Search dblp for Publications

export results for "toc:db/conf/fc/fc2011w.bht:"

 download as .bib file

@proceedings{DBLP:conf/fc/2011w,
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29889-9},
  doi          = {10.1007/978-3-642-29889-9},
  isbn         = {978-3-642-29888-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2011w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AycockBDD11,
  author       = {John Aycock and
                  Elizabeth Buchanan and
                  Scott D. Dexter and
                  David Dittrich},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer
                  Security Research},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {138--145},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_12},
  doi          = {10.1007/978-3-642-29889-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AycockBDD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BicakciAYO11,
  author       = {Kemal Bicakci and
                  Nart Bedin Atalay and
                  Mustafa Yuceel and
                  Paul C. van Oorschot},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Exploration and Field Study of a Password Manager Using Icon-Based
                  Passwords},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_9},
  doi          = {10.1007/978-3-642-29889-9\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BicakciAYO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GuntherMS11,
  author       = {Felix G{\"{u}}nther and
                  Mark Manulis and
                  Thorsten Strufe},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Cryptographic Treatment of Private User Profiles},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_5},
  doi          = {10.1007/978-3-642-29889-9\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/GuntherMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HanataniOMSO11,
  author       = {Yoshikazu Hanatani and
                  Miyako Ohkubo and
                  Shin'ichiro Matsuo and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {A Study on Computational Formal Verification for Practical Cryptographic
                  Protocol: The Case of Synchronous {RFID} Authentication},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_7},
  doi          = {10.1007/978-3-642-29889-9\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HanataniOMSO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HartungB11,
  author       = {Daniel Hartung and
                  Christoph Busch},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Biometric Transaction Authentication Protocol: Formal Model Verification
                  and "Four-Eyes" Principle Extension},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_8},
  doi          = {10.1007/978-3-642-29889-9\_8},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/HartungB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HizverC11,
  author       = {Jennia Hizver and
                  Tzi{-}cker Chiueh},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {An Introspection-Based Memory Scraper Attack against Virtualized Point
                  of Sale Systems},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_6},
  doi          = {10.1007/978-3-642-29889-9\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HizverC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/IzuMNST11,
  author       = {Tetsuya Izu and
                  Yoshitaka Morikawa and
                  Yasuyuki Nogami and
                  Yumi Sakemi and
                  Masahiko Takenaka},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Detailed Cost Estimation of {CNTW} Attack against {EMV} Signature
                  Scheme},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_3},
  doi          = {10.1007/978-3-642-29889-9\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/IzuMNST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JohnsonBK11,
  author       = {Maritza L. Johnson and
                  Steven M. Bellovin and
                  Angelos D. Keromytis},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Computer Security Research with Human Subjects: Risks, Benefits and
                  Informed Consent},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {131--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_11},
  doi          = {10.1007/978-3-642-29889-9\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JohnsonBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Kasper11,
  author       = {Emilia K{\"{a}}sper},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Fast Elliptic Curve Cryptography in OpenSSL},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_4},
  doi          = {10.1007/978-3-642-29889-9\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Kasper11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KenneallySMC11,
  author       = {Erin Kenneally and
                  Angelos Stavrou and
                  John McHugh and
                  Nicolas Christin},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Moving Forward, Building an Ethics Community (Panel Statements)},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {178--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_16},
  doi          = {10.1007/978-3-642-29889-9\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KenneallySMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MooreC11,
  author       = {Tyler Moore and
                  Richard Clayton},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Ethical Dilemmas in Take-Down Research},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {154--168},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_14},
  doi          = {10.1007/978-3-642-29889-9\_14},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MooreC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RobinsonH11,
  author       = {David G. Robinson and
                  J. Alex Halderman},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Ethical Issues in E-Voting Security Analysis},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_10},
  doi          = {10.1007/978-3-642-29889-9\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RobinsonH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Shou11,
  author       = {Darren Shou},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Ethical Considerations of Sharing Data for Cybersecurity Research},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {169--177},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_15},
  doi          = {10.1007/978-3-642-29889-9\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Shou11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Soghoian11,
  author       = {Christopher Soghoian},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Enforced Community Standards for Research on Users of the Tor Anonymity
                  Network},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {146--153},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_13},
  doi          = {10.1007/978-3-642-29889-9\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Soghoian11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/YuX11,
  author       = {Ping Yu and
                  Rui Xue},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Toward Real-Life Implementation of Signature Schemes from the Strong
                  {RSA} Assumption},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_2},
  doi          = {10.1007/978-3-642-29889-9\_2},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/YuX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Yung11,
  author       = {Moti Yung},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {Cryptographic Protocols: From the Abstract to the Practical to the
                  Actual},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_1},
  doi          = {10.1007/978-3-642-29889-9\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Yung11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}