default search action
Search dblp for Publications
export results for "toc:db/conf/fc/fc2011w.bht:"
@proceedings{DBLP:conf/fc/2011w, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29889-9}, doi = {10.1007/978-3-642-29889-9}, isbn = {978-3-642-29888-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2011w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AycockBDD11, author = {John Aycock and Elizabeth Buchanan and Scott D. Dexter and David Dittrich}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {138--145}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_12}, doi = {10.1007/978-3-642-29889-9\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AycockBDD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BicakciAYO11, author = {Kemal Bicakci and Nart Bedin Atalay and Mustafa Yuceel and Paul C. van Oorschot}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Exploration and Field Study of a Password Manager Using Icon-Based Passwords}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {104--118}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_9}, doi = {10.1007/978-3-642-29889-9\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BicakciAYO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GuntherMS11, author = {Felix G{\"{u}}nther and Mark Manulis and Thorsten Strufe}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Cryptographic Treatment of Private User Profiles}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {40--54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_5}, doi = {10.1007/978-3-642-29889-9\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/GuntherMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HanataniOMSO11, author = {Yoshikazu Hanatani and Miyako Ohkubo and Shin'ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous {RFID} Authentication}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {70--87}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_7}, doi = {10.1007/978-3-642-29889-9\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/HanataniOMSO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HartungB11, author = {Daniel Hartung and Christoph Busch}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Biometric Transaction Authentication Protocol: Formal Model Verification and "Four-Eyes" Principle Extension}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {88--103}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_8}, doi = {10.1007/978-3-642-29889-9\_8}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/HartungB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HizverC11, author = {Jennia Hizver and Tzi{-}cker Chiueh}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {55--69}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_6}, doi = {10.1007/978-3-642-29889-9\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/HizverC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/IzuMNST11, author = {Tetsuya Izu and Yoshitaka Morikawa and Yasuyuki Nogami and Yumi Sakemi and Masahiko Takenaka}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Detailed Cost Estimation of {CNTW} Attack against {EMV} Signature Scheme}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {13--26}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_3}, doi = {10.1007/978-3-642-29889-9\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/IzuMNST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JohnsonBK11, author = {Maritza L. Johnson and Steven M. Bellovin and Angelos D. Keromytis}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {131--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_11}, doi = {10.1007/978-3-642-29889-9\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/JohnsonBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Kasper11, author = {Emilia K{\"{a}}sper}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Fast Elliptic Curve Cryptography in OpenSSL}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {27--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_4}, doi = {10.1007/978-3-642-29889-9\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Kasper11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KenneallySMC11, author = {Erin Kenneally and Angelos Stavrou and John McHugh and Nicolas Christin}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Moving Forward, Building an Ethics Community (Panel Statements)}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {178--183}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_16}, doi = {10.1007/978-3-642-29889-9\_16}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KenneallySMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MooreC11, author = {Tyler Moore and Richard Clayton}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Ethical Dilemmas in Take-Down Research}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {154--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_14}, doi = {10.1007/978-3-642-29889-9\_14}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MooreC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RobinsonH11, author = {David G. Robinson and J. Alex Halderman}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Ethical Issues in E-Voting Security Analysis}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {119--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_10}, doi = {10.1007/978-3-642-29889-9\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/RobinsonH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Shou11, author = {Darren Shou}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Ethical Considerations of Sharing Data for Cybersecurity Research}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {169--177}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_15}, doi = {10.1007/978-3-642-29889-9\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Shou11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Soghoian11, author = {Christopher Soghoian}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Enforced Community Standards for Research on Users of the Tor Anonymity Network}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {146--153}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_13}, doi = {10.1007/978-3-642-29889-9\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Soghoian11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/YuX11, author = {Ping Yu and Rui Xue}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Toward Real-Life Implementation of Signature Schemes from the Strong {RSA} Assumption}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {3--12}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_2}, doi = {10.1007/978-3-642-29889-9\_2}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/YuX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Yung11, author = {Moti Yung}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Cryptographic Protocols: From the Abstract to the Practical to the Actual}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {1--2}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_1}, doi = {10.1007/978-3-642-29889-9\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Yung11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.