


default search action
15th Financial Cryptography 2011: Rodney Bay, St. Lucia - Workshops
- George Danezis, Sven Dietrich

, Kazue Sako:
Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7126, Springer 2012, ISBN 978-3-642-29888-2
Financial Cryptography and Data Security Workshops
- Moti Yung:

Cryptographic Protocols: From the Abstract to the Practical to the Actual. 1-2 - Ping Yu, Rui Xue:

Toward Real-Life Implementation of Signature Schemes from the Strong RSA Assumption. 3-12 - Tetsuya Izu, Yoshitaka Morikawa, Yasuyuki Nogami, Yumi Sakemi, Masahiko Takenaka:

Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme. 13-26 - Emilia Käsper:

Fast Elliptic Curve Cryptography in OpenSSL. 27-39 - Felix Günther, Mark Manulis

, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. 40-54 - Jennia Hizver, Tzi-cker Chiueh:

An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems. 55-69 - Yoshikazu Hanatani, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta:

A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication. 70-87 - Daniel Hartung, Christoph Busch:

Biometric Transaction Authentication Protocol: Formal Model Verification and "Four-Eyes" Principle Extension. 88-103 - Kemal Bicakci

, Nart Bedin Atalay, Mustafa Yuceel, Paul C. van Oorschot
:
Exploration and Field Study of a Password Manager Using Icon-Based Passwords. 104-118 - David G. Robinson, J. Alex Halderman:

Ethical Issues in E-Voting Security Analysis. 119-130 - Maritza L. Johnson, Steven M. Bellovin, Angelos D. Keromytis:

Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent. 131-137 - John Aycock, Elizabeth Buchanan, Scott D. Dexter

, David Dittrich:
Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research. 138-145 - Christopher Soghoian:

Enforced Community Standards for Research on Users of the Tor Anonymity Network. 146-153 - Tyler Moore

, Richard Clayton:
Ethical Dilemmas in Take-Down Research. 154-168 - Darren Shou:

Ethical Considerations of Sharing Data for Cybersecurity Research. 169-177 - Erin Kenneally, Angelos Stavrou

, John McHugh, Nicolas Christin
:
Moving Forward, Building an Ethics Community (Panel Statements). 178-183

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














