Search dblp for Publications

export results for "financial security"

 download as .bib file

@article{DBLP:journals/tcss/JiangWZNL24,
  author       = {Changjun Jiang and
                  Fei{-}Yue Wang and
                  Mengchu Zhou and
                  Asoke K. Nandi and
                  Guanjun Liu},
  title        = {Guest Editorial: Special Issue on Big Data and Computational Social
                  Intelligence for Guaranteed Financial Security},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1551--1555},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2024.3373929},
  doi          = {10.1109/TCSS.2024.3373929},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/JiangWZNL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ZhaoHLMW24,
  author       = {Qin Zhao and
                  Jingyi Huang and
                  Gang Liu and
                  Yaru Miao and
                  Pengwei Wang},
  title        = {A Multiinterest and Social Interest-Field Framework for Financial
                  Security},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1685--1695},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2023.3252611},
  doi          = {10.1109/TCSS.2023.3252611},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/ZhaoHLMW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2023-1,
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13950},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-47754-6},
  doi          = {10.1007/978-3-031-47754-6},
  isbn         = {978-3-031-47753-9},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2023-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2023-2,
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13951},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-47751-5},
  doi          = {10.1007/978-3-031-47751-5},
  isbn         = {978-3-031-47750-8},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2023-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2023w,
  editor       = {Aleksander Essex and
                  Shin'ichiro Matsuo and
                  Oksana Kulyk and
                  Lewis Gudgeon and
                  Ariah Klages{-}Mundt and
                  Daniel Perez and
                  Sam Werner and
                  Andrea Bracciali and
                  Geoff Goodell},
  title        = {Financial Cryptography and Data Security. {FC} 2023 International
                  Workshops - Voting, CoDecFin, DeFi, WTSC, Bol, Bra{\v{c}}, Croatia,
                  May 5, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13953},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-48806-1},
  doi          = {10.1007/978-3-031-48806-1},
  isbn         = {978-3-031-48805-4},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2023w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejcs/Wang23,
  author       = {Yanzhao Wang},
  title        = {Intelligent cluster construction of internet financial security protection
                  system in banking industry},
  journal      = {Open Comput. Sci.},
  volume       = {13},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1515/comp-2022-0268},
  doi          = {10.1515/COMP-2022-0268},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cejcs/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23,
  author       = {Julija Gavenaite{-}Sirvydiene and
                  Algita Miecinskiene},
  title        = {The Assessment of Cyber Security's Significance in the Financial Sector
                  of Lithuania},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {497--518},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1243},
  doi          = {10.13052/JCSM2245-1439.1243},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/GavenaiteSirvydieneM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/SaqibA23,
  author       = {Nazar Abbas Saqib and
                  Shahad Talla AL{-}Talla},
  title        = {Scaling Up Security and Efficiency in Financial Transactions and Blockchain
                  Systems},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {2},
  pages        = {31},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12020031},
  doi          = {10.3390/JSAN12020031},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/SaqibA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Yu23,
  author       = {Haiping Yu},
  title        = {Application of blockchain technology in the data processing security
                  system of financial enterprises},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.230},
  doi          = {10.1002/SPY2.230},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Yu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/DansoMGDS23,
  author       = {Juliana Mantebea Danso and
                  Yaw Marfo Missah and
                  Enoch Opanin Gyamfi and
                  Stephen Dankwa and
                  Kwabena Sarpong},
  title        = {Reseed Skipping of Linear Congruential Generator for Multi-level Image
                  Steganography Security of Financial Data},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {2},
  pages        = {124},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-022-01540-z},
  doi          = {10.1007/S42979-022-01540-Z},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sncs/DansoMGDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bde/Ji23,
  author       = {Wenjun Ji},
  title        = {Research and analysis of the security risk management strategy of
                  big data technology in the financial industry},
  booktitle    = {Proceedings of the 2023 5th International Conference on Big Data Engineering,
                  {BDE} 2023, Zhuhai, China, November 17-20, 2023},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3640872.3640883},
  doi          = {10.1145/3640872.3640883},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bde/Ji23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/RazaviJEAH23,
  author       = {Hooman Razavi and
                  Mohammad Reza Jamali and
                  Morvaridsadat Emsaki and
                  Ali Ahmadi and
                  Mostafa Hajiaghaei{-}Keshteli},
  title        = {Quantifying the Financial Impact of Cyber Security Attacks on Banks:
                  {A} Big Data Analytics Approach},
  booktitle    = {{IEEE} Canadian Conference on Electrical and Computer Engineering,
                  {CCECE} 2023, Regina, SK, Canada, September 24-27, 2023},
  pages        = {533--538},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CCECE58730.2023.10288963},
  doi          = {10.1109/CCECE58730.2023.10288963},
  timestamp    = {Thu, 09 Nov 2023 15:01:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ccece/RazaviJEAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpits/KavunLKLL23,
  author       = {Sergii Kavun and
                  Ruslana Levkina and
                  Yana Kotko and
                  Dmytro Levkin and
                  Artur Levkin},
  editor       = {Volodymyr Sokolov and
                  Tamara Radivilova and
                  Vasyl Ustimenko and
                  Mariya Nazarkevych},
  title        = {Information Security in Project Management for the Financial and Budgetary
                  Capacity of the National Economy (short paper)},
  booktitle    = {Proceedings of the Cybersecurity Providing in Information and Telecommunication
                  Systems {II} co-located with International Conference on Problems
                  of Infocommunications. Science and Technology {(PICST} 2023), Kyiv,
                  Ukraine, October 26, 2023 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3550},
  pages        = {246--254},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3550/short8.pdf},
  timestamp    = {Fri, 24 Nov 2023 12:33:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cpits/KavunLKLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurousec/MehrnezhadA23,
  author       = {Maryam Mehrnezhad and
                  Teresa Almeida},
  title        = {"My sex-related data is more sensitive than my financial data and
                  {I} want the same level of security and privacy": User Risk Perceptions
                  and Protective Actions in Female-oriented Technologies},
  booktitle    = {Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC
                  2023, Copenhagen, Denmark, October 16-17, 2023},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617072.3617100},
  doi          = {10.1145/3617072.3617100},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurousec/MehrnezhadA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsci/NurmaraHAJSKI23,
  author       = {Muhammad Azril Kurniawan Nurmara and
                  Muhammad Naufal Hakim and
                  Oey Hans Christian Ardy and
                  Reynaldo Jeffrey and
                  Vincentius Albert Setiono and
                  Bayu Kanigoro and
                  Edy Irwansyah},
  editor       = {Alexander Agung Santoso Gunawan},
  title        = {A Review of Security in Financial Technology},
  booktitle    = {Empowering Smart Technology in Digital Era for Industry and Socity:
                  The 8th International Conference on Computer Science and Computational
                  Intelligence, {ICCSCI} 2023, 02-03 August 2023, Malang, Indonesia},
  series       = {Procedia Computer Science},
  volume       = {227},
  pages        = {958--965},
  publisher    = {Elsevier},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.procs.2023.10.603},
  doi          = {10.1016/J.PROCS.2023.10.603},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsci/NurmaraHAJSKI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsie/YeWWWYT23,
  author       = {Xin Ye and
                  Shimin Wang and
                  Han Wang and
                  Qinwei Wei and
                  Ting Yang and
                  Yu Tao},
  title        = {Application of Knowledge Graph in Financial Information Security Strategy},
  booktitle    = {Proceedings of the 8th International Conference on Cyber Security
                  and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September
                  22-24, 2023},
  pages        = {188--192},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617184.3630130},
  doi          = {10.1145/3617184.3630130},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsie/YeWWWYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/BurkhanovTUINA23,
  author       = {Aktam Usmanovich Burkhanov and
                  Bobur Ortikmirzaevich Tursunov and
                  Khusniddin Fakhriddinovich Uktamov and
                  Jamshidxon Odilovich Imomov and
                  Jasur Tursunpulotovich Nosirov and
                  Barno Akbarova},
  title        = {Ways and Prospects of Rational Use of Production Capacity in Ensuring
                  Financial Security in Textile Enterprises In The Conditions of Digital
                  Economy Transformation},
  booktitle    = {Proceedings of the 7th International Conference on Future Networks
                  and Distributed Systems, {ICFNDS} 2023, Dubai, United Arab Emirates,
                  December 21-22, 2023},
  pages        = {234--242},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3644713.3644744},
  doi          = {10.1145/3644713.3644744},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfnds/BurkhanovTUINA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitjo/ShalabiAA23,
  author       = {Khawla Shalabi and
                  Mustafa Al{-}Fayoumi and
                  Qasem Abu Al{-}Haija},
  title        = {Enhancing Financial System Resilience Against Cyber Threats via {SWIFT}
                  Customer Security Framework},
  booktitle    = {International Conference on Information Technology, {ICIT} 2023, Amman,
                  Jordan, August 9-10, 2023},
  pages        = {260--265},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICIT58056.2023.10226165},
  doi          = {10.1109/ICIT58056.2023.10226165},
  timestamp    = {Wed, 06 Sep 2023 16:07:28 +0200},
  biburl       = {https://dblp.org/rec/conf/icitjo/ShalabiAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BelliniLBSBR23,
  author       = {Rosanna Bellini and
                  Kevin Lee and
                  Megan A. Brown and
                  Jeremy Shaffer and
                  Rasika Bhalerao and
                  Thomas Ristenpart},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {The Digital-Safety Risks of Financial Technologies for Survivors of
                  Intimate Partner Violence},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {87--104},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/bellini},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BelliniLBSBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangHMXMFTJ23,
  author       = {Wansen Wang and
                  Wenchao Huang and
                  Zhaoyi Meng and
                  Yan Xiong and
                  Fuyou Miao and
                  Xianjin Fang and
                  Caichang Tu and
                  Renjie Ji},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Automated Inference on Financial Security of Ethereum Smart Contracts},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3367--3383},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/wang-wansen},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WangHMXMFTJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2022w,
  editor       = {Shin'ichiro Matsuo and
                  Lewis Gudgeon and
                  Ariah Klages{-}Mundt and
                  Daniel Perez Hernandez and
                  Sam Werner and
                  Thomas Haines and
                  Aleksander Essex and
                  Andrea Bracciali and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security. {FC} 2022 International
                  Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13412},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-32415-4},
  doi          = {10.1007/978-3-031-32415-4},
  isbn         = {978-3-031-32414-7},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2022w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-05956,
  author       = {Maryam Mehrnezhad and
                  Teresa Almeida},
  title        = {"My sex-related data is more sensitive than my financial data and
                  {I} want the same level of security and privacy": User Risk Perceptions
                  and Protective Actions in Female-oriented Technologies},
  journal      = {CoRR},
  volume       = {abs/2306.05956},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.05956},
  doi          = {10.48550/ARXIV.2306.05956},
  eprinttype    = {arXiv},
  eprint       = {2306.05956},
  timestamp    = {Wed, 14 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-05956.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-18668,
  author       = {Prof N. Jeenath Laila and
                  Dr G. Tamilpavai},
  title        = {FinBTech: Blockchain-Based Video and Voice Authentication System for
                  Enhanced Security in Financial Transactions Utilizing FaceNet512 and
                  Gaussian Mixture Models},
  journal      = {CoRR},
  volume       = {abs/2310.18668},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.18668},
  doi          = {10.48550/ARXIV.2310.18668},
  eprinttype    = {arXiv},
  eprint       = {2310.18668},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-18668.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Maikowski22,
  author       = {Alfons Michael Maikowski},
  title        = {Why do financial institutions implement blockchain technology in security
                  settlement?: {A} conceptual framework for blockchain business cases},
  school       = {Technical University of Berlin, Germany},
  year         = {2022},
  url          = {https://nbn-resolving.org/urn:nbn:de:101:1-2022081002022118546923},
  urn          = {urn:nbn:de:101:1-2022081002022118546923},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Maikowski22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/SunWZ22,
  author       = {Qi Sun and
                  Hong Wu and
                  Binglong Zhao},
  title        = {Artificial intelligence technology in internet financial edge computing
                  and analysis of security risk},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {39},
  number       = {4},
  pages        = {201--210},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJAHUC.2022.121654},
  doi          = {10.1504/IJAHUC.2022.121654},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijahuc/SunWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/ZhouW22,
  author       = {Xiuying Zhou and
                  Huaqun Weng},
  title        = {Assessing information security performance of enterprise internal
                  financial sharing in cloud computing environment using analytic hierarchy
                  process},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {13},
  number       = {2/3},
  pages        = {256--271},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJGUC.2022.124398},
  doi          = {10.1504/IJGUC.2022.124398},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/ZhouW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfomandi/AmponsahAW22,
  author       = {Anokye Acheampong Amponsah and
                  Adebayo Felix Adekoya and
                  Benjamin Asubam Weyori},
  title        = {Improving the Financial Security of National Health Insurance using
                  Cloud-Based Blockchain Technology Application},
  journal      = {Int. J. Inf. Manag. Data Insights},
  volume       = {2},
  number       = {1},
  pages        = {100081},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jjimei.2022.100081},
  doi          = {10.1016/J.JJIMEI.2022.100081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfomandi/AmponsahAW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ShiZZDLL22,
  author       = {Hongfang Shi and
                  Wenying Zhang and
                  Zimin Zhang and
                  Dewen Ding and
                  Huimin Liu and
                  Hong Lei},
  title        = {Understanding digit-only financial account passwords: {ID} card, structure,
                  and security},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {11},
  pages        = {8635--8652},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22959},
  doi          = {10.1002/INT.22959},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/ShiZZDLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KwatengAT22,
  author       = {Kwame Owusu Kwateng and
                  Christopher Amanor and
                  Francis Kamewor Tetteh},
  title        = {Enterprise risk management and information technology security in
                  the financial sector},
  journal      = {Inf. Comput. Secur.},
  volume       = {30},
  number       = {3},
  pages        = {422--451},
  year         = {2022},
  url          = {https://doi.org/10.1108/ICS-11-2020-0185},
  doi          = {10.1108/ICS-11-2020-0185},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KwatengAT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jeim/TayaksiAKS22,
  author       = {Cansu Tayaksi and
                  Erhan Ada and
                  Yigit Kazan{\c{c}}oglu and
                  Muhittin Sagnak},
  title        = {The financial impacts of information systems security breaches on
                  publicly traded companies: reactions of different sectors},
  journal      = {J. Enterp. Inf. Manag.},
  volume       = {35},
  number       = {2},
  pages        = {650--668},
  year         = {2022},
  url          = {https://doi.org/10.1108/JEIM-11-2020-0450},
  doi          = {10.1108/JEIM-11-2020-0450},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jeim/TayaksiAKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/WuSWL22,
  author       = {Wenqing Wu and
                  Kun Shi and
                  Chia{-}Huei Wu and
                  Jiayue Liu},
  title        = {Research on the Impact of Information Security Certification and Concealment
                  on Financial Performance: Impact of {ISO} 27001 and Concealment on
                  Performance},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {30},
  number       = {3},
  pages        = {1--16},
  year         = {2022},
  url          = {https://doi.org/10.4018/jgim.20220701.oa2},
  doi          = {10.4018/JGIM.20220701.OA2},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jgim/WuSWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/QasaimehHYATL22,
  author       = {Malik Qasaimeh and
                  Rand Abu Hammour and
                  Muneer O. Bani Yassein and
                  Raad S. Al{-}Qassas and
                  Juan Alfonso Lara Torralbo and
                  David Lizcano},
  title        = {Advanced security testing using a cyber-attack forecasting model:
                  {A} case study of financial institutions},
  journal      = {J. Softw. Evol. Process.},
  volume       = {34},
  number       = {11},
  year         = {2022},
  url          = {https://doi.org/10.1002/smr.2489},
  doi          = {10.1002/SMR.2489},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smr/QasaimehHYATL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/systems/DengZDFL22,
  author       = {Shangkun Deng and
                  Yingke Zhu and
                  Shuangyang Duan and
                  Zhe Fu and
                  Zonghua Liu},
  title        = {Stock Price Crash Warning in the Chinese Security Market Using a Machine
                  Learning-Based Method and Financial Indicators},
  journal      = {Syst.},
  volume       = {10},
  number       = {4},
  pages        = {108},
  year         = {2022},
  url          = {https://doi.org/10.3390/systems10040108},
  doi          = {10.3390/SYSTEMS10040108},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/systems/DengZDFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/LiF22,
  author       = {Yueqi Li and
                  Ingrid Fisher},
  editor       = {Shusaku Tsumoto and
                  Yukio Ohsawa and
                  Lei Chen and
                  Dirk Van den Poel and
                  Xiaohua Hu and
                  Yoichi Motomura and
                  Takuya Takagi and
                  Lingfei Wu and
                  Ying Xie and
                  Akihiro Abe and
                  Vijay Raghavan},
  title        = {Digital Financial Literacy, Risk Aversion, and College Students' Online
                  Security Behavior},
  booktitle    = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,
                  Japan, December 17-20, 2022},
  pages        = {4807--4811},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigData55660.2022.10020556},
  doi          = {10.1109/BIGDATA55660.2022.10020556},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/LiF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bisec/MircevskiPAS22,
  author       = {Julijana Mircevski and
                  Nikola B. Popovic and
                  Mirjana Andric and
                  Branko Stanojev},
  editor       = {Nemanja Zdravkovic and
                  Dragan Domazet and
                  Sonsoles L{\'{o}}pez{-}Pernas and
                  Miguel {\'{A}}ngel Conde and
                  Ponnusamy Vijayakumar},
  title        = {Security of Financial Software to Support Cryptocurrency Trading},
  booktitle    = {Proceedings of the 13th International Conference on Business Information
                  Security (BISEC-2022), Belgrade, Serbia, December 02, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3529},
  pages        = {20--26},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3529/short\_3.pdf},
  timestamp    = {Tue, 19 Dec 2023 17:15:12 +0100},
  biburl       = {https://dblp.org/rec/conf/bisec/MircevskiPAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/Liu22e,
  author       = {Tian Liu},
  title        = {Research on Information Security of Enterprise Group Financial Sharing
                  in Cloud Computing Environment},
  booktitle    = {Proceedings of the 2022 6th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2022, Xiamen,
                  China, October 21-23, 2022},
  pages        = {1201--1207},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573428.3573642},
  doi          = {10.1145/3573428.3573642},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/Liu22e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TiwariAJDDRG22,
  author       = {Pratyush Ranjan Tiwari and
                  Dhruv Agarwal and
                  Prakhar Jain and
                  Swagam Dasgupta and
                  Preetha Datta and
                  Vineet Reddy and
                  Debayan Gupta},
  editor       = {Ittay Eyal and
                  Juan A. Garay},
  title        = {India's "Aadhaar" Biometric {ID:} Structure, Security, and Vulnerabilities},
  booktitle    = {Financial Cryptography and Data Security - 26th International Conference,
                  {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13411},
  pages        = {672--693},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18283-9\_34},
  doi          = {10.1007/978-3-031-18283-9\_34},
  timestamp    = {Tue, 25 Oct 2022 22:22:45 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TiwariAJDDRG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/CastellanoFP22,
  author       = {Nicola G. Castellano and
                  Carsten Felden and
                  Robert E. Pinsker},
  title        = {Shadow {IT} Behavior of Financial Executives in Germany and Italy
                  as an Antecedent to Internal Data Security Breaches},
  booktitle    = {55th Hawaii International Conference on System Sciences, {HICSS} 2022,
                  Virtual Event / Maui, Hawaii, USA, January 4-7, 2022},
  pages        = {1--11},
  publisher    = {ScholarSpace},
  year         = {2022},
  url          = {http://hdl.handle.net/10125/80105},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/CastellanoFP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/Tursunov22a,
  author       = {Bobir Tursunov},
  title        = {Financial Security in Small Business in period of Digital Economy:
                  in Case of Uzbekistan},
  booktitle    = {Proceedings of the 6th International Conference on Future Networks
                  {\&} Distributed Systems, {ICFNDS} 2022, Tashkent, Uzbekistan,
                  15 December 2022},
  pages        = {491--498},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584202.3584275},
  doi          = {10.1145/3584202.3584275},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfnds/Tursunov22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/ZarovaT22,
  author       = {Elena Zarova and
                  Bobir Tursunov},
  title        = {Methodology for Assessing the Financial Security of Enterprises in
                  the Post-Pandemic period of Digital Economy},
  booktitle    = {Proceedings of the 6th International Conference on Future Networks
                  {\&} Distributed Systems, {ICFNDS} 2022, Tashkent, Uzbekistan,
                  15 December 2022},
  pages        = {110--115},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3584202.3584219},
  doi          = {10.1145/3584202.3584219},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfnds/ZarovaT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/LiZX22,
  author       = {Jin Li and
                  Tong Zhang and
                  Shen Xu},
  editor       = {Ming{-}Hui Huang and
                  Guy Gable and
                  Christy M. K. Cheung and
                  Dongming Xu},
  title        = {The Impact of Financial Restatement on Reported Data Security Breach},
  booktitle    = {26th Pacific Asia Conference on Information Systems, {PACIS} 2022,
                  Virtual Event / Taipei, Taiwan / Sydney, Australia, July 5-9, 2022},
  pages        = {283},
  year         = {2022},
  url          = {https://aisel.aisnet.org/pacis2022/283},
  timestamp    = {Fri, 22 Jul 2022 11:46:17 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/LiZX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FaustHKS22,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Financially Backed Covert Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {99--129},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_4},
  doi          = {10.1007/978-3-030-97131-1\_4},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FaustHKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2022,
  editor       = {Ittay Eyal and
                  Juan A. Garay},
  title        = {Financial Cryptography and Data Security - 26th International Conference,
                  {FC} 2022, Grenada, May 2-6, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13411},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18283-9},
  doi          = {10.1007/978-3-031-18283-9},
  isbn         = {978-3-031-18282-2},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-12960,
  author       = {Wansen Wang and
                  Wenchao Huang and
                  Zhaoyi Meng and
                  Yan Xiong and
                  Fuyou Miao and
                  Xianjin Fang and
                  Caichang Tu and
                  Renjie Ji},
  title        = {An Automated Analyzer for Financial Security of Ethereum Smart Contracts},
  journal      = {CoRR},
  volume       = {abs/2208.12960},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.12960},
  doi          = {10.48550/ARXIV.2208.12960},
  eprinttype    = {arXiv},
  eprint       = {2208.12960},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-12960.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/GervaisV22,
  author       = {Arthur Gervais and
                  Marie Vasek},
  title        = {Security of Decentralized Financial Technologies (Dagstuhl Seminar
                  22421)},
  journal      = {Dagstuhl Reports},
  volume       = {12},
  number       = {10},
  pages        = {129--142},
  year         = {2022},
  url          = {https://doi.org/10.4230/DagRep.12.10.129},
  doi          = {10.4230/DAGREP.12.10.129},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/GervaisV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/GoelWHW21,
  author       = {Sanjay Goel and
                  Kevin J. Williams and
                  Jingyi Huang and
                  Merrill Warkentin},
  title        = {Can financial incentives help with the struggle for security policy
                  compliance?},
  journal      = {Inf. Manag.},
  volume       = {58},
  number       = {4},
  pages        = {103447},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.im.2021.103447},
  doi          = {10.1016/J.IM.2021.103447},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iam/GoelWHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MassacciN21,
  author       = {Fabio Massacci and
                  Chan Nam Ngo},
  title        = {Distributed Financial Exchanges: Security Challenges and Design Principles},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {1},
  pages        = {54--64},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2020.2994826},
  doi          = {10.1109/MSEC.2020.2994826},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MassacciN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbir/AkhtarSBV21,
  author       = {Shahzeb Akhtar and
                  Pratima Amol Sheorey and
                  Sonali Bhattacharya and
                  Ajith Kumar Vadakki Veetil},
  title        = {Cyber Security Solutions for Businesses in Financial Services: Challenges,
                  Opportunities, and the Way Forward},
  journal      = {Int. J. Bus. Intell. Res.},
  volume       = {12},
  number       = {1},
  pages        = {82--97},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijbir.20210101.oa5},
  doi          = {10.4018/IJBIR.20210101.OA5},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbir/AkhtarSBV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/QuLB21,
  author       = {Qiao Qu and
                  Cheng Liu and
                  Xinzhong Bao},
  title        = {Financial Security Analysis of E-Commerce Platform Based on Supply
                  Chain for Heterogeneous Network Location Verification},
  journal      = {J. Sensors},
  volume       = {2021},
  pages        = {1--14},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7952123},
  doi          = {10.1155/2021/7952123},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/QuLB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/WeiY21,
  author       = {Ran Wei and
                  Sheng Yao},
  title        = {Enterprise Financial Risk Identification and Information Security
                  Management and Control in Big Data Environment},
  journal      = {Mob. Inf. Syst.},
  volume       = {2021},
  pages        = {7188327:1--7188327:6},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7188327},
  doi          = {10.1155/2021/7188327},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/WeiY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/EduAA21,
  author       = {Sampson Abeeku Edu and
                  Mary Agoyi and
                  Divine Quazie Agozie},
  title        = {Digital security vulnerabilities and threats implications for financial
                  institutions deploying digital technology platforms and application:
                  {FMEA} and {FTOPSIS} analysis},
  journal      = {PeerJ Comput. Sci.},
  volume       = {7},
  pages        = {e658},
  year         = {2021},
  url          = {https://doi.org/10.7717/peerj-cs.658},
  doi          = {10.7717/PEERJ-CS.658},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/EduAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiam/LinX21,
  author       = {Zhisheng Lin and
                  Yan Xia},
  title        = {Network Security of University Financial Sharing Platform under the
                  Background of Smart Campus},
  booktitle    = {{AIAM} 2021: 3rd International Conference on Artificial Intelligence
                  and Advanced Manufacture, Manchester, United Kingdom, October 23 -
                  25, 2021},
  pages        = {1304--1308},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3495018.3495387},
  doi          = {10.1145/3495018.3495387},
  timestamp    = {Thu, 24 Mar 2022 09:42:53 +0100},
  biburl       = {https://dblp.org/rec/conf/aiam/LinX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpits/BatorshynaTKCH21,
  author       = {Adilia Batorshyna and
                  Volodymyr Tokar and
                  Natalia Kotenko and
                  Serhii Chekhovych and
                  Andrii Homotiuk},
  editor       = {Anatoly Bessalov and
                  Dmytro Ageyev and
                  Valeriy Lahno and
                  Volodymyr Sokolov},
  title        = {The Impact of Awareness Stimulating Activities and Events on Global
                  Islamic Finance Assets: Enhancing Financial Risk Management and Economic
                  Security in Non-Muslim Countries},
  booktitle    = {Proceedings of the Cybersecurity Providing in Information and Telecommunication
                  Systems {II.} Volume {I} co-located with International Conference
                  on Problems of Infocommunications. Science and Technology {(PICST}
                  2021), Kyiv, Ukraine, October 26, 2021 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3187},
  pages        = {13--26},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-3187/paper2.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:31 +0100},
  biburl       = {https://dblp.org/rec/conf/cpits/BatorshynaTKCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpits/KreidychKK21,
  author       = {Iryna Kreidych and
                  leksandr Kharchenko and
                  Oksana Kazak},
  editor       = {Anatoly Bessalov and
                  Dmytro Ageyev and
                  Valeriy Lahno and
                  Volodymyr Sokolov},
  title        = {Solvency Management in the Financial Security System of Housing and
                  Communal Services},
  booktitle    = {Proceedings of the Cybersecurity Providing in Information and Telecommunication
                  Systems {II.} Volume {II} co-located with International Conference
                  on Problems of Infocommunications. Science and Technology {(PICST}
                  2021), Kyiv, Ukraine, October 26, 2021 (online)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3188},
  pages        = {63--75},
  publisher    = {CEUR-WS.org},
  year         = {2021},
  url          = {https://ceur-ws.org/Vol-3188/paper7.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:31 +0100},
  biburl       = {https://dblp.org/rec/conf/cpits/KreidychKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DasKC21,
  author       = {Sanchari Das and
                  Andrew Kim and
                  L. Jean Camp},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Short Paper: Organizational Security: Implementing a Risk-Reduction-Based
                  Incentivization Model for {MFA} Adoption},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  pages        = {406--413},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0\_21},
  doi          = {10.1007/978-3-662-64331-0\_21},
  timestamp    = {Thu, 16 Mar 2023 14:52:53 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/DasKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icict/MohananSB21,
  author       = {Sudhish Mohanan and
                  Nandagopal Sridhar and
                  Sajal Bhatia},
  editor       = {Xin{-}She Yang and
                  Simon Sherratt and
                  Nilanjan Dey and
                  Amit Joshi},
  title        = {Comparative Analysis of Cloud Computing Security Frameworks for Financial
                  Sector},
  booktitle    = {Proceedings of Sixth International Congress on Information and Communication
                  Technology - {ICICT} 2021, London, UK, Volume 2},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {236},
  pages        = {1015--1025},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-2380-6\_90},
  doi          = {10.1007/978-981-16-2380-6\_90},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icict/MohananSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icise/FacciaSEB21,
  author       = {Alessio Faccia and
                  Nedal Sawan and
                  Ahmed Eltweri and
                  Zeenat Beebeejaun},
  title        = {Financial Big Data Security and Privacy in X-Accounting. {A} Step
                  Further to Implement the Triple-Entry Accounting},
  booktitle    = {{ICISE} 2021: The 6th International Conference on Information Systems
                  Engineering, Shanghai, China, November 12 - 14, 2021},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3503928.3503932},
  doi          = {10.1145/3503928.3503932},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icise/FacciaSEB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ico/SattarMSPBPK21,
  author       = {Md Rahat Ibne Sattar and
                  Shrabonti Mitra and
                  Sadia Sultana and
                  Umme Salma Pushpa and
                  Dhruba Bhattacharjee and
                  Abhijit Pathak and
                  Mayeen Uddin Khandaker},
  title        = {A Secured Network Layer and Information Security for Financial Institutions:
                  {A} Case Study},
  booktitle    = {{ICO}},
  pages        = {992--1001},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93247-3\_94},
  doi          = {10.1007/978-3-030-93247-3\_94},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ico/SattarMSPBPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/TanCC21,
  author       = {Vincent Tan and
                  Carmen Cheh and
                  Binbin Chen},
  title        = {From Application Security Verification Standard {(ASVS)} to Regulation
                  Compliance: {A} Case Study in Financial Services Sector},
  booktitle    = {{IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2021 - Workshops, Wuhan, China, October 25-28, 2021},
  pages        = {69--76},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISSREW53611.2021.00046},
  doi          = {10.1109/ISSREW53611.2021.00046},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/TanCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2021-1,
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12674},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64322-8},
  doi          = {10.1007/978-3-662-64322-8},
  isbn         = {978-3-662-64321-1},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2021-2,
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0},
  doi          = {10.1007/978-3-662-64331-0},
  isbn         = {978-3-662-64330-3},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2021w,
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  Lewis Gudgeon and
                  Thomas Haines and
                  Ariah Klages{-}Mundt and
                  Shin'ichiro Matsuo and
                  Daniel Perez and
                  Massimiliano Sala and
                  Sam Werner},
  title        = {Financial Cryptography and Data Security. {FC} 2021 International
                  Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March
                  5, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12676},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-63958-0},
  doi          = {10.1007/978-3-662-63958-0},
  isbn         = {978-3-662-63957-3},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2021w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FaustHKS21a,
  author       = {Sebastian Faust and
                  Carmit Hazay and
                  David Kretzler and
                  Benjamin Schlosser},
  title        = {Financially Backed Covert Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1652},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1652},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FaustHKS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitdm/Balashunmugaraja20,
  author       = {B. Balashunmugaraja and
                  T. R. Ganeshbabu},
  title        = {Optimal Key Generation for Data Sanitization and Restoration of Cloud
                  Data: Future of Financial Cyber Security},
  journal      = {Int. J. Inf. Technol. Decis. Mak.},
  volume       = {19},
  number       = {4},
  pages        = {987--1013},
  year         = {2020},
  url          = {https://doi.org/10.1142/S0219622020500200},
  doi          = {10.1142/S0219622020500200},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitdm/Balashunmugaraja20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DzidzahKA20,
  author       = {Esther Dzidzah and
                  Kwame Owusu Kwateng and
                  Benjamin Kofi Asante},
  title        = {Security behaviour of mobile financial service users},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {719--741},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-02-2020-0021},
  doi          = {10.1108/ICS-02-2020-0021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DzidzahKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbft/KaulH20,
  author       = {Sonam Devgan Kaul and
                  Dimitrios Hatzinakos},
  title        = {Intelligent {RFID} biometric enabled dual security lock in the banking
                  environment},
  journal      = {J. Bank. Financial Technol.},
  volume       = {4},
  number       = {2},
  pages        = {159--173},
  year         = {2020},
  url          = {https://doi.org/10.1007/s42786-020-00022-1},
  doi          = {10.1007/S42786-020-00022-1},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbft/KaulH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/PanWH20,
  author       = {Shuang Pan and
                  Jianguo Wei and
                  Shaobo Hu},
  title        = {A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping
                  and Intelligent Learning in Financial Security System},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {13-14},
  pages        = {9163--9176},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-018-7144-5},
  doi          = {10.1007/S11042-018-7144-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/PanWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Moeckel20,
  author       = {Caroline Moeckel},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Attacker-centric thinking in security: perspectives from financial
                  services practitioners},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {1:1--1:10},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3407082},
  doi          = {10.1145/3407023.3407082},
  timestamp    = {Mon, 03 Aug 2020 16:17:13 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Moeckel20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/PhamH20,
  author       = {Thai Pham and
                  Farkhondeh Hassandoust},
  title        = {The Role of External Mechanisms and Transformational Leadership in
                  Information Security Policy Effectiveness: {A} Managerial Perspective
                  of Financial Industry in Vietnam},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2020, Wellington,
                  New Zealand, December 1-4, 2020},
  pages        = {79},
  year         = {2020},
  url          = {https://aisel.aisnet.org/acis2020/79},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/PhamH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atci/HuH20,
  author       = {Shuyu Hu and
                  Ming Huang},
  editor       = {Jemal H. Abawajy and
                  Kim{-}Kwang Raymond Choo and
                  Zheng Xu and
                  Mohammed Atiquzzaman},
  title        = {Internet Financial Security Based on Big Data},
  booktitle    = {2020 International Conference on Applications and Techniques in Cyber
                  Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI}
                  2020), Fuyang, China, 20-22 June, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1244},
  pages        = {485--490},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-53980-1\_72},
  doi          = {10.1007/978-3-030-53980-1\_72},
  timestamp    = {Tue, 05 Apr 2022 12:05:39 +0200},
  biburl       = {https://dblp.org/rec/conf/atci/HuH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dessert/SirenkoAVPMF20,
  author       = {Natalia N. Sirenko and
                  Igor P. Atamanyuk and
                  Yuriy Volosyuk and
                  Anastasiya Poltorak and
                  Olha Melnyk and
                  Polina Fenenko},
  title        = {Paradigm Changes that Strengthen the Financial Security of the State
                  through {FINTECH} Development},
  booktitle    = {11th {IEEE} International Conference on Dependable Systems, Services
                  and Technologies, {DESSERT} 2020, Kyiv, Ukraine, May 14-18, 2020},
  pages        = {110--116},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DESSERT50317.2020.9125026},
  doi          = {10.1109/DESSERT50317.2020.9125026},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dessert/SirenkoAVPMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KulykRAMGV20,
  author       = {Oksana Kulyk and
                  Benjamin Reinheimer and
                  Lukas Aldag and
                  Peter Mayer and
                  Nina Gerber and
                  Melanie Volkamer},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Security and Privacy Awareness in Smart Environments - {A} Cross-Country
                  Investigation},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {84--101},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54455-3\_7},
  doi          = {10.1007/978-3-030-54455-3\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KulykRAMGV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/OyebisiN20,
  author       = {David Oyebisi and
                  Kennedy Njenga},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Behaviour of Outsourced Employees as Sources of Information System
                  Security Threats},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {137--148},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54455-3\_10},
  doi          = {10.1007/978-3-030-54455-3\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/OyebisiN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SuBSUM20,
  author       = {Jianan Su and
                  Michael Bartholic and
                  Andrew Stange and
                  Ryosuke Ushida and
                  Shin'ichiro Matsuo},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {How to Dynamically Incentivize Sufficient Level of IoT Security},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {451--465},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54455-3\_32},
  doi          = {10.1007/978-3-030-54455-3\_32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SuBSUM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Taylor-JacksonM20,
  author       = {Jacqui Taylor{-}Jackson and
                  John McAlaney and
                  Jeffrey L. Foster and
                  Abubakar Bello and
                  Alana Maurushat and
                  John Dale},
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Incorporating Psychology into Cyber Security Education: {A} Pedagogical
                  Approach},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  pages        = {207--217},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54455-3\_15},
  doi          = {10.1007/978-3-030-54455-3\_15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Taylor-JacksonM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/WangYPB0D020,
  author       = {Qin Wang and
                  Jiangshan Yu and
                  Zhiniang Peng and
                  Van Cuong Bui and
                  Shiping Chen and
                  Yong Ding and
                  Yang Xiang},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Security Analysis on dBFT Protocol of {NEO}},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {20--31},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_2},
  doi          = {10.1007/978-3-030-51280-4\_2},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/WangYPB0D020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/YuenSLAEZG20,
  author       = {Tsz Hon Yuen and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Man Ho Au and
                  Muhammed F. Esgin and
                  Qingzhao Zhang and
                  Dawu Gu},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and
                  Stronger Security},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {464--483},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_25},
  doi          = {10.1007/978-3-030-51280-4\_25},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/YuenSLAEZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/ChenGCZL20,
  author       = {Weili Chen and
                  Xiongfeng Guo and
                  Zhiguang Chen and
                  Zibin Zheng and
                  Yutong Lu},
  editor       = {Christian Bessiere},
  title        = {Phishing Scam Detection on Ethereum: Towards Financial Security for
                  Blockchain Ecosystem},
  booktitle    = {Proceedings of the Twenty-Ninth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2020},
  pages        = {4506--4512},
  publisher    = {ijcai.org},
  year         = {2020},
  url          = {https://doi.org/10.24963/ijcai.2020/621},
  doi          = {10.24963/IJCAI.2020/621},
  timestamp    = {Mon, 20 Jul 2020 12:38:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/ChenGCZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isdmci/KulyniakOR20,
  author       = {Ihor Kulyniak and
                  Solomiya Ohinok and
                  Halyna Rachynska},
  editor       = {Sergii Babichev and
                  Volodymyr Lytvynenko and
                  Waldemar W{\'{o}}jcik and
                  Svetlana Vyshemyrskaya},
  title        = {Scientific and Methodological Approach to Assessing the Level of Banks'
                  Financial Security},
  booktitle    = {Lecture Notes in Computational Intelligence and Decision Making -
                  Proceedings of the 2020 International Scientific Conference "Intellectual
                  Systems of Decision-making and Problems of Computational Intelligence",
                  {ISDMCI} 2020, Kherson, Ukraine, May 25-29, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1246},
  pages        = {77--97},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54215-3\_6},
  doi          = {10.1007/978-3-030-54215-3\_6},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isdmci/KulyniakOR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/m3e2/KhrushchHHLPV20,
  author       = {Nila Khrushch and
                  Pavlo Hryhoruk and
                  Tetiana Hovorushchenko and
                  Sergii Lysenko and
                  Liudmyla Prystupa and
                  Liudmyla Vahanova},
  editor       = {Arnold Kiv},
  title        = {Assessment of bank's financial security levels based on a comprehensive
                  index using information technology},
  booktitle    = {Proceedings of the Selected Papers of the Special Edition of International
                  Conference on Monitoring, Modeling {\&} Management of Emergent
                  Economy {(M3E2-MLPEED} 2020), Odessa, Ukraine, July 13-18, 2020},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2713},
  pages        = {239--260},
  publisher    = {CEUR-WS.org},
  year         = {2020},
  url          = {https://ceur-ws.org/Vol-2713/paper23.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:44 +0100},
  biburl       = {https://dblp.org/rec/conf/m3e2/KhrushchHHLPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BelloP20,
  author       = {Gabriel Bello and
                  Alfredo J. Perez},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {On the Application of Financial Security Standards in Blockchain Platforms},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_13},
  doi          = {10.1007/978-3-030-38181-3\_13},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BelloP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2019w,
  editor       = {Andrea Bracciali and
                  Jeremy Clark and
                  Federico Pintore and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security - {FC} 2019 International
                  Workshops, {VOTING} and WTSC, St. Kitts, St. Kitts and Nevis, February
                  18-22, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11599},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-43725-1},
  doi          = {10.1007/978-3-030-43725-1},
  isbn         = {978-3-030-43724-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2019w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2020,
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4},
  doi          = {10.1007/978-3-030-51280-4},
  isbn         = {978-3-030-51279-8},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2020w,
  editor       = {Matthew Bernhard and
                  Andrea Bracciali and
                  L. Jean Camp and
                  Shin'ichiro Matsuo and
                  Alana Maurushat and
                  Peter B. R{\o}nne and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security - {FC} 2020 International
                  Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia,
                  February 14, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12063},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-54455-3},
  doi          = {10.1007/978-3-030-54455-3},
  isbn         = {978-3-030-54454-6},
  timestamp    = {Sun, 09 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2020w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijais/McCalligRR19,
  author       = {John McCallig and
                  D. Alastair Robb and
                  Fiona H. Rohde},
  title        = {Establishing the representational faithfulness of financial accounting
                  information using multiparty security, network analysis and a blockchain},
  journal      = {Int. J. Account. Inf. Syst.},
  volume       = {33},
  pages        = {47--58},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.accinf.2019.03.004},
  doi          = {10.1016/J.ACCINF.2019.03.004},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijais/McCalligRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijssmet/Feltus19,
  author       = {Christophe Feltus},
  title        = {Deriving Information System Security and Privacy From Value Cocreation
                  Theory: Case Study in the Financial Sector},
  journal      = {Int. J. Serv. Sci. Manag. Eng. Technol.},
  volume       = {10},
  number       = {4},
  pages        = {1--25},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJSSMET.2019100101},
  doi          = {10.4018/IJSSMET.2019100101},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijssmet/Feltus19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbft/DasguptaSG19,
  author       = {Dipankar Dasgupta and
                  John M. Shrein and
                  Kishor Datta Gupta},
  title        = {A survey of blockchain from security perspective},
  journal      = {J. Bank. Financial Technol.},
  volume       = {3},
  number       = {1},
  pages        = {1--17},
  year         = {2019},
  url          = {https://doi.org/10.1007/s42786-018-00002-6},
  doi          = {10.1007/S42786-018-00002-6},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbft/DasguptaSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tele/BarthJJHR19,
  author       = {Susanne Barth and
                  Menno D. T. de Jong and
                  Marianne Junger and
                  Pieter H. Hartel and
                  Janina C. Roppelt},
  title        = {Putting the privacy paradox to the test: Online privacy and security
                  behaviors among users with technical knowledge, privacy awareness,
                  and financial resources},
  journal      = {Telematics Informatics},
  volume       = {41},
  pages        = {55--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tele.2019.03.003},
  doi          = {10.1016/J.TELE.2019.03.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tele/BarthJJHR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/SleeperMOTWSOSC19,
  author       = {Manya Sleeper and
                  Tara Matthews and
                  Kathleen O'Leary and
                  Anna Turner and
                  Jill Palzkill Woelfer and
                  Martin Shelton and
                  Andrew Oplinger and
                  Andreas Schou and
                  Sunny Consolvo},
  editor       = {Stephen A. Brewster and
                  Geraldine Fitzpatrick and
                  Anna L. Cox and
                  Vassilis Kostakos},
  title        = {Tough Times at Transitional Homeless Shelters: Considering the Impact
                  of Financial Insecurity on Digital Security and Privacy},
  booktitle    = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019},
  pages        = {89},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3290605.3300319},
  doi          = {10.1145/3290605.3300319},
  timestamp    = {Sun, 02 Jun 2019 21:13:35 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/SleeperMOTWSOSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/MahalleYT19a,
  author       = {Abhishek Mahalle and
                  Jianming Yong and
                  Xiaohui Tao},
  editor       = {Weiming Shen and
                  Hugo Paredes and
                  Junzhou Luo and
                  Jean{-}Paul A. Barth{\`{e}}s},
  title        = {Ethics of {IT} Security Team for Cloud Architecture Infrastructure
                  in Banking and Financial Services Industry},
  booktitle    = {23rd {IEEE} International Conference on Computer Supported Cooperative
                  Work in Design, {CSCWD} 2019, Porto, Portugal, May 6-8, 2019},
  pages        = {506--511},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSCWD.2019.8791928},
  doi          = {10.1109/CSCWD.2019.8791928},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/MahalleYT19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AchenbachGH0LMM19,
  author       = {Dirk Achenbach and
                  Roland Gr{\"{o}}ll and
                  Timon Hackenjos and
                  Alexander Koch and
                  Bernhard L{\"{o}}we and
                  Jeremias Mechler and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Jochen Rill},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Your Money or Your Life - Modeling and Analyzing the Security of Electronic
                  Payment in the {UC} Framework},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {243--261},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_16},
  doi          = {10.1007/978-3-030-32101-7\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AchenbachGH0LMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AvarikiotiK0W19,
  author       = {Georgia Avarikioti and
                  Lukas K{\"{a}}ppeli and
                  Yuyi Wang and
                  Roger Wattenhofer},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Bitcoin Security Under Temporary Dishonest Majority},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {466--483},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_28},
  doi          = {10.1007/978-3-030-32101-7\_28},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AvarikiotiK0W19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/OzmenBY19,
  author       = {Muslum Ozgur Ozmen and
                  Rouzbeh Behnia and
                  Attila A. Yavuz},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Fast Authentication from Aggregate Signatures with Improved Security},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {686--705},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_39},
  doi          = {10.1007/978-3-030-32101-7\_39},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/OzmenBY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/m3e2/HryhorukKG19,
  author       = {Pavlo Hryhoruk and
                  Nila Khrushch and
                  Svitlana Grygoruk},
  editor       = {Arnold Kiv and
                  Serhiy Semerikov and
                  Vladimir N. Soloviev and
                  Liubov Kibalnyk and
                  Hanna Danylchuk and
                  Andriy Matviychuk},
  title        = {Model for Assessment of the Financial Security Level of the Enterprise
                  Based on the Desirability Scale},
  booktitle    = {Proceedings of the Selected Papers of the 8th International Conference
                  on Monitoring, Modeling {\&} Management of Emergent Economy, {M3E2-EEMLPEED}
                  2019, Odessa, Ukraine, May 22-24, 2019},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2422},
  pages        = {169--180},
  publisher    = {CEUR-WS.org},
  year         = {2019},
  url          = {https://ceur-ws.org/Vol-2422/paper14.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:44 +0100},
  biburl       = {https://dblp.org/rec/conf/m3e2/HryhorukKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/TroianoSPPMD19,
  author       = {Ernesto Troiano and
                  John Soldatos and
                  Ariana Polyviou and
                  Andreas Polyviou and
                  Alessandro Mamelli and
                  Dimitris Drakoulis},
  editor       = {Richard Chbeir and
                  Yannis Manolopoulos and
                  Sergio Ilarri and
                  Apostolos Papadopoulos},
  title        = {Big Data Platform for Integrated Cyber and Physical Security of Critical
                  Infrastructures for the Financial Sector: Critical Infrastructures
                  as Cyber-Physical Systems},
  booktitle    = {11th International Conference on Management of Digital EcoSystems,
                  {MEDES} 2019, Limassol, Cyprus, November, 2019},
  pages        = {262--269},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297662.3365787},
  doi          = {10.1145/3297662.3365787},
  timestamp    = {Thu, 31 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/medes/TroianoSPPMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FettHK19,
  author       = {Daniel Fett and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters},
  title        = {An Extensive Formal Security Analysis of the OpenID Financial-Grade
                  {API}},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {453--471},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00067},
  doi          = {10.1109/SP.2019.00067},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FettHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mavroudis19,
  author       = {Vasilios Mavroudis},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Bounded Temporal Fairness for {FIFO} Financial Markets},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {91--103},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_9},
  doi          = {10.1007/978-3-030-57043-9\_9},
  timestamp    = {Mon, 24 Aug 2020 16:33:11 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mavroudis19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Mavroudis19a,
  author       = {Vasilios Mavroudis},
  editor       = {Jonathan Anderson and
                  Frank Stajano and
                  Bruce Christianson and
                  Vashek Maty{\'{a}}s},
  title        = {Bounded Temporal Fairness for {FIFO} Financial Markets (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXVII} - 27th International Workshop, Cambridge,
                  UK, April 10-12, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12287},
  pages        = {104--112},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-57043-9\_10},
  doi          = {10.1007/978-3-030-57043-9\_10},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Mavroudis19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2018w,
  editor       = {Aviv Zohar and
                  Ittay Eyal and
                  Vanessa Teague and
                  Jeremy Clark and
                  Andrea Bracciali and
                  Federico Pintore and
                  Massimiliano Sala},
  title        = {Financial Cryptography and Data Security - {FC} 2018 International
                  Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Cura{\c{c}}ao, March
                  2, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10958},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-662-58820-8},
  doi          = {10.1007/978-3-662-58820-8},
  isbn         = {978-3-662-58819-2},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2018w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2019,
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7},
  doi          = {10.1007/978-3-030-32101-7},
  isbn         = {978-3-030-32100-0},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-11520,
  author       = {Daniel Fett and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters},
  title        = {An Extensive Formal Security Analysis of the OpenID Financial-grade
                  {API}},
  journal      = {CoRR},
  volume       = {abs/1901.11520},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.11520},
  eprinttype    = {arXiv},
  eprint       = {1901.11520},
  timestamp    = {Mon, 04 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-11520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Pan18,
  author       = {Liuxuan Pan},
  title        = {Application of a financial quantitative risk model to information
                  security risk assessment},
  school       = {Royal Holloway, University of London, Egham, {UK}},
  year         = {2018},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792802},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Pan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcam/Nkeki18a,
  author       = {Charles I. Nkeki},
  title        = {Optimal investment risks and debt management with backup security
                  in a financial crisis},
  journal      = {J. Comput. Appl. Math.},
  volume       = {338},
  pages        = {129--152},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cam.2018.01.032},
  doi          = {10.1016/J.CAM.2018.01.032},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcam/Nkeki18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taasm/Lee18,
  author       = {Kyoung{-}Joo Lee},
  title        = {Strategic human resource management for university-industry collaborations
                  in Korea: financial incentives for academic faculty and employment
                  security of industry liaison offices},
  journal      = {Technol. Anal. Strateg. Manag.},
  volume       = {30},
  number       = {4},
  pages        = {461--472},
  year         = {2018},
  url          = {https://doi.org/10.1080/09537325.2017.1337885},
  doi          = {10.1080/09537325.2017.1337885},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taasm/Lee18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/MahalleYT018,
  author       = {Abhishek Mahalle and
                  Jianming Yong and
                  Xiaohui Tao and
                  Jun Shen},
  editor       = {Weiming Shen and
                  Junzhou Luo and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Fang Dong and
                  Jinghui Zhang and
                  Haibin Zhu},
  title        = {Data Privacy and System Security for Banking and Financial Services
                  Industry based on Cloud Computing Infrastructure},
  booktitle    = {22nd {IEEE} International Conference on Computer Supported Cooperative
                  Work in Design, {CSCWD} 2018, Nanjing, China, May 9-11, 2018},
  pages        = {407--413},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSCWD.2018.8465318},
  doi          = {10.1109/CSCWD.2018.8465318},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/MahalleYT018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DasDC18,
  author       = {Sanchari Das and
                  Andrew Dingman and
                  L. Jean Camp},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Why Johnny Doesn't Use Two Factor {A} Two-Phase Usability Study of
                  the {FIDO} {U2F} Security Key},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_9},
  doi          = {10.1007/978-3-662-58387-6\_9},
  timestamp    = {Fri, 30 Aug 2019 11:17:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DasDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FarhangLG18,
  author       = {Sadegh Farhang and
                  Aron Laszka and
                  Jens Grossklags},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {An Economic Study of the Effect of Android Platform Fragmentation
                  on Security Updates},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {119--137},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_7},
  doi          = {10.1007/978-3-662-58387-6\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/FarhangLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Shacham18,
  author       = {Hovav Shacham},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Short Unique Signatures from {RSA} with a Tight Security Reduction
                  (in the Random Oracle Model)},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_4},
  doi          = {10.1007/978-3-662-58387-6\_4},
  timestamp    = {Fri, 30 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Shacham18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Massacci18,
  author       = {Fabio Massacci},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Non-monotonic Security Protocols and Failures in Financial Intermediation
                  (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {55--62},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_6},
  doi          = {10.1007/978-3-030-03251-7\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Massacci18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/MassacciN0W18,
  author       = {Fabio Massacci and
                  Chan Nam Ngo and
                  Daniele Venturi and
                  Julian Williams},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Non-monotonic Security Protocols and Failures in Financial Intermediation},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {45--54},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_5},
  doi          = {10.1007/978-3-030-03251-7\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/MassacciN0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2018,
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6},
  doi          = {10.1007/978-3-662-58387-6},
  isbn         = {978-3-662-58386-9},
  timestamp    = {Fri, 30 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TraynorBBR17,
  author       = {Patrick Traynor and
                  Kevin R. B. Butler and
                  Jasmine D. Bowers and
                  Bradley Reaves},
  title        = {FinTechSec: Addressing the Security Challenges of Digital Financial
                  Services},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {5},
  pages        = {85--89},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.3681060},
  doi          = {10.1109/MSP.2017.3681060},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TraynorBBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChothiaGHS17,
  author       = {Tom Chothia and
                  Flavio D. Garcia and
                  Chris Heppel and
                  Chris McMahon Stone},
  editor       = {Aggelos Kiayias},
  title        = {Why Banker Bob (Still) Can't Get {TLS} Right: {A} Security Analysis
                  of {TLS} in Leading {UK} Banking Apps},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {579--597},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_33},
  doi          = {10.1007/978-3-319-70972-7\_33},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChothiaGHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Gjosteen017,
  author       = {Kristian Gj{\o}steen and
                  Martin Strand},
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {A Roadmap to Fully Homomorphic Elections: Stronger Security, Better
                  Verifiability},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0\_25},
  doi          = {10.1007/978-3-319-70278-0\_25},
  timestamp    = {Tue, 16 Aug 2022 23:04:23 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Gjosteen017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MalhotraGVKGG17,
  author       = {Aanchal Malhotra and
                  Matthew Van Gundy and
                  Mayank Varia and
                  Haydn Kennedy and
                  Jonathan Gardner and
                  Sharon Goldberg},
  editor       = {Aggelos Kiayias},
  title        = {The Security of NTP's Datagram Protocol},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {405--423},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_23},
  doi          = {10.1007/978-3-319-70972-7\_23},
  timestamp    = {Tue, 02 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/MalhotraGVKGG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SzalachowskiP17,
  author       = {Pawel Szalachowski and
                  Adrian Perrig},
  editor       = {Aggelos Kiayias},
  title        = {Short Paper: On Deployment of DNS-Based Security Enhancements},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {424--433},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_24},
  doi          = {10.1007/978-3-319-70972-7\_24},
  timestamp    = {Tue, 02 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/SzalachowskiP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2016,
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54970-4},
  doi          = {10.1007/978-3-662-54970-4},
  isbn         = {978-3-662-54969-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017,
  editor       = {Aggelos Kiayias},
  title        = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7},
  doi          = {10.1007/978-3-319-70972-7},
  isbn         = {978-3-319-70971-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2017w,
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0},
  doi          = {10.1007/978-3-319-70278-0},
  isbn         = {978-3-319-70277-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2017w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/AppanB16,
  author       = {Radha Appan and
                  Dinko Bacic},
  title        = {Impact of Information Technology {(IT)} Security Information Sharing
                  among Competing {IT} Firms on Firm's Financial Performance: An Empirical
                  Investigation},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {39},
  pages        = {12},
  year         = {2016},
  url          = {https://doi.org/10.17705/1cais.03912},
  doi          = {10.17705/1CAIS.03912},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cais/AppanB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/ChunCS16,
  author       = {Se{-}Hak Chun and
                  Wooje Cho and
                  Ramanath Subramanyam},
  title        = {Transaction security investments in online marketplaces: An analytical
                  examination of financial liabilities},
  journal      = {Decis. Support Syst.},
  volume       = {92},
  pages        = {91--102},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dss.2016.09.015},
  doi          = {10.1016/J.DSS.2016.09.015},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/ChunCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/PandeyS16,
  author       = {Pankaj Pandey and
                  Einar Snekkenes},
  title        = {Using Financial Instruments to Transfer the Information Security Risks},
  journal      = {Future Internet},
  volume       = {8},
  number       = {2},
  pages        = {20},
  year         = {2016},
  url          = {https://doi.org/10.3390/fi8020020},
  doi          = {10.3390/FI8020020},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/PandeyS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/RoumaniNR16,
  author       = {Yaman Roumani and
                  Joseph K. Nwankpa and
                  Yazan F. Roumani},
  title        = {Examining the relationship between firm's financial records and security
                  vulnerabilities},
  journal      = {Int. J. Inf. Manag.},
  volume       = {36},
  number       = {6},
  pages        = {987--994},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2016.05.016},
  doi          = {10.1016/J.IJINFOMGT.2016.05.016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/RoumaniNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lp/LinZ16,
  author       = {Songqing Lin and
                  Lijuan Zhan},
  title        = {International publishing partnerships for China's English language
                  journals and financial security},
  journal      = {Learn. Publ.},
  volume       = {29},
  number       = {3},
  pages        = {145--153},
  year         = {2016},
  url          = {https://doi.org/10.1002/leap.1029},
  doi          = {10.1002/LEAP.1029},
  timestamp    = {Thu, 16 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lp/LinZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Noh16,
  author       = {Kyoo{-}Sung Noh},
  title        = {A Study on the Authentication and Security of Financial Settlement
                  Using the Finger Vein Technology in Wireless Internet Environment},
  journal      = {Wirel. Pers. Commun.},
  volume       = {89},
  number       = {3},
  pages        = {761--775},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11277-015-3116-5},
  doi          = {10.1007/S11277-015-3116-5},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/Noh16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/GaiQE16a,
  author       = {Keke Gai and
                  Meikang Qiu and
                  Sam Adam Elnagdy},
  title        = {Security-Aware Information Classifications Using Supervised Learning
                  for Cloud-Based Cyber Risk Management in Financial Big Data},
  booktitle    = {2nd {IEEE} International Conference on Big Data Security on Cloud,
                  BigDataSecurity 2016, {IEEE} International Conference on High Performance
                  and Smart Computing, {HPSC} 2016, and {IEEE} International Conference
                  on Intelligent Data and Security, {IDS} 2016, New York, NY, USA, April
                  9-10, 2016},
  pages        = {197--202},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.66},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS.2016.66},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/GaiQE16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AlgwilY16,
  author       = {Abdalnaser Algwil and
                  Jeff Yan},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Failures of Security APIs: {A} New Case},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {283--298},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_17},
  doi          = {10.1007/978-3-662-54970-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AlgwilY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KrombholzJGW16,
  author       = {Katharina Krombholz and
                  Aljosha Judmayer and
                  Matthias Gusenbauer and
                  Edgar R. Weippl},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {The Other Side of the Coin: User Experiences with Bitcoin Security
                  and Privacy},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {555--580},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_33},
  doi          = {10.1007/978-3-662-54970-4\_33},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KrombholzJGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LangCBSS16,
  author       = {Juan Lang and
                  Alexei Czeskis and
                  Dirk Balfanz and
                  Marius Schilder and
                  Sampath Srinivas},
  editor       = {Jens Grossklags and
                  Bart Preneel},
  title        = {Security Keys: Practical Cryptographic Second Factors for the Modern
                  Web},
  booktitle    = {Financial Cryptography and Data Security - 20th International Conference,
                  {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9603},
  pages        = {422--440},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-54970-4\_25},
  doi          = {10.1007/978-3-662-54970-4\_25},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/LangCBSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/WahlgrenFMK16,
  author       = {Gunnar Wahlgren and
                  Anna Fedotova and
                  Alexandra Musaeva and
                  Stewart Kowalski},
  editor       = {Nathan L. Clarke and
                  Steven Furnell},
  title        = {{IT} Security Incidents Escalation in the Swedish Financial Sector:
                  {A} Maturity Model Study},
  booktitle    = {Tenth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2016, Frankfurt, Germany, July 19-21,
                  2016, Proceedings},
  pages        = {45--55},
  publisher    = {University of Plymouth},
  year         = {2016},
  url          = {http://www.cscan.org/openaccess/?paperid=281},
  timestamp    = {Tue, 06 Jul 2021 12:22:19 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/WahlgrenFMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhKC16,
  author       = {Eun Oh and
                  Tae{-}Sung Kim and
                  Tae{-}Hee Cho},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Development of Information Security Management Assessment Model for
                  the Financial Sector},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {186--197},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_16},
  doi          = {10.1007/978-3-319-56549-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2016w,
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4},
  doi          = {10.1007/978-3-662-53357-4},
  isbn         = {978-3-662-53356-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2016w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijais/Otero15,
  author       = {Angel R. Otero},
  title        = {An information security control assessment methodology for organizations'
                  financial information},
  journal      = {Int. J. Account. Inf. Syst.},
  volume       = {18},
  pages        = {26--45},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.accinf.2015.06.001},
  doi          = {10.1016/J.ACCINF.2015.06.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijais/Otero15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisss/Ifinedo15,
  author       = {Princely Ifinedo},
  title        = {Socio-Economic Correlates of Information Security Threats and Controls
                  in Global Financial Services Industry: An Analysis},
  journal      = {Int. J. Inf. Syst. Serv. Sect.},
  volume       = {7},
  number       = {2},
  pages        = {54--70},
  year         = {2015},
  url          = {https://doi.org/10.4018/ijisss.2015040104},
  doi          = {10.4018/IJISSS.2015040104},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisss/Ifinedo15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/PandeyH15,
  author       = {Pankaj Pandey and
                  Steven De Haes},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Fabrizio Messina and
                  Marek R. Ogiela},
  title        = {A Variable Payout Information Security Financial Instrument and Trading
                  Mechanism to Address Information Security Risk},
  booktitle    = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet
                  Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015},
  pages        = {17--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/3PGCIC.2015.109},
  doi          = {10.1109/3PGCIC.2015.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/3pgcic/PandeyH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csa2/AhnC15,
  author       = {JungJin Ahn and
                  Eunmi Choi},
  editor       = {Doo{-}Soon Park and
                  Han{-}Chieh Chao and
                  Young{-}Sik Jeong and
                  James Jong Hyuk Park},
  title        = {Financial Security Protocol and Service Model for Joint Account Banking
                  Transaction},
  booktitle    = {Advances in Computer Science and Ubiquitous Computing - {CSA} {\&}
                  {CUTE} 2015, Cebu, Philippines, December 15-17, 2015},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {373},
  pages        = {521--527},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-981-10-0281-6\_75},
  doi          = {10.1007/978-981-10-0281-6\_75},
  timestamp    = {Fri, 08 Mar 2019 11:06:31 +0100},
  biburl       = {https://dblp.org/rec/conf/csa2/AhnC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Toorani15,
  author       = {Mohsen Toorani},
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {On Vulnerabilities of the Security Association in the {IEEE} 802.15.6
                  Standard},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  pages        = {245--260},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48051-9\_18},
  doi          = {10.1007/978-3-662-48051-9\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Toorani15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/GranadilloGDPM15,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar and
                  Christophe Ponchel and
                  Laura Rodriguez Martin},
  editor       = {Mohamad Badra and
                  Azzedine Boukerche and
                  Pascal Urien},
  title        = {Considering technical and financial impact in the selection of security
                  countermeasures against Advanced Persistent Threats (APTs)},
  booktitle    = {7th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2015, Paris, France, July 27-29, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NTMS.2015.7266480},
  doi          = {10.1109/NTMS.2015.7266480},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/GranadilloGDPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2015,
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47854-7},
  doi          = {10.1007/978-3-662-47854-7},
  isbn         = {978-3-662-47853-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2015w,
  editor       = {Michael Brenner and
                  Nicolas Christin and
                  Benjamin Johnson and
                  Kurt Rohloff},
  title        = {Financial Cryptography and Data Security - {FC} 2015 International
                  Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
                  30, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8976},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48051-9},
  doi          = {10.1007/978-3-662-48051-9},
  isbn         = {978-3-662-48050-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2015w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Erturk15,
  author       = {Emre Erturk},
  title        = {Two Trends in Mobile Security: Financial Motives and Transitioning
                  from Static to Dynamic Analysis},
  journal      = {CoRR},
  volume       = {abs/1504.06893},
  year         = {2015},
  url          = {http://arxiv.org/abs/1504.06893},
  eprinttype    = {arXiv},
  eprint       = {1504.06893},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Erturk15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/LiuZA14,
  author       = {Charles Zhechao Liu and
                  Humayun Zafar and
                  Yoris A. Au},
  title        = {Rethinking {FS-ISAC:} An {IT} Security Information Sharing Network
                  Model for the Financial Services Sector},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {34},
  pages        = {2},
  year         = {2014},
  url          = {https://doi.org/10.17705/1cais.03402},
  doi          = {10.17705/1CAIS.03402},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cais/LiuZA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijebm/Ifinedo14,
  author       = {Princely Ifinedo},
  title        = {The effects of national culture on the assessment of information security
                  threats and controls in financial services industry},
  journal      = {Int. J. Electron. Bus. Manag.},
  volume       = {12},
  number       = {2},
  year         = {2014},
  url          = {http://ijebm-ojs.ie.nthu.edu.tw/IJEBM\_OJS/index.php/IJEBM/article/view/627},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijebm/Ifinedo14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DmitrienkoLRS14,
  author       = {Alexandra Dmitrienko and
                  Christopher Liebchen and
                  Christian Rossow and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {On the (In)Security of Mobile Two-Factor Authentication},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {365--383},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_24},
  doi          = {10.1007/978-3-662-45472-5\_24},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/DmitrienkoLRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Garman0MR14,
  author       = {Christina Garman and
                  Matthew Green and
                  Ian Miers and
                  Aviel D. Rubin},
  editor       = {Rainer B{\"{o}}hme and
                  Michael Brenner and
                  Tyler Moore and
                  Matthew Smith},
  title        = {Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
                  and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8438},
  pages        = {140--155},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44774-1\_10},
  doi          = {10.1007/978-3-662-44774-1\_10},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Garman0MR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MigicovskyDRH14,
  author       = {Alex Migicovsky and
                  Zakir Durumeric and
                  Jeff Ringenberg and
                  J. Alex Halderman},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Outsmarting Proctors with Smartwatches: {A} Case Study on Wearable
                  Computing Security},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {89--96},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_7},
  doi          = {10.1007/978-3-662-45472-5\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MigicovskyDRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MurdochA14,
  author       = {Steven J. Murdoch and
                  Ross J. Anderson},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Security Protocols and Evidence: Where Many Payment Systems Fail},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_2},
  doi          = {10.1007/978-3-662-45472-5\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MurdochA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Pape14,
  author       = {Sebastian Pape},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Sample or Random Security - {A} Security Model for Segment-Based Visual
                  Cryptography},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {291--303},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_19},
  doi          = {10.1007/978-3-662-45472-5\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/Pape14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mipro/CapkoAT14,
  author       = {Zvonko Capko and
                  Sasa Aksentijevic and
                  Edvard Tijan},
  title        = {Economic and financial analysis of investments in information security},
  booktitle    = {37th International Convention on Information and Communication Technology,
                  Electronics and Microelectronics, {MIPRO} 2014, Opatija, Croatia,
                  May 26-30, 2014},
  pages        = {1550--1556},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/MIPRO.2014.6859812},
  doi          = {10.1109/MIPRO.2014.6859812},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/mipro/CapkoAT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MartinKA14,
  author       = {Clemens Martin and
                  Amina Kadry and
                  Ghada Abu{-}Shady},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Quantifying the financial impact of it security breaches on business
                  processes},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {149--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890934},
  doi          = {10.1109/PST.2014.6890934},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/MartinKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2014,
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5},
  doi          = {10.1007/978-3-662-45472-5},
  isbn         = {978-3-662-45471-8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2014w,
  editor       = {Rainer B{\"{o}}hme and
                  Michael Brenner and
                  Tyler Moore and
                  Matthew Smith},
  title        = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
                  and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8438},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44774-1},
  doi          = {10.1007/978-3-662-44774-1},
  isbn         = {978-3-662-44773-4},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2014w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Alhayani13,
  author       = {Abdullah Alhayani},
  title        = {Implementation, management and dissemination of information security
                  : an organisational perspective of financial institution},
  school       = {Brunel University London, {UK}},
  year         = {2013},
  url          = {http://bura.brunel.ac.uk/handle/2438/7668},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Alhayani13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cit/Ifinedo13,
  author       = {Princely Ifinedo},
  title        = {Relationships Between Relevant Contextual Influences and Information
                  Security Threats and Controls in Global Financial Services Industry},
  journal      = {J. Comput. Inf. Technol.},
  volume       = {21},
  number       = {4},
  pages        = {235--246},
  year         = {2013},
  url          = {https://doi.org/10.2498/cit.1002237},
  doi          = {10.2498/CIT.1002237},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cit/Ifinedo13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/FloresAS13,
  author       = {Denys A. Flores and
                  Olga Angelopoulou and
                  Richard J. Self},
  title        = {An Anti-Money Laundering Methodology: Financial Regulations, Information
                  Security and Digital Forensics Working Together},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {1/2},
  pages        = {101--114},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.02.31.101},
  doi          = {10.22667/JISIS.2013.02.31.101},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/FloresAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/ChangKL13,
  author       = {Hangbae Chang and
                  Jungduk Kim and
                  Hosin David Lee},
  title        = {Financial {IT} and Security},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {1-2},
  pages        = {1--2},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.04.003},
  doi          = {10.1016/J.MCM.2013.04.003},
  timestamp    = {Sun, 10 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcm/ChangKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LeeLL13,
  author       = {Jung{-}Hyun Lee and
                  Won Gue Lim and
                  Jong In Lim},
  title        = {A study of the security of Internet banking and financial private
                  information in South Korea},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {1-2},
  pages        = {117--131},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.07.019},
  doi          = {10.1016/J.MCM.2012.07.019},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LeeLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LampeWMS13,
  author       = {Ulrich Lampe and
                  Olga Wenge and
                  Alexander M{\"{u}}ller and
                  Ralf Schaarschmidt},
  title        = {On the Relevance of Security Risks for Cloud Adoption in the Financial
                  Industry},
  booktitle    = {19th Americas Conference on Information Systems, {AMCIS} 2013, Chicago,
                  Illinois, USA, August 15-17, 2013},
  publisher    = {Association for Information Systems},
  year         = {2013},
  url          = {http://aisel.aisnet.org/amcis2013/ISSecurity/GeneralPresentations/15},
  timestamp    = {Wed, 02 Jul 2014 19:53:07 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/LampeWMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/PanjaFMRM13,
  author       = {Biswajit Panja and
                  Dennis Fattaleh and
                  Mark Mercado and
                  Adam Robinson and
                  Priyanka Meharia},
  editor       = {Geoffrey Charles Fox and
                  Waleed W. Smari},
  title        = {Cybersecurity in banking and financial sector: Security analysis of
                  a mobile banking application},
  booktitle    = {2013 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2013, San Diego, CA, USA, May 20-24, 2013},
  pages        = {397--403},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CTS.2013.6567261},
  doi          = {10.1109/CTS.2013.6567261},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/PanjaFMRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ArianezhadSM13,
  author       = {Majid Arianezhad and
                  Douglas Stebila and
                  Behzad Mozaffari},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Usability and Security of Gaze-Based Graphical Grid Passwords},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_2},
  doi          = {10.1007/978-3-642-41320-9\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ArianezhadSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Cappos13,
  author       = {Justin Cappos},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Avoiding Theoretical Optimality to Efficiently and Privately Retrieve
                  Security Updates},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {386--394},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_33},
  doi          = {10.1007/978-3-642-39884-1\_33},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Cappos13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChuangNWJ13,
  author       = {John C.{-}I. Chuang and
                  Hamilton Nguyen and
                  Charles Wang and
                  Benjamin Johnson},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {I Think, Therefore {I} Am: Usability and Security of Authentication
                  Using Brainwaves},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_1},
  doi          = {10.1007/978-3-642-41320-9\_1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChuangNWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/EgelmanS13,
  author       = {Serge Egelman and
                  Stuart E. Schechter},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {The Importance of Being Earnest [In Security Warnings]},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {52--59},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_5},
  doi          = {10.1007/978-3-642-39884-1\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/EgelmanS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FahlHOMS13,
  author       = {Sascha Fahl and
                  Marian Harbach and
                  Marten Oltrogge and
                  Thomas Muders and
                  Matthew Smith},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Hey, You, Get Off of My Clipboard - On How Usability Trumps Security
                  in Android Password Managers},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_12},
  doi          = {10.1007/978-3-642-39884-1\_12},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/FahlHOMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GallegoSV13,
  author       = {Alexander Gallego and
                  Nitesh Saxena and
                  Jonathan Voris},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Exploring Extrinsic Motivation for Better Security: {A} Usability
                  Study of Scoring-Enhanced Device Pairing},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_6},
  doi          = {10.1007/978-3-642-39884-1\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/GallegoSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KeHY13,
  author       = {Ping Fan Ke and
                  Kai Lung Hui and
                  Wei T. Yue},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Information Security as a Credence Good},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {83--93},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_6},
  doi          = {10.1007/978-3-642-41320-9\_6},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KeHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13,
  author       = {Patrick Gage Kelley and
                  Saranga Komanduri and
                  Michelle L. Mazurek and
                  Richard Shay and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {The Impact of Length and Mathematical Operators on the Usability and
                  Security of System-Assigned One-Time PINs},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_3},
  doi          = {10.1007/978-3-642-41320-9\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KelleyKMSVBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KirlapposBS13,
  author       = {Iacovos Kirlappos and
                  Adam Beautement and
                  Martina Angela Sasse},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {70--82},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_5},
  doi          = {10.1007/978-3-642-41320-9\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KirlapposBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ZhouYSQ13,
  author       = {Yuanyuan Zhou and
                  Yu Yu and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {On the Need of Physical Security for Small Embedded Devices: {A} Case
                  Study with {COMP128-1} Implementations in {SIM} Cards},
  booktitle    = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  pages        = {230--238},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1\_20},
  doi          = {10.1007/978-3-642-39884-1\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ZhouYSQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indin/RayAGBT13,
  author       = {Apala Ray and
                  Johan {\AA}kerberg and
                  Mikael Gidlund and
                  Mats Bj{\"{o}}rkman and
                  Christophe Tremlet},
  title        = {Reusability assessment of financial card readers' security mechanisms
                  in process control devices},
  booktitle    = {11th {IEEE} International Conference on Industrial Informatics, {INDIN}
                  2013, Bochum, Germany, July 29-31, 2013},
  pages        = {494--499},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INDIN.2013.6622934},
  doi          = {10.1109/INDIN.2013.6622934},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indin/RayAGBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/EsanNO13,
  author       = {Omobayo A. Esan and
                  S. M. Ngwira and
                  Isaac Olusegun Osunmakinde},
  editor       = {Hein S. Venter and
                  Marianne Loock and
                  Marijke Coetzee},
  title        = {Bimodal biometrics for financial infrastructure security},
  booktitle    = {2013 Information Security for South Africa, Johannesburg, South Africa,
                  August 14-16, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSA.2013.6641045},
  doi          = {10.1109/ISSA.2013.6641045},
  timestamp    = {Fri, 14 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issa/EsanNO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/BalboniKM13,
  author       = {Paolo Balboni and
                  Udo Kroon and
                  Milda Macenaite},
  editor       = {Helmut Reimer and
                  Norbert Pohlmann and
                  Wolfgang Schneider},
  title        = {Data Protection and Data Security by Design Applied to Financial Intelligence},
  booktitle    = {{ISSE} 2013 - Securing Electronic Business Processes, Highlights of
                  the Information Security Solutions Europe 2013 Conference, Brussels,
                  Belgium, October 22-23, 2013},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-658-03371-2\_7},
  doi          = {10.1007/978-3-658-03371-2\_7},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/BalboniKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istas/MushoreK13,
  author       = {Rutendo Mushore and
                  Michael Kyobe},
  title        = {Investigating the factors influencing information security compliance
                  in a financial services firm},
  booktitle    = {Social Implications of Wearable Computing and Augmediated Reality
                  in Everyday Life: 2013 {IEEE} International Symposium on Technology
                  and Society, {ISTAS} 2013, Toronto, ON, Canada, 27-29 June, 2013},
  pages        = {155--173},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISTAS.2013.6613115},
  doi          = {10.1109/ISTAS.2013.6613115},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/istas/MushoreK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocc/XuWYWZ13,
  author       = {Jiang{-}pei Xu and
                  Liji Wu and
                  Xiang{-}jun Yang and
                  Yu{-}zhong Wang and
                  Xiangmin Zhang},
  title        = {A security vulnerability of Java Card on array access in financial
                  system},
  booktitle    = {22nd Wireless and Optical Communication Conference, {WOCC} 2013, Chongqing,
                  China, May 16-18, 2013},
  pages        = {707--710},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WOCC.2013.6676466},
  doi          = {10.1109/WOCC.2013.6676466},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wocc/XuWYWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2013,
  editor       = {Ahmad{-}Reza Sadeghi},
  title        = {Financial Cryptography and Data Security - 17th International Conference,
                  {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7859},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39884-1},
  doi          = {10.1007/978-3-642-39884-1},
  isbn         = {978-3-642-39883-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2013w,
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9},
  doi          = {10.1007/978-3-642-41320-9},
  isbn         = {978-3-642-41319-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2013w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmms/LeeRNFJ12,
  author       = {Jong{-}Eun Roselyn Lee and
                  Shailendra Rao and
                  Clifford Nass and
                  Karin Forssell and
                  Jae Min John},
  title        = {When do online shoppers appreciate security enhancement efforts? Effects
                  of financial risk and security level on evaluations of customer authentication},
  journal      = {Int. J. Hum. Comput. Stud.},
  volume       = {70},
  number       = {5},
  pages        = {364--376},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ijhcs.2011.12.002},
  doi          = {10.1016/J.IJHCS.2011.12.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmms/LeeRNFJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irmj/ZafarKO12,
  author       = {Humayun Zafar and
                  Myung Ko and
                  Kweku{-}Muata Osei{-}Bryson},
  title        = {Financial Impact of Information Security Breaches on Breached Firms
                  and their Non-Breached Competitors},
  journal      = {Inf. Resour. Manag. J.},
  volume       = {25},
  number       = {1},
  pages        = {21--37},
  year         = {2012},
  url          = {https://doi.org/10.4018/irmj.2012010102},
  doi          = {10.4018/IRMJ.2012010102},
  timestamp    = {Tue, 30 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/irmj/ZafarKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LampeWMS12,
  author       = {Ulrich Lampe and
                  Olga Wenge and
                  Alexander M{\"{u}}ller and
                  Ralf Schaarschmidt},
  title        = {Cloud Computing in the Financial Industry - {A} Road Paved with Security
                  Pitfalls?},
  booktitle    = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle,
                  Washington, USA, August 9-11, 2012},
  publisher    = {Association for Information Systems},
  year         = {2012},
  url          = {http://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/4},
  timestamp    = {Thu, 21 Jun 2018 07:22:09 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/LampeWMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BenderDFK12,
  author       = {Jens Bender and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Marc Fischlin and
                  Dennis K{\"{u}}gler},
  editor       = {Angelos D. Keromytis},
  title        = {The PACE{\(\vert\)}AA Protocol for Machine Readable Travel Documents,
                  and Its Security},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {344--358},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_25},
  doi          = {10.1007/978-3-642-32946-3\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BenderDFK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Bohme12,
  author       = {Rainer B{\"{o}}hme},
  editor       = {Angelos D. Keromytis},
  title        = {Security Audits Revisited},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {129--147},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_11},
  doi          = {10.1007/978-3-642-32946-3\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Bohme12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BonneauPA12,
  author       = {Joseph Bonneau and
                  S{\"{o}}ren Preibusch and
                  Ross J. Anderson},
  editor       = {Angelos D. Keromytis},
  title        = {A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen
                  Banking PINs},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {25--40},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_3},
  doi          = {10.1007/978-3-642-32946-3\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BonneauPA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2011,
  editor       = {George Danezis},
  title        = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27576-0},
  doi          = {10.1007/978-3-642-27576-0},
  isbn         = {978-3-642-27575-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2011w,
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29889-9},
  doi          = {10.1007/978-3-642-29889-9},
  isbn         = {978-3-642-29888-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2011w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2012,
  editor       = {Angelos D. Keromytis},
  title        = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3},
  doi          = {10.1007/978-3-642-32946-3},
  isbn         = {978-3-642-32945-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2012w,
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5},
  doi          = {10.1007/978-3-642-34638-5},
  isbn         = {978-3-642-34637-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2012w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AycockBDD11,
  author       = {John Aycock and
                  Elizabeth Buchanan and
                  Scott D. Dexter and
                  David Dittrich},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer
                  Security Research},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {138--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_12},
  doi          = {10.1007/978-3-642-29889-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AycockBDD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChiaK11,
  author       = {Pern Hui Chia and
                  Svein Johan Knapskog},
  editor       = {George Danezis},
  title        = {Re-evaluating the Wisdom of Crowds in Assessing Web Security},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {299--314},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_25},
  doi          = {10.1007/978-3-642-27576-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChiaK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChristinEVG11,
  author       = {Nicolas Christin and
                  Serge Egelman and
                  Timothy Vidas and
                  Jens Grossklags},
  editor       = {George Danezis},
  title        = {It's All about the Benjamins: An Empirical Study on Incentivizing
                  Users to Ignore Security Advice},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_2},
  doi          = {10.1007/978-3-642-27576-0\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ChristinEVG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JohnsonBK11,
  author       = {Maritza L. Johnson and
                  Steven M. Bellovin and
                  Angelos D. Keromytis},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Computer Security Research with Human Subjects: Risks, Benefits and
                  Informed Consent},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {131--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_11},
  doi          = {10.1007/978-3-642-29889-9\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JohnsonBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NovakSMH11,
  author       = {Jay Novak and
                  Jonathan Stribley and
                  Kenneth Meagher and
                  J. Alex Halderman},
  editor       = {George Danezis},
  title        = {Absolute Pwnage: {A} Short Paper about the Security Risks of Remote
                  Administration Tools},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {77--84},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_6},
  doi          = {10.1007/978-3-642-27576-0\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/NovakSMH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/PlotzN11,
  author       = {Henryk Pl{\"{o}}tz and
                  Karsten Nohl},
  editor       = {George Danezis},
  title        = {Peeling Away Layers of an {RFID} Security System},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_17},
  doi          = {10.1007/978-3-642-27576-0\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/PlotzN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RobinsonH11,
  author       = {David G. Robinson and
                  J. Alex Halderman},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Ethical Issues in E-Voting Security Analysis},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_10},
  doi          = {10.1007/978-3-642-29889-9\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RobinsonH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ichit/BaekP11,
  author       = {Jong{-}Il Baek and
                  Dea{-}Woo Park},
  editor       = {Geuk Lee and
                  Daniel Howard and
                  Dominik Slezak},
  title        = {A Study of Disaster Preparedness Systems Operations Analysis and Financial
                  Security Measures of Large Banking Network},
  booktitle    = {Convergence and Hybrid Information Technology - 5th International
                  Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {206},
  pages        = {167--173},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24106-2\_22},
  doi          = {10.1007/978-3-642-24106-2\_22},
  timestamp    = {Thu, 28 Dec 2017 16:02:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ichit/BaekP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BarthRSMSB10,
  author       = {Adam Barth and
                  Benjamin I. P. Rubinstein and
                  Mukund Sundararajan and
                  John C. Mitchell and
                  Dawn Song and
                  Peter L. Bartlett},
  editor       = {Radu Sion},
  title        = {A Learning-Based Approach to Reactive Security},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_16},
  doi          = {10.1007/978-3-642-14577-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BarthRSMSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Caballero-GilMCH10,
  author       = {Pino Caballero{-}Gil and
                  Jezabel Molina{-}Gil and
                  C{\'{a}}ndido Caballero{-}Gil and
                  Candelaria Hern{\'{a}}ndez{-}Goya},
  editor       = {Radu Sion},
  title        = {Poster Abstract: Security in Commercial Applications of Vehicular
                  Ad-Hoc Networks},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {427},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_41},
  doi          = {10.1007/978-3-642-14577-3\_41},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/Caballero-GilMCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Cranor10,
  author       = {Lorrie Faith Cranor},
  editor       = {Radu Sion},
  title        = {Users Do the Darndest Things: True Stories from the CyLab Usable Privacy
                  and Security Laboratory},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {3},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_3},
  doi          = {10.1007/978-3-642-14577-3\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Cranor10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Cranor10a,
  author       = {Lorrie Faith Cranor},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {Ethical Concerns in Computer Security and Privacy Research Involving
                  Human Subjects},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {247--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_23},
  doi          = {10.1007/978-3-642-14992-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Cranor10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Fleischmann10,
  author       = {Kenneth R. Fleischmann},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {Preaching What We Practice: Teaching Ethical Decision-Making to Computer
                  Security Professionals},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {197--202},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_18},
  doi          = {10.1007/978-3-642-14992-4\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Fleischmann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GrossklagsJC10,
  author       = {Jens Grossklags and
                  Benjamin Johnson and
                  Nicolas Christin},
  editor       = {Radu Sion},
  title        = {When Information Improves Information Security},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {416--423},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_37},
  doi          = {10.1007/978-3-642-14577-3\_37},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/GrossklagsJC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Hubaux10,
  author       = {Jean{-}Pierre Hubaux},
  editor       = {Radu Sion},
  title        = {Security Mechanisms with Selfish Players in Wireless Networks},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {2},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_2},
  doi          = {10.1007/978-3-642-14577-3\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Hubaux10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KenneallyBM10,
  author       = {Erin Kenneally and
                  Michael D. Bailey and
                  Douglas Maughan},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {A Framework for Understanding and Applying Ethical Principles in Network
                  and Security Research},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {240--246},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_22},
  doi          = {10.1007/978-3-642-14992-4\_22},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KenneallyBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MatsuoMOB10,
  author       = {Shin'ichiro Matsuo and
                  Kunihiko Miyazaki and
                  Akira Otsuka and
                  David A. Basin},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {How to Evaluate the Security of Real-Life Cryptographic Protocols?
                  - The Cases of {ISO/IEC} 29128 and {CRYPTREC}},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_16},
  doi          = {10.1007/978-3-642-14992-4\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MatsuoMOB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RuhrmairJHACS10,
  author       = {Ulrich R{\"{u}}hrmair and
                  Christian Jaeger and
                  Christian Hilgers and
                  Michael Algasinger and
                  Gy{\"{o}}rgy Csaba and
                  Martin Stutzmann},
  editor       = {Radu Sion},
  title        = {Security Applications of Diodes with Unique Current-Voltage Characteristics},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {328--335},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_26},
  doi          = {10.1007/978-3-642-14577-3\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/RuhrmairJHACS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Sassaman10,
  author       = {Len Sassaman},
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {Ethical Guidelines for Computer Security Researchers: "Be Reasonable"},
  booktitle    = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  pages        = {250--255},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4\_24},
  doi          = {10.1007/978-3-642-14992-4\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Sassaman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/BaldoniLCDMM10,
  author       = {Roberto Baldoni and
                  Giorgia Lodi and
                  Gregory V. Chockler and
                  Eliezer Dekel and
                  Barry P. Mulcahy and
                  Giuseppe Martufi},
  editor       = {Joaquim Filipe and
                  Jos{\'{e}} Cordeiro},
  title        = {A Contract-based Event Driven Model for Collaborative Security in
                  Financial Information Systems},
  booktitle    = {{ICEIS} 2010 - Proceedings of the 12th International Conference on
                  Enterprise Information Systems, Volume 4, SAIC, Funchal, Madeira,
                  Portugal, June 8 - 12, 2010},
  pages        = {147--152},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 14 Mar 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/BaldoniLCDMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/Bollag10,
  author       = {Josef Bollag},
  editor       = {Mark Last and
                  Abraham Kandel},
  title        = {World Financial Crisis and its Influence on Terror Financing},
  booktitle    = {Web Intelligence and Security - Advances in Data and Text Mining Techniques
                  for Detecting and Preventing Terrorist Activities on the Web},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {27},
  pages        = {13--18},
  publisher    = {{IOS} Press},
  year         = {2010},
  url          = {https://doi.org/10.3233/978-1-60750-611-9-13},
  doi          = {10.3233/978-1-60750-611-9-13},
  timestamp    = {Tue, 16 May 2017 14:24:21 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/Bollag10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010,
  editor       = {Radu Sion},
  title        = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3},
  doi          = {10.1007/978-3-642-14577-3},
  isbn         = {978-3-642-14576-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010w,
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4},
  doi          = {10.1007/978-3-642-14992-4},
  isbn         = {978-3-642-14991-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2010w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:reference/crc/2010fcs,
  editor       = {Burton Rosenberg},
  title        = {Handbook of Financial Cryptography and Security},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823},
  doi          = {10.1201/9781420059823},
  isbn         = {978-1-4200-5981-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/2010fcs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Barni010,
  author       = {Mauro Barni and
                  Stefan Katzenbeisser},
  editor       = {Burton Rosenberg},
  title        = {Digital Watermarking},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {391--435},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c14},
  doi          = {10.1201/9781420059823-C14},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Barni010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Belenkiy10,
  author       = {Mira Belenkiy},
  editor       = {Burton Rosenberg},
  title        = {E-Cash},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {3--48},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c1},
  doi          = {10.1201/9781420059823-C1},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Belenkiy10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Brandt10,
  author       = {Felix Brandt},
  editor       = {Burton Rosenberg},
  title        = {Auctions},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {49--58},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c2},
  doi          = {10.1201/9781420059823-C2},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Brandt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Coventry10,
  author       = {Lynne M. Coventry},
  editor       = {Burton Rosenberg},
  title        = {Human Factors},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {497--519},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c17},
  doi          = {10.1201/9781420059823-C17},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Coventry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/DanezisDS10,
  author       = {George Danezis and
                  Claudia D{\'{\i}}az and
                  Paul F. Syverson},
  editor       = {Burton Rosenberg},
  title        = {Anonymous Communication},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {341--389},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c13},
  doi          = {10.1201/9781420059823-C13},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/DanezisDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/DashtiM10,
  author       = {Mohammad Torabi Dashti and
                  Sjouke Mauw},
  editor       = {Burton Rosenberg},
  title        = {Fair Exchange},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {109--132},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c5},
  doi          = {10.1201/9781420059823-C5},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/DashtiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Ellison10,
  author       = {Carl M. Ellison},
  editor       = {Burton Rosenberg},
  title        = {Public Key Infrastructure},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {455--493},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c16},
  doi          = {10.1201/9781420059823-C16},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Ellison10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Jackson10,
  author       = {Margaret Jackson},
  editor       = {Burton Rosenberg},
  title        = {Legal Issues},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {521--554},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c18},
  doi          = {10.1201/9781420059823-C18},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Jackson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/JakobssonSS10,
  author       = {Markus Jakobsson and
                  Sid Stamm and
                  Christopher Soghoian},
  editor       = {Burton Rosenberg},
  title        = {Phishing},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {301--339},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c12},
  doi          = {10.1201/9781420059823-C12},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/JakobssonSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Kiayias10,
  author       = {Aggelos Kiayias},
  editor       = {Burton Rosenberg},
  title        = {Electronic Voting},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {59--81},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c3},
  doi          = {10.1201/9781420059823-C3},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Kiayias10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Parhonyi10,
  author       = {R{\'{o}}bert P{\'{a}}rhonyi},
  editor       = {Burton Rosenberg},
  title        = {Micropayment Systems},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {163--191},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c7},
  doi          = {10.1201/9781420059823-C7},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Parhonyi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Pehlivanoglu10,
  author       = {Serdar Pehlivanoglu},
  editor       = {Burton Rosenberg},
  title        = {Broadcast and Content Distribution},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {133--159},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c6},
  doi          = {10.1201/9781420059823-C6},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Pehlivanoglu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/SadeghiW10,
  author       = {Ahmad{-}Reza Sadeghi and
                  Christian Wachsmann},
  editor       = {Burton Rosenberg},
  title        = {Trusted Computing},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {221--256},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c9},
  doi          = {10.1201/9781420059823-C9},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/SadeghiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Safavi-NainiS10,
  author       = {Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard},
  editor       = {Burton Rosenberg},
  title        = {Digital Rights Management},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {193--220},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c8},
  doi          = {10.1201/9781420059823-C8},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Safavi-NainiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/SionW10,
  author       = {Radu Sion and
                  Marianne Winslett},
  editor       = {Burton Rosenberg},
  title        = {Regulatory Compliance},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {555--584},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c19},
  doi          = {10.1201/9781420059823-C19},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/SionW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Smith10,
  author       = {Sean Smith},
  editor       = {Burton Rosenberg},
  title        = {Hardware Security Modules},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {257--278},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c10},
  doi          = {10.1201/9781420059823-C10},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Smith10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Szydlo10,
  author       = {Michael Szydlo},
  editor       = {Burton Rosenberg},
  title        = {Portfolio Trading},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {279--297},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c11},
  doi          = {10.1201/9781420059823-C11},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Szydlo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Wilton10,
  author       = {Robin Wilton},
  editor       = {Burton Rosenberg},
  title        = {Identity Management},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {437--453},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c15},
  doi          = {10.1201/9781420059823-C15},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/Wilton10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/Zhou10,
  author       = {Jianying Zhou},
  editor       = {Burton Rosenberg},
  title        = {Non-Repudiation},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {83--108},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c4},
  doi          = {10.1201/9781420059823-C4},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/crc/Zhou10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/Ifinedo09,
  author       = {Princely Ifinedo},
  title        = {Information Technology Security Concerns in Global Financial Services
                  Institutions: Do Socio-Economic Factors Differentiate Perceptions?},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {68--83},
  year         = {2009},
  url          = {https://doi.org/10.4018/jisp.2009040105},
  doi          = {10.4018/JISP.2009040105},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/Ifinedo09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Ifinedo09,
  author       = {Princely Ifinedo},
  title        = {Information technology security management concerns in global financial
                  services institutions: Is national culture a differentiator?},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {17},
  number       = {5},
  pages        = {372--387},
  year         = {2009},
  url          = {https://doi.org/10.1108/09685220911006678},
  doi          = {10.1108/09685220911006678},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Ifinedo09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/riga/KryukovS09,
  author       = {Dmitry Kryukov and
                  Raimonds Strauss},
  title        = {Information security governance as key performance indicator for financial
                  institutions},
  journal      = {Sci. J. Riga Tech. Univ. Ser. Comput. Sci.},
  volume       = {38},
  pages        = {161--167},
  year         = {2009},
  url          = {https://doi.org/10.2478/v10143-009-0014-x},
  doi          = {10.2478/V10143-009-0014-X},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/riga/KryukovS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/ZafarA09,
  author       = {Humayun Zafar and
                  Yoris A. Au},
  editor       = {Robert C. Nickerson and
                  Ramesh Sharda},
  title        = {The Economic Ramifications of Strategic {IT} Security Information
                  Sharing in the Financial Services Industry},
  booktitle    = {Proceedings of the 15th Americas Conference on Information Systems,
                  {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009},
  pages        = {281},
  publisher    = {Association for Information Systems},
  year         = {2009},
  url          = {http://aisel.aisnet.org/amcis2009/281},
  timestamp    = {Mon, 02 Jan 2012 19:01:22 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/ZafarA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FultzG09,
  author       = {Neal Fultz and
                  Jens Grossklags},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Blue versus Red: Towards a Model of Distributed Security Attacks},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {167--183},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_10},
  doi          = {10.1007/978-3-642-03549-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FultzG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/IoannidisPW09,
  author       = {Christos Ioannidis and
                  David J. Pym and
                  Julian Williams},
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Investments and Trade-offs in the Economics of Information Security},
  booktitle    = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  pages        = {148--166},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4\_9},
  doi          = {10.1007/978-3-642-03549-4\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/IoannidisPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interaction/SaghafiNE09,
  author       = {Fatemeh Saghafi and
                  Fatemeh NasserEslami and
                  Maryam Esmaili},
  editor       = {Sungwon Sohn and
                  Ling Chen and
                  Soonwook Hwang and
                  Kyungeun Cho and
                  Shigeo Kawata and
                  Kyhyun Um and
                  Franz I. S. Ko and
                  Kae{-}Dal Kwack and
                  Jong Hyung Lee and
                  Gang Kou and
                  Kiyoshi Nakamura and
                  Alvis Cheuk M. Fong and
                  Patrick C. M. Ma},
  title        = {Ranking secure technologies in security provision financial transactions
                  mobile commerce},
  booktitle    = {Proceedings of the 2nd International Conference on Interaction Sciences:
                  Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea,
                  24-26 November 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {403},
  pages        = {331--336},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655925.1655986},
  doi          = {10.1145/1655925.1655986},
  timestamp    = {Sun, 28 Feb 2021 18:18:34 +0100},
  biburl       = {https://dblp.org/rec/conf/interaction/SaghafiNE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2009,
  editor       = {Roger Dingledine and
                  Philippe Golle},
  title        = {Financial Cryptography and Data Security, 13th International Conference,
                  {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5628},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03549-4},
  doi          = {10.1007/978-3-642-03549-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SingletonS08,
  author       = {Tommie W. Singleton and
                  Aaron J. Singleton},
  title        = {The Potential for a Synergistic Relationship Between Information Security
                  and a Financial Audit},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {17},
  number       = {2},
  pages        = {80--86},
  year         = {2008},
  url          = {https://doi.org/10.1080/19393550801983783},
  doi          = {10.1080/19393550801983783},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/SingletonS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kybernetes/HuangWZ08,
  author       = {Xiangzhao Huang and
                  Hu Wan and
                  Hongtao Zhou},
  title        = {The synergetic model of the controlling tactics to network financial
                  information security},
  journal      = {Kybernetes},
  volume       = {37},
  number       = {9/10},
  pages        = {1393--1400},
  year         = {2008},
  url          = {https://doi.org/10.1108/03684920810907698},
  doi          = {10.1108/03684920810907698},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kybernetes/HuangWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HuangD08,
  author       = {Ken Huang and
                  Paul Douthit},
  editor       = {Gene Tsudik},
  title        = {ST{\&}E Is the Most Cost Effective Measure for Comply with Payment
                  Card Industry {(PCI)} Data Security Standard},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {321--322},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_32},
  doi          = {10.1007/978-3-540-85230-8\_32},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HuangD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isse/FibikovaM08,
  author       = {Lenka Fib{\'{\i}}kov{\'{a}} and
                  Roland M{\"{u}}ller},
  editor       = {Norbert Pohlmann and
                  Helmut Reimer and
                  Wolfgang Schneider},
  title        = {The Information Security Framework for Daimler Financial Services
                  and its Implementation},
  booktitle    = {{ISSE} 2008 - Securing Electronic Busines Processes, Highlights of
                  the Information Security Solutions Europe 2008 Conference, 7-9 October
                  2008, Madrid, Spain},
  pages        = {3--19},
  publisher    = {Vieweg+Teubner},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-8348-9283-6\_1},
  doi          = {10.1007/978-3-8348-9283-6\_1},
  timestamp    = {Wed, 24 Apr 2019 16:36:13 +0200},
  biburl       = {https://dblp.org/rec/conf/isse/FibikovaM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/Ifinedo08,
  author       = {Princely Ifinedo},
  editor       = {Larry Korba and
                  Stephen Marsh and
                  Reihaneh Safavi{-}Naini},
  title        = {{IT} Security and Privacy Issues in Global Financial Services Institutions:
                  Do Socio-Economic and Cultural Factors Matter?},
  booktitle    = {Sixth Annual Conference on Privacy, Security and Trust, {PST} 2008,
                  October 1-3, 2008, Fredericton, New Brunswick, Canada},
  pages        = {75--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PST.2008.24},
  doi          = {10.1109/PST.2008.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/Ifinedo08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wkdd/XiaBP08,
  author       = {Bin Xia and
                  Hui Bai and
                  Bin Pan},
  title        = {Research of Information Technology Security in the Financial Industry},
  booktitle    = {Proceedings of the International Workshop on Knowledge Discovery and
                  Data Mining, {WKDD} 2008, Adelaide, Australia, 23-24 January 2008},
  pages        = {477--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WKDD.2008.55},
  doi          = {10.1109/WKDD.2008.55},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wkdd/XiaBP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2007,
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77366-5},
  doi          = {10.1007/978-3-540-77366-5},
  isbn         = {978-3-540-77365-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2008,
  editor       = {Gene Tsudik},
  title        = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8},
  doi          = {10.1007/978-3-540-85230-8},
  isbn         = {978-3-540-85229-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AsgharpourLC07,
  author       = {Farzaneh Asgharpour and
                  Debin Liu and
                  L. Jean Camp},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Mental Models of Security Risks},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {367--377},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_34},
  doi          = {10.1007/978-3-540-77366-5\_34},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AsgharpourLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Desmedt07,
  author       = {Yvo Desmedt},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Position Statement in {RFID} S{\&}P Panel: From Relative Security
                  to Perceived Secure},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {53--56},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_8},
  doi          = {10.1007/978-3-540-77366-5\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Desmedt07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Fu07,
  author       = {Kevin Fu},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Panel: {RFID} Security and Privacy},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {45},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_5},
  doi          = {10.1007/978-3-540-77366-5\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Fu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jutla07,
  author       = {Dawn N. Jutla},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Usable {SPACE:} Security, Privacy, and Context for the Mobile User},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {245},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_22},
  doi          = {10.1007/978-3-540-77366-5\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Jutla07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KuoWP07,
  author       = {Cynthia Kuo and
                  Jesse Walker and
                  Adrian Perrig},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth
                  Simple Pairing and Wi-Fi Protected Setup},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {325--340},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_30},
  doi          = {10.1007/978-3-540-77366-5\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KuoWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MitchellK07,
  author       = {April Slayden Mitchell and
                  Alan H. Karp},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Improving Usability by Adding Security to Video Conferencing Systems},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {378--382},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_35},
  doi          = {10.1007/978-3-540-77366-5\_35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MitchellK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/PagterP07,
  author       = {Jakob Illeborg Pagter and
                  Marianne Graves Petersen},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {A Sense of Security in Pervasive Computing - Is the Light on When
                  the Refrigerator Door Is Closed?},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {383--388},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_36},
  doi          = {10.1007/978-3-540-77366-5\_36},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/PagterP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tele/ChangHYH06,
  author       = {I{-}Chiu Chang and
                  Hsin{-}Ginn Hwang and
                  David C. Yen and
                  Hen{-}Yi Huang},
  title        = {An empirical study of the factors affecting Internet security for
                  the financial industry in Taiwan},
  journal      = {Telematics Informatics},
  volume       = {23},
  number       = {4},
  pages        = {343--364},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tele.2005.11.001},
  doi          = {10.1016/J.TELE.2005.11.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tele/ChangHYH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2006,
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663},
  doi          = {10.1007/11889663},
  isbn         = {3-540-46255-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/KeshR05,
  author       = {Someswar Kesh and
                  M. K. Raja},
  title        = {Development of a qualitative reasoning model for financial forecasting},
  journal      = {Inf. Manag. Comput. Security},
  volume       = {13},
  number       = {2},
  pages        = {167--179},
  year         = {2005},
  url          = {https://doi.org/10.1108/09685220510582638},
  doi          = {10.1108/09685220510582638},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/KeshR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/Locher05,
  author       = {Christian Locher},
  editor       = {Dieter Bartmann and
                  Federico Rajola and
                  Jannis Kallinikos and
                  David E. Avison and
                  Robert Winter and
                  Phillip Ein{-}Dor and
                  J{\"{o}}rg Becker and
                  Freimut Bodendorf and
                  Christof Weinhardt},
  title        = {Methodologies for Evaluating Information Security Investments - What
                  Basel {II} Can Change in the Financial Industry},
  booktitle    = {Proceedings of the 13th European Conference on Information Systems,
                  Information Systems in a Rapidly Changing Economy, {ECIS} 2005, Regensburg,
                  Germany, May 26-28, 2005},
  pages        = {1561--1572},
  year         = {2005},
  url          = {http://aisel.aisnet.org/ecis2005/122},
  timestamp    = {Wed, 24 Jul 2019 16:44:04 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/Locher05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Friedman05,
  author       = {Allan Friedman},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Panel Summary: Incentives, Markets and Information Security},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {372--373},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_33},
  doi          = {10.1007/11507840\_33},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Friedman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TuylsSSAO05,
  author       = {Pim Tuyls and
                  Boris Skoric and
                  S. Stallinga and
                  Anton H. M. Akkermans and
                  W. Ophey},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Information-Theoretic Security Analysis of Physical Uncloneable Functions},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_15},
  doi          = {10.1007/11507840\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TuylsSSAO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Ghernaouti-Helie05,
  author       = {Solange Ghernaouti{-}Helie and
                  Mohamed Ali Sfaxi},
  editor       = {Joaquim Filipe and
                  Helder Coelhas and
                  M{\'{o}}nica Saramago},
  title        = {Guaranteerring Security of Financial Transaction by Using Quantum
                  Cryptography in Banking Environment},
  booktitle    = {E-business and Telecommunication Networks - Second International Conference,
                  {ICETE} 2005, Reading, UK, October 3-7, 2005. Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {3},
  pages        = {139--149},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-75993-5\_12},
  doi          = {10.1007/978-3-540-75993-5\_12},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/Ghernaouti-Helie05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Ghernaouti-HelieS05,
  author       = {Solange Ghernaouti{-}Helie and
                  Mohamed Ali Sfaxi},
  editor       = {Joaquim Filipe and
                  Luminita Vasiu},
  title        = {Guaranteerring security of financial transaction by using quantum
                  cryptography in banking environment},
  booktitle    = {{ICETE} 2005 - Proceedings of the Second International Conference
                  on e-Business and Telecommunication Networks, Reading, UK, October
                  3-7, 2005},
  pages        = {268--274},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Tue, 07 Nov 2006 14:13:57 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/Ghernaouti-HelieS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issa/Baloyi05,
  author       = {Norman Tinyiko Baloyi},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Mariki M. Eloff and
                  Hein S. Venter},
  title        = {Analysis of the financial institutions' strategic e-business security
                  solutions: Technical and non-Technical},
  booktitle    = {Proceedings of the {ISSA} 2005 New Knowledge Today Conference, 29
                  June - 1 July 2005, Balalaika Hotel, Sandton, South Africa},
  pages        = {1--12},
  publisher    = {ISSA, Pretoria, South Africa},
  year         = {2005},
  url          = {http://icsa.cs.up.ac.za/issa/2005/Proceedings/Full/080\_Article.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issa/Baloyi05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/05/PietruszkiewiczR05,
  author       = {Wieslaw Pietruszkiewicz and
                  Leonard Rozenberg},
  editor       = {Khalid Saeed and
                  Jerzy Pejas},
  title        = {Financial Distress Prediction Using Different Pattern Recognition
                  Methods},
  booktitle    = {Information Processing and Security Systems},
  pages        = {103--111},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-26325-X\_11},
  doi          = {10.1007/0-387-26325-X\_11},
  timestamp    = {Sun, 02 Jun 2019 20:42:31 +0200},
  biburl       = {https://dblp.org/rec/books/sp/05/PietruszkiewiczR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2005,
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137875},
  doi          = {10.1007/B137875},
  isbn         = {3-540-26656-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMicec/AgrawalPPRU04,
  author       = {Manish Agrawal and
                  Hemant Padmanabhan and
                  Lokesh Pandey and
                  H. Raghav Rao and
                  Shambhu J. Upadhyaya},
  editor       = {Marijn Janssen and
                  Henk G. Sol and
                  Ren{\'{e}} W. Wagenaar},
  title        = {A conceptual approach to information security in financial account
                  aggregation},
  booktitle    = {Proceedings of the 6th International Conference on Electronic Commerce,
                  {ICEC} 2004, Delft, The Netherlands, October 25-27, 2004},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {60},
  pages        = {619--626},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1052220.1052299},
  doi          = {10.1145/1052220.1052299},
  timestamp    = {Fri, 08 Sep 2023 14:37:35 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMicec/AgrawalPPRU04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Camp04,
  author       = {L. Jean Camp},
  editor       = {Ari Juels},
  title        = {Mental Models of Computer Security},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {106--111},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_12},
  doi          = {10.1007/978-3-540-27809-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Camp04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Patrick04,
  author       = {Andrew S. Patrick},
  editor       = {Ari Juels},
  title        = {Usability and Acceptability of Biometric Security Systems},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {105},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_11},
  doi          = {10.1007/978-3-540-27809-2\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Patrick04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Pugh04,
  author       = {Simon Pugh},
  editor       = {Ari Juels},
  title        = {PayPass Security and Risk (Abstract)},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {70--71},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_8},
  doi          = {10.1007/978-3-540-27809-2\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Pugh04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Yurick04,
  author       = {William Yurcik},
  editor       = {Ari Juels},
  title        = {Visualization Tools for Security Administrators},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {112--113},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_13},
  doi          = {10.1007/978-3-540-27809-2\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Yurick04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijstm/Shoniregun03,
  author       = {Charles A. Shoniregun},
  title        = {Are existing internet security measures guaranteed to protect user
                  identity in the financial services industry?},
  journal      = {Int. J. Serv. Technol. Manag.},
  volume       = {4},
  number       = {2},
  pages        = {194--216},
  year         = {2003},
  url          = {https://doi.org/10.1504/IJSTM.2003.002579},
  doi          = {10.1504/IJSTM.2003.002579},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijstm/Shoniregun03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/GargCH03,
  author       = {Ashish Garg and
                  Jeffrey Curtis and
                  Hilary Halper},
  title        = {Quantifying the financial impact of {IT} security breaches},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {74--83},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310468646},
  doi          = {10.1108/09685220310468646},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/GargCH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GargCH03,
  author       = {Ashish Garg and
                  Jeffrey Curtis and
                  Hilary Halper},
  title        = {The Financial Impact of {IT} Security Breaches: What Do Investors
                  Think?},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {12},
  number       = {1},
  pages        = {22--33},
  year         = {2003},
  url          = {https://doi.org/10.1201/1086/43325.12.1.20030301/41478.5},
  doi          = {10.1201/1086/43325.12.1.20030301/41478.5},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GargCH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Odlyzko03a,
  author       = {Andrew M. Odlyzko},
  editor       = {Rebecca N. Wright},
  title        = {Economics, Psychology, and Sociology of Security},
  booktitle    = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {182--189},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6\_13},
  doi          = {10.1007/978-3-540-45126-6\_13},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/Odlyzko03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/SchechterS03,
  author       = {Stuart E. Schechter and
                  Michael D. Smith},
  editor       = {Rebecca N. Wright},
  title        = {How Much Security Is Enough to Stop a Thief?: The Economics of Outsider
                  Theft via Computer Systems and Networks},
  booktitle    = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6\_9},
  doi          = {10.1007/978-3-540-45126-6\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/SchechterS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/Mayhew02,
  author       = {Stewart Mayhew},
  editor       = {Jane L. Snowdon and
                  John M. Charnes},
  title        = {Problems in financial engineering: security price dynamics and simulation
                  in financial engineering},
  booktitle    = {Proceedings of the 34th Winter Simulation Conference: Exploring New
                  Frontiers, San Diego, California, USA, December 8-11, 2002},
  pages        = {1568--1574},
  publisher    = {{WSC}},
  year         = {2002},
  url          = {https://doi.org/10.1109/WSC.2002.1166434},
  doi          = {10.1109/WSC.2002.1166434},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsc/Mayhew02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BellareNPS01,
  author       = {Mihir Bellare and
                  Chanathip Namprempre and
                  David Pointcheval and
                  Michael Semanko},
  editor       = {Paul F. Syverson},
  title        = {The Power of {RSA} Inversion Oracles and the Security of Chaum's RSA-Based
                  Blind Signature Scheme},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {309--328},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_25},
  doi          = {10.1007/3-540-46088-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BellareNPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JaulmesP01,
  author       = {{\'{E}}liane Jaulmes and
                  Guillaume Poupard},
  editor       = {Paul F. Syverson},
  title        = {On the Security of Homage Group Authentication Protocol},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {97--107},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_11},
  doi          = {10.1007/3-540-46088-8\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JaulmesP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Kravitz01,
  author       = {David W. Kravitz},
  editor       = {Paul F. Syverson},
  title        = {Aspects of Digital Rights Management and the Use of Hardware Security
                  Devices},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {45--49},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_5},
  doi          = {10.1007/3-540-46088-8\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Kravitz01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Tsiounis01,
  author       = {Yiannis Tsiounis},
  editor       = {Paul F. Syverson},
  title        = {A Security Framework for Card-Based Systems},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {201--222},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_19},
  doi          = {10.1007/3-540-46088-8\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Tsiounis01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Jolish00,
  author       = {Barak D. Jolish},
  editor       = {Yair Frankel},
  title        = {The Encryption Debate in Plaintext: National Security and Encryption
                  in the United States and Israel},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {202--224},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_15},
  doi          = {10.1007/3-540-45472-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Jolish00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Zane00,
  author       = {Francis Zane},
  editor       = {Yair Frankel},
  title        = {Efficient Watermark Detection and Collusion Security},
  booktitle    = {Financial Cryptography, 4th International Conference, {FC} 2000 Anguilla,
                  British West Indies, February 20-24, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1962},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45472-1\_2},
  doi          = {10.1007/3-540-45472-1\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Zane00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/GuptaCMV00,
  author       = {Mukul Gupta and
                  Alok R. Chaturvedi and
                  Shailendra Raj Mehta and
                  Lorenzo Valeri},
  editor       = {Soon Ang and
                  Helmut Krcmar and
                  Wanda J. Orlikowski and
                  Peter Weill and
                  Janice I. DeGross},
  title        = {The experimental analysis of information security management issues
                  for online financial services},
  booktitle    = {Proceedings of the Twenty-First International Conference on Information
                  Systems, {ICIS} 2000, Brisbane, Australia, December 10-13, 2000},
  pages        = {667--675},
  publisher    = {Association for Information Systems},
  year         = {2000},
  url          = {http://aisel.aisnet.org/icis2000/73},
  timestamp    = {Wed, 28 Nov 2018 12:57:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/GuptaCMV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-1/Stanley99,
  author       = {Terry Stanley},
  editor       = {Jan H. P. Eloff and
                  Les Labuschagne and
                  Rossouw von Solms and
                  Jan Verschuren},
  title        = {Designing a Secure System for Implementing Chip Cards in the Financial
                  Services Industry},
  booktitle    = {Information Security Management {\&} Small Systems Security, {IFIP}
                  {TC11} {WG11.1/WG11.2} Seventh Annual Working Conference on Information
                  Security Management {\&} Small Systems Security, September 30
                  - October 1, 1999, Amsterdam, The Netherlands},
  series       = {{IFIP} Conference Proceedings},
  volume       = {154},
  pages        = {213--220},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Mon, 14 Oct 2002 13:57:28 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-1/Stanley99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MathesonMSTZ98,
  author       = {Lesley R. Matheson and
                  Stephen G. Mitchell and
                  Talal Shamoon and
                  Robert Endre Tarjan and
                  Francis Zane},
  editor       = {Rafael Hirschfeld},
  title        = {Robustness and Security of Digital Watermarks},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {227--240},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055486},
  doi          = {10.1007/BFB0055486},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MathesonMSTZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FranklinM97,
  author       = {Matthew K. Franklin and
                  Dahlia Malkhi},
  editor       = {Rafael Hirschfeld},
  title        = {Auditable Metering with Lightweight Security},
  booktitle    = {Financial Cryptography, First International Conference, {FC} '97,
                  Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {151--160},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63594-7\_75},
  doi          = {10.1007/3-540-63594-7\_75},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FranklinM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Goldstein97,
  author       = {Theodore C. Goldstein},
  editor       = {Rafael Hirschfeld},
  title        = {The Gateway Security Model in the Java Electronic Commerce Framework},
  booktitle    = {Financial Cryptography, First International Conference, {FC} '97,
                  Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {340--354},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63594-7\_90},
  doi          = {10.1007/3-540-63594-7\_90},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Goldstein97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Lelieveldt97,
  author       = {Simon L. Lelieveldt},
  editor       = {Rafael Hirschfeld},
  title        = {Evaluating the Security of Electronic Money},
  booktitle    = {Financial Cryptography, First International Conference, {FC} '97,
                  Anguilla, British West Indies, February 24-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1318},
  pages        = {91--94},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63594-7\_69},
  doi          = {10.1007/3-540-63594-7\_69},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Lelieveldt97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/Geer94,
  author       = {Daniel E. Geer Jr.},
  title        = {Breaking into Banks: Security Lessons Learned from Financial Services},
  booktitle    = {Proceedings of the 8th Conference on Systems Administration {(LISA}
                  1994), San Diego, California, USA, September 19-23, 1994},
  publisher    = {{USENIX}},
  year         = {1994},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lisa/Geer94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X93cl,
  title        = {Controlling computer security: {A} guide for financial institutions:
                  by James Essinger {(FT} Business Information Ltd, 1992 {ISBN} 1-85334-163-0)},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {9},
  number       = {5},
  pages        = {226},
  year         = {1993},
  url          = {https://doi.org/10.1016/0267-3649(93)90021-E},
  doi          = {10.1016/0267-3649(93)90021-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X93cl.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/X92aq,
  title        = {Information security in financial services: by Ken Slater, 1991 (Hardcover)(MacMillan
                  - Stockton Press), 275 pp, {ISBN} 0-333-54702-0},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {8},
  number       = {4},
  pages        = {165},
  year         = {1992},
  url          = {https://doi.org/10.1016/0267-3649(92)90032-5},
  doi          = {10.1016/0267-3649(92)90032-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/X92aq.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GaronO91,
  author       = {Gilles Garon and
                  Richard Outerbridge},
  title        = {Des Watch: an Examination of the Sufficiency of the Data Encryption
                  Standard for Financial Institution Information Security in the 1990's},
  journal      = {Cryptologia},
  volume       = {15},
  number       = {3},
  pages        = {177--193},
  year         = {1991},
  url          = {https://doi.org/10.1080/0161-119191865849},
  doi          = {10.1080/0161-119191865849},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GaronO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics