default search action
15th Financial Cryptography 2011: Rodney Bay, St. Lucia - Workshops
- George Danezis, Sven Dietrich, Kazue Sako:
Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7126, Springer 2012, ISBN 978-3-642-29888-2
Financial Cryptography and Data Security Workshops
- Moti Yung:
Cryptographic Protocols: From the Abstract to the Practical to the Actual. 1-2 - Ping Yu, Rui Xue:
Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption. 3-12 - Tetsuya Izu, Yoshitaka Morikawa, Yasuyuki Nogami, Yumi Sakemi, Masahiko Takenaka:
Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme. 13-26 - Emilia Käsper:
Fast Elliptic Curve Cryptography in OpenSSL. 27-39 - Felix Günther, Mark Manulis, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. 40-54 - Jennia Hizver, Tzi-cker Chiueh:
An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems. 55-69 - Yoshikazu Hanatani, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta:
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication. 70-87 - Daniel Hartung, Christoph Busch:
Biometric Transaction Authentication Protocol: Formal Model Verification and "Four-Eyes" Principle Extension. 88-103 - Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Paul C. van Oorschot:
Exploration and Field Study of a Password Manager Using Icon-Based Passwords. 104-118 - David G. Robinson, J. Alex Halderman:
Ethical Issues in E-Voting Security Analysis. 119-130 - Maritza L. Johnson, Steven M. Bellovin, Angelos D. Keromytis:
Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent. 131-137 - John Aycock, Elizabeth Buchanan, Scott D. Dexter, David Dittrich:
Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research. 138-145 - Christopher Soghoian:
Enforced Community Standards for Research on Users of the Tor Anonymity Network. 146-153 - Tyler Moore, Richard Clayton:
Ethical Dilemmas in Take-Down Research. 154-168 - Darren Shou:
Ethical Considerations of Sharing Data for Cybersecurity Research. 169-177 - Erin Kenneally, Angelos Stavrou, John McHugh, Nicolas Christin:
Moving Forward, Building an Ethics Community (Panel Statements). 178-183
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.