Radu Sion}, title = {A Learning-Based Approach to Reactive Security}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {192--206}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_16}, doi = {10.1007/978-3-642-14577-3\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BarthRSMSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Caballero-GilMCH10, author = {Pino Caballero{-}Gil and Jezabel Molina{-}Gil and C{\'{a}}ndido Caballero{-}Gil and Candelaria Hern{\'{a}}ndez{-}Goya}, editor = {Radu Sion}, title = {Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {427}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_41}, doi = {10.1007/978-3-642-14577-3\_41}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/Caballero-GilMCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Cranor10, author = {Lorrie Faith Cranor}, editor = {Radu Sion}, title = {Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {3}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_3}, doi = {10.1007/978-3-642-14577-3\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Cranor10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Cranor10a, author = {Lorrie Faith Cranor}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {247--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_23}, doi = {10.1007/978-3-642-14992-4\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Cranor10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Fleischmann10, author = {Kenneth R. Fleischmann}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {197--202}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_18}, doi = {10.1007/978-3-642-14992-4\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Fleischmann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GrossklagsJC10, author = {Jens Grossklags and Benjamin Johnson and Nicolas Christin}, editor = {Radu Sion}, title = {When Information Improves Information Security}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {416--423}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_37}, doi = {10.1007/978-3-642-14577-3\_37}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/GrossklagsJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Hubaux10, author = {Jean{-}Pierre Hubaux}, editor = {Radu Sion}, title = {Security Mechanisms with Selfish Players in Wireless Networks}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {2}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_2}, doi = {10.1007/978-3-642-14577-3\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Hubaux10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KenneallyBM10, author = {Erin Kenneally and Michael D. Bailey and Douglas Maughan}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {A Framework for Understanding and Applying Ethical Principles in Network and Security Research}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {240--246}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_22}, doi = {10.1007/978-3-642-14992-4\_22}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KenneallyBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MatsuoMOB10, author = {Shin'ichiro Matsuo and Kunihiko Miyazaki and Akira Otsuka and David A. Basin}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of {ISO/IEC} 29128 and {CRYPTREC}}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {182--194}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_16}, doi = {10.1007/978-3-642-14992-4\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MatsuoMOB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RuhrmairJHACS10, author = {Ulrich R{\"{u}}hrmair and Christian Jaeger and Christian Hilgers and Michael Algasinger and Gy{\"{o}}rgy Csaba and Martin Stutzmann}, editor = {Radu Sion}, title = {Security Applications of Diodes with Unique Current-Voltage Characteristics}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, pages = {328--335}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3\_26}, doi = {10.1007/978-3-642-14577-3\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/RuhrmairJHACS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Sassaman10, author = {Len Sassaman}, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Ethical Guidelines for Computer Security Researchers: "Be Reasonable"}, booktitle = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, pages = {250--255}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4\_24}, doi = {10.1007/978-3-642-14992-4\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Sassaman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/BaldoniLCDMM10, author = {Roberto Baldoni and Giorgia Lodi and Gregory V. Chockler and Eliezer Dekel and Barry P. Mulcahy and Giuseppe Martufi}, editor = {Joaquim Filipe and Jos{\'{e}} Cordeiro}, title = {A Contract-based Event Driven Model for Collaborative Security in Financial Information Systems}, booktitle = {{ICEIS} 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 4, SAIC, Funchal, Madeira, Portugal, June 8 - 12, 2010}, pages = {147--152}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 14 Mar 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceis/BaldoniLCDMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/Bollag10, author = {Josef Bollag}, editor = {Mark Last and Abraham Kandel}, title = {World Financial Crisis and its Influence on Terror Financing}, booktitle = {Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {27}, pages = {13--18}, publisher = {{IOS} Press}, year = {2010}, url = {https://doi.org/10.3233/978-1-60750-611-9-13}, doi = {10.3233/978-1-60750-611-9-13}, timestamp = {Tue, 16 May 2017 14:24:21 +0200}, biburl = {https://dblp.org/rec/series/natosec/Bollag10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2010, editor = {Radu Sion}, title = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3}, doi = {10.1007/978-3-642-14577-3}, isbn = {978-3-642-14576-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2010w, editor = {Radu Sion and Reza Curtmola and Sven Dietrich and Aggelos Kiayias and Josep M. Miret and Kazue Sako and Francesc Seb{\'{e}}}, title = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS, WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6054}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14992-4}, doi = {10.1007/978-3-642-14992-4}, isbn = {978-3-642-14991-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2010w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:reference/crc/2010fcs, editor = {Burton Rosenberg}, title = {Handbook of Financial Cryptography and Security}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823}, doi = {10.1201/9781420059823}, isbn = {978-1-4200-5981-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/2010fcs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Barni010, author = {Mauro Barni and Stefan Katzenbeisser}, editor = {Burton Rosenberg}, title = {Digital Watermarking}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {391--435}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c14}, doi = {10.1201/9781420059823-C14}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Barni010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Belenkiy10, author = {Mira Belenkiy}, editor = {Burton Rosenberg}, title = {E-Cash}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {3--48}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c1}, doi = {10.1201/9781420059823-C1}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Belenkiy10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Brandt10, author = {Felix Brandt}, editor = {Burton Rosenberg}, title = {Auctions}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {49--58}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c2}, doi = {10.1201/9781420059823-C2}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Brandt10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Coventry10, author = {Lynne M. Coventry}, editor = {Burton Rosenberg}, title = {Human Factors}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {497--519}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c17}, doi = {10.1201/9781420059823-C17}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Coventry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DanezisDS10, author = {George Danezis and Claudia D{\'{\i}}az and Paul F. Syverson}, editor = {Burton Rosenberg}, title = {Anonymous Communication}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {341--389}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c13}, doi = {10.1201/9781420059823-C13}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DanezisDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DashtiM10, author = {Mohammad Torabi Dashti and Sjouke Mauw}, editor = {Burton Rosenberg}, title = {Fair Exchange}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {109--132}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c5}, doi = {10.1201/9781420059823-C5}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DashtiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Ellison10, author = {Carl M. Ellison}, editor = {Burton Rosenberg}, title = {Public Key Infrastructure}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {455--493}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c16}, doi = {10.1201/9781420059823-C16}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Ellison10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Jackson10, author = {Margaret Jackson}, editor = {Burton Rosenberg}, title = {Legal Issues}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {521--554}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c18}, doi = {10.1201/9781420059823-C18}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Jackson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/JakobssonSS10, author = {Markus Jakobsson and Sid Stamm and Christopher Soghoian}, editor = {Burton Rosenberg}, title = {Phishing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {301--339}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c12}, doi = {10.1201/9781420059823-C12}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/JakobssonSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Kiayias10, author = {Aggelos Kiayias}, editor = {Burton Rosenberg}, title = {Electronic Voting}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {59--81}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c3}, doi = {10.1201/9781420059823-C3}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Kiayias10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Parhonyi10, author = {R{\'{o}}bert P{\'{a}}rhonyi}, editor = {Burton Rosenberg}, title = {Micropayment Systems}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {163--191}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c7}, doi = {10.1201/9781420059823-C7}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Parhonyi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Pehlivanoglu10, author = {Serdar Pehlivanoglu}, editor = {Burton Rosenberg}, title = {Broadcast and Content Distribution}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {133--159}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c6}, doi = {10.1201/9781420059823-C6}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Pehlivanoglu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/SadeghiW10, author = {Ahmad{-}Reza Sadeghi and Christian Wachsmann}, editor = {Burton Rosenberg}, title = {Trusted Computing}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {221--256}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c9}, doi = {10.1201/9781420059823-C9}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/SadeghiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Safavi-NainiS10, author = {Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard}, editor = {Burton Rosenberg}, title = {Digital Rights Management}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {193--220}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c8}, doi = {10.1201/9781420059823-C8}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Safavi-NainiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/SionW10, author = {Radu Sion and Marianne Winslett}, editor = {Burton Rosenberg}, title = {Regulatory Compliance}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {555--584}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c19}, doi = {10.1201/9781420059823-C19}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/SionW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Smith10, author = {Sean Smith}, editor = {Burton Rosenberg}, title = {Hardware Security Modules}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {257--278}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c10}, doi = {10.1201/9781420059823-C10}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Smith10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Szydlo10, author = {Michael Szydlo}, editor = {Burton Rosenberg}, title = {Portfolio Trading}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {279--297}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c11}, doi = {10.1201/9781420059823-C11}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Szydlo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Wilton10, author = {Robin Wilton}, editor = {Burton Rosenberg}, title = {Identity Management}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {437--453}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c15}, doi = {10.1201/9781420059823-C15}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/Wilton10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/Zhou10, author = {Jianying Zhou}, editor = {Burton Rosenberg}, title = {Non-Repudiation}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {83--108}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c4}, doi = {10.1201/9781420059823-C4}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/crc/Zhou10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/Ifinedo09, author = {Princely Ifinedo}, title = {Information Technology Security Concerns in Global Financial Services Institutions: Do Socio-Economic Factors Differentiate Perceptions?}, journal = {Int. J. Inf. Secur. Priv.}, volume = {3}, number = {2}, pages = {68--83}, year = {2009}, url = {https://doi.org/10.4018/jisp.2009040105}, doi = {10.4018/JISP.2009040105}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/Ifinedo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Ifinedo09, author = {Princely Ifinedo}, title = {Information technology security management concerns in global financial services institutions: Is national culture a differentiator?}, journal = {Inf. Manag. Comput. Secur.}, volume = {17}, number = {5}, pages = {372--387}, year = {2009}, url = {https://doi.org/10.1108/09685220911006678}, doi = {10.1108/09685220911006678}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Ifinedo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/riga/KryukovS09, author = {Dmitry Kryukov and Raimonds Strauss}, title = {Information security governance as key performance indicator for financial institutions}, journal = {Sci. J. Riga Tech. Univ. Ser. Comput. Sci.}, volume = {38}, pages = {161--167}, year = {2009}, url = {https://doi.org/10.2478/v10143-009-0014-x}, doi = {10.2478/V10143-009-0014-X}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/riga/KryukovS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/ZafarA09, author = {Humayun Zafar and Yoris A. Au}, editor = {Robert C. Nickerson and Ramesh Sharda}, title = {The Economic Ramifications of Strategic {IT} Security Information Sharing in the Financial Services Industry}, booktitle = {Proceedings of the 15th Americas Conference on Information Systems, {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009}, pages = {281}, publisher = {Association for Information Systems}, year = {2009}, url = {http://aisel.aisnet.org/amcis2009/281}, timestamp = {Mon, 02 Jan 2012 19:01:22 +0100}, biburl = {https://dblp.org/rec/conf/amcis/ZafarA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FultzG09, author = {Neal Fultz and Jens Grossklags}, editor = {Roger Dingledine and Philippe Golle}, title = {Blue versus Red: Towards a Model of Distributed Security Attacks}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {167--183}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_10}, doi = {10.1007/978-3-642-03549-4\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FultzG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/IoannidisPW09, author = {Christos Ioannidis and David J. Pym and Julian Williams}, editor = {Roger Dingledine and Philippe Golle}, title = {Investments and Trade-offs in the Economics of Information Security}, booktitle = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, pages = {148--166}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4\_9}, doi = {10.1007/978-3-642-03549-4\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/IoannidisPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/SaghafiNE09, author = {Fatemeh Saghafi and Fatemeh NasserEslami and Maryam Esmaili}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {Ranking secure technologies in security provision financial transactions mobile commerce}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {331--336}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1655986}, doi = {10.1145/1655925.1655986}, timestamp = {Sun, 28 Feb 2021 18:18:34 +0100}, biburl = {https://dblp.org/rec/conf/interaction/SaghafiNE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2009, editor = {Roger Dingledine and Philippe Golle}, title = {Financial Cryptography and Data Security, 13th International Conference, {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5628}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03549-4}, doi = {10.1007/978-3-642-03549-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SingletonS08, author = {Tommie W. Singleton and Aaron J. Singleton}, title = {The Potential for a Synergistic Relationship Between Information Security and a Financial Audit}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {17}, number = {2}, pages = {80--86}, year = {2008}, url = {https://doi.org/10.1080/19393550801983783}, doi = {10.1080/19393550801983783}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/SingletonS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kybernetes/HuangWZ08, author = {Xiangzhao Huang and Hu Wan and Hongtao Zhou}, title = {The synergetic model of the controlling tactics to network financial information security}, journal = {Kybernetes}, volume = {37}, number = {9/10}, pages = {1393--1400}, year = {2008}, url = {https://doi.org/10.1108/03684920810907698}, doi = {10.1108/03684920810907698}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kybernetes/HuangWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HuangD08, author = {Ken Huang and Paul Douthit}, editor = {Gene Tsudik}, title = {ST{\&}E Is the Most Cost Effective Measure for Comply with Payment Card Industry {(PCI)} Data Security Standard}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {321--322}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_32}, doi = {10.1007/978-3-540-85230-8\_32}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HuangD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/FibikovaM08, author = {Lenka Fib{\'{\i}}kov{\'{a}} and Roland M{\"{u}}ller}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {The Information Security Framework for Daimler Financial Services and its Implementation}, booktitle = {{ISSE} 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain}, pages = {3--19}, publisher = {Vieweg+Teubner}, year = {2008}, url = {https://doi.org/10.1007/978-3-8348-9283-6\_1}, doi = {10.1007/978-3-8348-9283-6\_1}, timestamp = {Wed, 24 Apr 2019 16:36:13 +0200}, biburl = {https://dblp.org/rec/conf/isse/FibikovaM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Ifinedo08, author = {Princely Ifinedo}, editor = {Larry Korba and Stephen Marsh and Reihaneh Safavi{-}Naini}, title = {{IT} Security and Privacy Issues in Global Financial Services Institutions: Do Socio-Economic and Cultural Factors Matter?}, booktitle = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada}, pages = {75--84}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PST.2008.24}, doi = {10.1109/PST.2008.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/Ifinedo08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wkdd/XiaBP08, author = {Bin Xia and Hui Bai and Bin Pan}, title = {Research of Information Technology Security in the Financial Industry}, booktitle = {Proceedings of the International Workshop on Knowledge Discovery and Data Mining, {WKDD} 2008, Adelaide, Australia, 23-24 January 2008}, pages = {477--480}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WKDD.2008.55}, doi = {10.1109/WKDD.2008.55}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wkdd/XiaBP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2007, editor = {Sven Dietrich and Rachna Dhamija}, title = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77366-5}, doi = {10.1007/978-3-540-77366-5}, isbn = {978-3-540-77365-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2008, editor = {Gene Tsudik}, title = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8}, doi = {10.1007/978-3-540-85230-8}, isbn = {978-3-540-85229-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AsgharpourLC07, author = {Farzaneh Asgharpour and Debin Liu and L. Jean Camp}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Mental Models of Security Risks}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {367--377}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_34}, doi = {10.1007/978-3-540-77366-5\_34}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AsgharpourLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Desmedt07, author = {Yvo Desmedt}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Position Statement in {RFID} S{\&}P Panel: From Relative Security to Perceived Secure}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {53--56}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_8}, doi = {10.1007/978-3-540-77366-5\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Desmedt07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Fu07, author = {Kevin Fu}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Panel: {RFID} Security and Privacy}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {45}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_5}, doi = {10.1007/978-3-540-77366-5\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Fu07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Jutla07, author = {Dawn N. Jutla}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Usable {SPACE:} Security, Privacy, and Context for the Mobile User}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {245}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_22}, doi = {10.1007/978-3-540-77366-5\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Jutla07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KuoWP07, author = {Cynthia Kuo and Jesse Walker and Adrian Perrig}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {325--340}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_30}, doi = {10.1007/978-3-540-77366-5\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KuoWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MitchellK07, author = {April Slayden Mitchell and Alan H. Karp}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Improving Usability by Adding Security to Video Conferencing Systems}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {378--382}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_35}, doi = {10.1007/978-3-540-77366-5\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MitchellK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/PagterP07, author = {Jakob Illeborg Pagter and Marianne Graves Petersen}, editor = {Sven Dietrich and Rachna Dhamija}, title = {A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed?}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {383--388}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_36}, doi = {10.1007/978-3-540-77366-5\_36}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/PagterP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/ChangHYH06, author = {I{-}Chiu Chang and Hsin{-}Ginn Hwang and David C. Yen and Hen{-}Yi Huang}, title = {An empirical study of the factors affecting Internet security for the financial industry in Taiwan}, journal = {Telematics Informatics}, volume = {23}, number = {4}, pages = {343--364}, year = {2006}, url = {https://doi.org/10.1016/j.tele.2005.11.001}, doi = {10.1016/J.TELE.2005.11.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tele/ChangHYH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2006, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663}, doi = {10.1007/11889663}, isbn = {3-540-46255-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/KeshR05, author = {Someswar Kesh and M. K. Raja}, title = {Development of a qualitative reasoning model for financial forecasting}, journal = {Inf. Manag. Comput. Security}, volume = {13}, number = {2}, pages = {167--179}, year = {2005}, url = {https://doi.org/10.1108/09685220510582638}, doi = {10.1108/09685220510582638}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/KeshR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/Locher05, author = {Christian Locher}, editor = {Dieter Bartmann and Federico Rajola and Jannis Kallinikos and David E. Avison and Robert Winter and Phillip Ein{-}Dor and J{\"{o}}rg Becker and Freimut Bodendorf and Christof Weinhardt}, title = {Methodologies for Evaluating Information Security Investments - What Basel {II} Can Change in the Financial Industry}, booktitle = {Proceedings of the 13th European Conference on Information Systems, Information Systems in a Rapidly Changing Economy, {ECIS} 2005, Regensburg, Germany, May 26-28, 2005}, pages = {1561--1572}, year = {2005}, url = {http://aisel.aisnet.org/ecis2005/122}, timestamp = {Wed, 24 Jul 2019 16:44:04 +0200}, biburl = {https://dblp.org/rec/conf/ecis/Locher05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Friedman05, author = {Allan Friedman}, editor = {Andrew S. Patrick and Moti Yung}, title = {Panel Summary: Incentives, Markets and Information Security}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {372--373}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_33}, doi = {10.1007/11507840\_33}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Friedman05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TuylsSSAO05, author = {Pim Tuyls and Boris Skoric and S. Stallinga and Anton H. M. Akkermans and W. Ophey}, editor = {Andrew S. Patrick and Moti Yung}, title = {Information-Theoretic Security Analysis of Physical Uncloneable Functions}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {141--155}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_15}, doi = {10.1007/11507840\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/TuylsSSAO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Ghernaouti-Helie05, author = {Solange Ghernaouti{-}Helie and Mohamed Ali Sfaxi}, editor = {Joaquim Filipe and Helder Coelhas and M{\'{o}}nica Saramago}, title = {Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment}, booktitle = {E-business and Telecommunication Networks - Second International Conference, {ICETE} 2005, Reading, UK, October 3-7, 2005. Selected Papers}, series = {Communications in Computer and Information Science}, volume = {3}, pages = {139--149}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-75993-5\_12}, doi = {10.1007/978-3-540-75993-5\_12}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/Ghernaouti-Helie05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Ghernaouti-HelieS05, author = {Solange Ghernaouti{-}Helie and Mohamed Ali Sfaxi}, editor = {Joaquim Filipe and Luminita Vasiu}, title = {Guaranteerring security of financial transaction by using quantum cryptography in banking environment}, booktitle = {{ICETE} 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005}, pages = {268--274}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Tue, 07 Nov 2006 14:13:57 +0100}, biburl = {https://dblp.org/rec/conf/icete/Ghernaouti-HelieS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issa/Baloyi05, author = {Norman Tinyiko Baloyi}, editor = {Jan H. P. Eloff and Les Labuschagne and Mariki M. Eloff and Hein S. Venter}, title = {Analysis of the financial institutions' strategic e-business security solutions: Technical and non-Technical}, booktitle = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29 June - 1 July 2005, Balalaika Hotel, Sandton, South Africa}, pages = {1--12}, publisher = {ISSA, Pretoria, South Africa}, year = {2005}, url = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/080\_Article.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issa/Baloyi05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/05/PietruszkiewiczR05, author = {Wieslaw Pietruszkiewicz and Leonard Rozenberg}, editor = {Khalid Saeed and Jerzy Pejas}, title = {Financial Distress Prediction Using Different Pattern Recognition Methods}, booktitle = {Information Processing and Security Systems}, pages = {103--111}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-26325-X\_11}, doi = {10.1007/0-387-26325-X\_11}, timestamp = {Sun, 02 Jun 2019 20:42:31 +0200}, biburl = {https://dblp.org/rec/books/sp/05/PietruszkiewiczR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2005, editor = {Andrew S. Patrick and Moti Yung}, title = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137875}, doi = {10.1007/B137875}, isbn = {3-540-26656-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMicec/AgrawalPPRU04, author = {Manish Agrawal and Hemant Padmanabhan and Lokesh Pandey and H. Raghav Rao and Shambhu J. Upadhyaya}, editor = {Marijn Janssen and Henk G. Sol and Ren{\'{e}} W. Wagenaar}, title = {A conceptual approach to information security in financial account aggregation}, booktitle = {Proceedings of the 6th International Conference on Electronic Commerce, {ICEC} 2004, Delft, The Netherlands, October 25-27, 2004}, series = {{ACM} International Conference Proceeding Series}, volume = {60}, pages = {619--626}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1052220.1052299}, doi = {10.1145/1052220.1052299}, timestamp = {Fri, 08 Sep 2023 14:37:35 +0200}, biburl = {https://dblp.org/rec/conf/ACMicec/AgrawalPPRU04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Camp04, author = {L. Jean Camp}, editor = {Ari Juels}, title = {Mental Models of Computer Security}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {106--111}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_12}, doi = {10.1007/978-3-540-27809-2\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Camp04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Patrick04, author = {Andrew S. Patrick}, editor = {Ari Juels}, title = {Usability and Acceptability of Biometric Security Systems}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {105}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_11}, doi = {10.1007/978-3-540-27809-2\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Patrick04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Pugh04, author = {Simon Pugh}, editor = {Ari Juels}, title = {PayPass Security and Risk (Abstract)}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {70--71}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_8}, doi = {10.1007/978-3-540-27809-2\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Pugh04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Yurick04, author = {William Yurcik}, editor = {Ari Juels}, title = {Visualization Tools for Security Administrators}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {112--113}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_13}, doi = {10.1007/978-3-540-27809-2\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Yurick04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijstm/Shoniregun03, author = {Charles A. Shoniregun}, title = {Are existing internet security measures guaranteed to protect user identity in the financial services industry?}, journal = {Int. J. Serv. Technol. Manag.}, volume = {4}, number = {2}, pages = {194--216}, year = {2003}, url = {https://doi.org/10.1504/IJSTM.2003.002579}, doi = {10.1504/IJSTM.2003.002579}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijstm/Shoniregun03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/GargCH03, author = {Ashish Garg and Jeffrey Curtis and Hilary Halper}, title = {Quantifying the financial impact of {IT} security breaches}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {2}, pages = {74--83}, year = {2003}, url = {https://doi.org/10.1108/09685220310468646}, doi = {10.1108/09685220310468646}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/GargCH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GargCH03, author = {Ashish Garg and Jeffrey Curtis and Hilary Halper}, title = {The Financial Impact of {IT} Security Breaches: What Do Investors Think?}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {12}, number = {1}, pages = {22--33}, year = {2003}, url = {https://doi.org/10.1201/1086/43325.12.1.20030301/41478.5}, doi = {10.1201/1086/43325.12.1.20030301/41478.5}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GargCH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Odlyzko03a, author = {Andrew M. Odlyzko}, editor = {Rebecca N. Wright}, title = {Economics, Psychology, and Sociology of Security}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {182--189}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_13}, doi = {10.1007/978-3-540-45126-6\_13}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/Odlyzko03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SchechterS03, author = {Stuart E. Schechter and Michael D. Smith}, editor = {Rebecca N. Wright}, title = {How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {122--137}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_9}, doi = {10.1007/978-3-540-45126-6\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/SchechterS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/Mayhew02, author = {Stewart Mayhew}, editor = {Jane L. Snowdon and John M. Charnes}, title = {Problems in financial engineering: security price dynamics and simulation in financial engineering}, booktitle = {Proceedings of the 34th Winter Simulation Conference: Exploring New Frontiers, San Diego, California, USA, December 8-11, 2002}, pages = {1568--1574}, publisher = {{WSC}}, year = {2002}, url = {https://doi.org/10.1109/WSC.2002.1166434}, doi = {10.1109/WSC.2002.1166434}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsc/Mayhew02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BellareNPS01, author = {Mihir Bellare and Chanathip Namprempre and David Pointcheval and Michael Semanko}, editor = {Paul F. Syverson}, title = {The Power of {RSA} Inversion Oracles and the Security of Chaum's RSA-Based Blind Signature Scheme}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {309--328}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_25}, doi = {10.1007/3-540-46088-8\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BellareNPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JaulmesP01, author = {{\'{E}}liane Jaulmes and Guillaume Poupard}, editor = {Paul F. Syverson}, title = {On the Security of Homage Group Authentication Protocol}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {97--107}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_11}, doi = {10.1007/3-540-46088-8\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JaulmesP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Kravitz01, author = {David W. Kravitz}, editor = {Paul F. Syverson}, title = {Aspects of Digital Rights Management and the Use of Hardware Security Devices}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {45--49}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_5}, doi = {10.1007/3-540-46088-8\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Kravitz01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Tsiounis01, author = {Yiannis Tsiounis}, editor = {Paul F. Syverson}, title = {A Security Framework for Card-Based Systems}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {201--222}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_19}, doi = {10.1007/3-540-46088-8\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Tsiounis01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Jolish00, author = {Barak D. Jolish}, editor = {Yair Frankel}, title = {The Encryption Debate in Plaintext: National Security and Encryption in the United States and Israel}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {202--224}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_15}, doi = {10.1007/3-540-45472-1\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Jolish00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Zane00, author = {Francis Zane}, editor = {Yair Frankel}, title = {Efficient Watermark Detection and Collusion Security}, booktitle = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1962}, pages = {21--32}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45472-1\_2}, doi = {10.1007/3-540-45472-1\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Zane00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/GuptaCMV00, author = {Mukul Gupta and Alok R. Chaturvedi and Shailendra Raj Mehta and Lorenzo Valeri}, editor = {Soon Ang and Helmut Krcmar and Wanda J. Orlikowski and Peter Weill and Janice I. DeGross}, title = {The experimental analysis of information security management issues for online financial services}, booktitle = {Proceedings of the Twenty-First International Conference on Information Systems, {ICIS} 2000, Brisbane, Australia, December 10-13, 2000}, pages = {667--675}, publisher = {Association for Information Systems}, year = {2000}, url = {http://aisel.aisnet.org/icis2000/73}, timestamp = {Wed, 28 Nov 2018 12:57:14 +0100}, biburl = {https://dblp.org/rec/conf/icis/GuptaCMV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-1/Stanley99, author = {Terry Stanley}, editor = {Jan H. P. Eloff and Les Labuschagne and Rossouw von Solms and Jan Verschuren}, title = {Designing a Secure System for Implementing Chip Cards in the Financial Services Industry}, booktitle = {Information Security Management {\&} Small Systems Security, {IFIP} {TC11} {WG11.1/WG11.2} Seventh Annual Working Conference on Information Security Management {\&} Small Systems Security, September 30 - October 1, 1999, Amsterdam, The Netherlands}, series = {{IFIP} Conference Proceedings}, volume = {154}, pages = {213--220}, publisher = {Kluwer}, year = {1999}, timestamp = {Mon, 14 Oct 2002 13:57:28 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-1/Stanley99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MathesonMSTZ98, author = {Lesley R. Matheson and Stephen G. Mitchell and Talal Shamoon and Robert Endre Tarjan and Francis Zane}, editor = {Rafael Hirschfeld}, title = {Robustness and Security of Digital Watermarks}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {227--240}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055486}, doi = {10.1007/BFB0055486}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/MathesonMSTZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FranklinM97, author = {Matthew K. Franklin and Dahlia Malkhi}, editor = {Rafael Hirschfeld}, title = {Auditable Metering with Lightweight Security}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {151--160}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7\_75}, doi = {10.1007/3-540-63594-7\_75}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FranklinM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Goldstein97, author = {Theodore C. Goldstein}, editor = {Rafael Hirschfeld}, title = {The Gateway Security Model in the Java Electronic Commerce Framework}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {340--354}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7\_90}, doi = {10.1007/3-540-63594-7\_90}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Goldstein97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Lelieveldt97, author = {Simon L. Lelieveldt}, editor = {Rafael Hirschfeld}, title = {Evaluating the Security of Electronic Money}, booktitle = {Financial Cryptography, First International Conference, {FC} '97, Anguilla, British West Indies, February 24-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1318}, pages = {91--94}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63594-7\_69}, doi = {10.1007/3-540-63594-7\_69}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Lelieveldt97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/Geer94, author = {Daniel E. Geer Jr.}, title = {Breaking into Banks: Security Lessons Learned from Financial Services}, booktitle = {Proceedings of the 8th Conference on Systems Administration {(LISA} 1994), San Diego, California, USA, September 19-23, 1994}, publisher = {{USENIX}}, year = {1994}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lisa/Geer94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X93cl, title = {Controlling computer security: {A} guide for financial institutions: by James Essinger {(FT} Business Information Ltd, 1992 {ISBN} 1-85334-163-0)}, journal = {Comput. Law Secur. Rev.}, volume = {9}, number = {5}, pages = {226}, year = {1993}, url = {https://doi.org/10.1016/0267-3649(93)90021-E}, doi = {10.1016/0267-3649(93)90021-E}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X93cl.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/X92aq, title = {Information security in financial services: by Ken Slater, 1991 (Hardcover)(MacMillan - Stockton Press), 275 pp, {ISBN} 0-333-54702-0}, journal = {Comput. Law Secur. Rev.}, volume = {8}, number = {4}, pages = {165}, year = {1992}, url = {https://doi.org/10.1016/0267-3649(92)90032-5}, doi = {10.1016/0267-3649(92)90032-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/X92aq.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GaronO91, author = {Gilles Garon and Richard Outerbridge}, title = {Des Watch: an Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990's}, journal = {Cryptologia}, volume = {15}, number = {3}, pages = {177--193}, year = {1991}, url = {https://doi.org/10.1080/0161-119191865849}, doi = {10.1080/0161-119191865849}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GaronO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.