


default search action
19th Financial Cryptography 2015: San Juan, Puerto Rico - Workshops
- Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff:

Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8976, Springer 2015, ISBN 978-3-662-48050-2 - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:

On the Malleability of Bitcoin Transactions. 1-18 - Malte Möser, Rainer Böhme:

Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees. 19-33 - Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao

:
ZombieCoin: Powering Next-Generation Botnets with Bitcoin. 34-48 - John Tromp:

Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work. 49-62 - Aron Laszka

, Benjamin Johnson, Jens Grossklags:
When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools. 63-77 - David Vandervort, Dale E. Gaucas, Robert St. Jacques:

Issues in Designing a Bitcoin-like Community Currency. 78-91 - Garrick Hileman:

The Bitcoin Market Potential Index. 92-93 - Emily McReynolds, Adam Lerner, Will Scott, Franziska Roesner, Tadayoshi Kohno:

Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions. 94-111 - Luke Valenta, Brendan Rowan:

Blindcoin: Blinded, Accountable Mixes for Bitcoin. 112-126 - Sarah Meiklejohn, Claudio Orlandi

:
Privacy-Enhancing Overlays in Bitcoin. 127-141 - Jung Hee Cheon, Miran Kim

, Myungsun Kim:
Search-and-Compute on Encrypted Data. 142-159 - Wei Dai

, Yarkin Doröz, Berk Sunar:
Accelerating SWHE Based PIRs Using GPUs. 160-171 - Pille Pullonen

, Sander Siim:
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations. 172-183 - Tancrède Lepoint

, Mehdi Tibouchi
:
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. 184-193 - Jung Hee Cheon, Miran Kim

, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. 194-212 - Mayank Varia, Sophia Yakoubov

, Yang Yang:
HEtest: A Homomorphic Encryption Testing Framework. 213-230 - Vivian Genaro Motti

, Kelly Caine:
Users' Privacy Concerns About Wearables - Impact of Form Factor, Sensors and Type of Data Collected. 231-244 - Mohsen Toorani

:
On Vulnerabilities of the Security Association in the IEEE 802.15.6 Standard. 245-260 - Patrik Lantz

, Björn Johansson, Martin Hell
, Ben J. M. Smeets:
Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. 261-273 - Katharina Krombholz, Adrian Dabrowski

, Matthew Smith
, Edgar R. Weippl:
Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. 274-280 - Dhruv Kumar Yadav, Beatrice Ionascu, Sai Vamsi Krishna Ongole, Aditi Roy, Nasir D. Memon

:
Design and Analysis of Shoulder Surfing Resistant PIN Based Authentication Mechanisms on Google Glass. 281-297 - Pan Chan, Tzipora Halevi, Nasir D. Memon

:
Glass OTP: Secure and Convenient User Authentication on Google Glass. 298-308

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














