default search action
15th Financial Cryptography 2011: Gros Islet, St. Lucia
- George Danezis:
Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7035, Springer 2012, ISBN 978-3-642-27575-3
Finacial Cryptography and Data Security (FC 2011)
- Rainer Böhme, Stefanie Pötzsch:
Collective Exposure: Peer Effects in Voluntary Disclosure of Personal Data. 1-15 - Nicolas Christin, Serge Egelman, Timothy Vidas, Jens Grossklags:
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice. 16-30 - Julien Freudiger, Reza Shokri, Jean-Pierre Hubaux:
Evaluating the Privacy Risk of Location-Based Services. 31-46 - Jeremy Clark, Urs Hengartner:
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance. 47-61 - Benedikt Westermann, Dogan Kesdogan:
Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. 62-76 - Jay Novak, Jonathan Stribley, Kenneth Meagher, J. Alex Halderman:
Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools. 77-84 - Ben Palmer, Kris Bubendorfer, Ian Welch:
A Protocol for Anonymously Establishing Digital Provenance in Reseller Chains (Short Paper). 85-92 - Philip Marquardt, David Dagon, Patrick Traynor:
Impeding Individual User Profiling in Shopper Loyalty Programs. 93-101 - Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. 102-112 - Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:
Authenticated Key Exchange under Bad Randomness. 113-126 - Martin Franz, Peter Williams, Bogdan Carbunar, Stefan Katzenbeisser, Andreas Peter, Radu Sion, Miroslava Sotáková:
Oblivious Outsourced Storage with Delegation. 127-140 - Rob Johnson, Leif Walsh, Michael Lamb:
Homomorphic Signatures for Digital Photographs. 141-157 - Femi G. Olumofin, Ian Goldberg:
Revisiting the Computational Practicality of Private Information Retrieval. 158-172 - Mohammed Ashraful Tuhin, Reihaneh Safavi-Naini:
Optimal One Round Almost Perfectly Secure Message Transmission (Short Paper). 173-181 - Oliver Spycher, Reto E. Koenig, Rolf Haenni, Michael Schläpfer:
A New Approach towards Coercion-Resistant Remote E-Voting in Linear Time. 182-189 - Ulrich Rührmair, Christian Jaeger, Michael Algasinger:
An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs. 190-204 - Henryk Plötz, Karsten Nohl:
Peeling Away Layers of an RFID Security System. 205-219 - Ross J. Anderson, Mike Bond, Omar Choudary, Steven J. Murdoch, Frank Stajano:
Might Financial Cryptography Kill Financial Innovation? - The Curious Case of EMV. 220-234 - Shujun Li, Ahmad-Reza Sadeghi, Sören Heisrath, Roland Schmitz, Junaid Jameel Ahmad:
hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers. 235-249 - Christopher Soghoian, Sid Stamm:
Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper). 250-259 - Damon McCoy, Jose Andre Morales, Kirill Levchenko:
Proximax: Measurement-Driven Proxy Dissemination (Short Paper). 260-267 - Peter Lofgren, Nicholas Hopper:
BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper). 268-275 - Martin Franz, Björn Deiseroth, Kay Hamacher, Somesh Jha, Stefan Katzenbeisser, Heike Schröder:
Towards Secure Bioinformatics Services (Short Paper). 276-283 - Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Quo Vadis? A Study of the Evolution of Input Validation Vulnerabilities in Web Applications. 284-298 - Pern Hui Chia, Svein Johan Knapskog:
Re-evaluating the Wisdom of Crowds in Assessing Web Security. 299-314 - Mohammad Mannan, David Barrera, Carson D. Brown, David Lie, Paul C. van Oorschot:
Mercury: Recovering Forgotten Passwords Using Personal Devices. 315-330
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.