![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
16th Financial Cryptography 2012: Kralendijk, Bonaire - Workshops
- Jim Blythe, Sven Dietrich, L. Jean Camp:
Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7398, Springer 2012, ISBN 978-3-642-34637-8
The Workshop on Usable Security (USEC 12)
- Joseph Bonneau, Ekaterina Shutova:
Linguistic Properties of Multi-word Passphrases. 1-12 - Marcelo Carlomagno Carlos, Geraint Price:
Understanding the Weaknesses of Human-Protocol Interaction. 13-26 - Alexei Czeskis, Jacob Appelbaum:
High Stakes: Designing a Privacy Preserving Registry. 27-43 - Alexei Czeskis, Dirk Balfanz:
Protected Login. 44-52 - Zheng Dong:
Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks. 53-67 - Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor
, Jaeyeon Jung, Norman M. Sadeh
, David Wetherall:
A Conundrum of Permissions: Installing Applications on an Android Smartphone. 68-79 - Fanny Lalonde Lévesque, Carlton R. Davis, José M. Fernandez
, Sonia Chiasson, Anil Somayaji:
Methodology for a Field Study of Anti-malware Software. 80-85 - Sameer Patil
, Yann Le Gall, Adam J. Lee, Apu Kapadia:
My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules. 86-97
The Workshop on Ethics in Computer Security Research (WECSR 12)
- Andrew G. West, Pedram Hayati, Vidyasagar M. Potdar
, Insup Lee:
Spamming for Science: Active Measurement in Web 2.0 Abuse Research. 98-111 - Michael D. Bailey, Erin Kenneally, David Dittrich:
A Refined Ethical Impact Assessment Tool and a Case Study of Its Application. 112-123 - Serge Egelman
, Joseph Bonneau, Sonia Chiasson, David Dittrich, Stuart E. Schechter:
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. 124-132 - Ross J. Anderson:
Ethics Committees and IRBs: Boon, or Bane, or More Research Needed? 133-135 - José M. Fernandez
, Andrew S. Patrick, Lenore D. Zuck:
Ethical and Secure Data Sharing across Borders. 136-140
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.