fc2011w.bib

@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Yung11fc,
  author = {Moti Yung},
  title = {Cryptographic Protocols: From the Abstract to the Practical
               to the Actual},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {1-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_1},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{YuX11fc,
  author = {Ping Yu and
               Rui Xue},
  title = {Toward Real-Life Implementation of Signature Schemes from
               the Strong RSA Assumption},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {3-12},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_2},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{IzuMNST11fc,
  author = {Tetsuya Izu and
               Yoshitaka Morikawa and
               Yasuyuki Nogami and
               Yumi Sakemi and
               Masahiko Takenaka},
  title = {Detailed Cost Estimation of CNTW Attack against EMV Signature
               Scheme},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {13-26},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_3},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Kasper11fc,
  author = {Emilia K{\"a}sper},
  title = {Fast Elliptic Curve Cryptography in OpenSSL},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {27-39},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_4},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{GuntherMS11fc,
  author = {Felix G{\"u}nther and
               Mark Manulis and
               Thorsten Strufe},
  title = {Cryptographic Treatment of Private User Profiles},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {40-54},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_5},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{HizverC11fc,
  author = {Jennia Hizver and
               Tzi-cker Chiueh},
  title = {An Introspection-Based Memory Scraper Attack against Virtualized
               Point of Sale Systems},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {55-69},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_6},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{HanataniOMSO11fc,
  author = {Yoshikazu Hanatani and
               Miyako Ohkubo and
               Shin'ichiro Matsuo and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title = {A Study on Computational Formal Verification for Practical
               Cryptographic Protocol: The Case of Synchronous RFID Authentication},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {70-87},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_7},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{HartungB11fc,
  author = {Daniel Hartung and
               Christoph Busch},
  title = {Biometric Transaction Authentication Protocol: Formal Model
               Verification and "Four-Eyes" Principle Extension},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {88-103},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_8},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BicakciAYO11fc,
  author = {Kemal Bicakci and
               Nart Bedin Atalay and
               Mustafa Yuceel and
               Paul C. van Oorschot},
  title = {Exploration and Field Study of a Password Manager Using
               Icon-Based Passwords},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {104-118},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_9},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{RobinsonH11fc,
  author = {David G. Robinson and
               J. Alex Halderman},
  title = {Ethical Issues in E-Voting Security Analysis},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {119-130},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_10},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{JohnsonBK11fc,
  author = {Maritza L. Johnson and
               Steven M. Bellovin and
               Angelos D. Keromytis},
  title = {Computer Security Research with Human Subjects: Risks, Benefits
               and Informed Consent},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {131-137},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_11},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{AycockBDD11fc,
  author = {John Aycock and
               Elizabeth Buchanan and
               Scott Dexter and
               David Dittrich},
  title = {Human Subjects, Agents, or Bots: Current Issues in Ethics
               and Computer Security Research},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {138-145},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_12},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Soghoian11fc,
  author = {Christopher Soghoian},
  title = {Enforced Community Standards for Research on Users of the
               Tor Anonymity Network},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {146-153},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_13},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MooreC11fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Ethical Dilemmas in Take-Down Research},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {154-168},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_14},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Shou11fc,
  author = {Darren Shou},
  title = {Ethical Considerations of Sharing Data for Cybersecurity
               Research},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {169-177},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_15},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KenneallySMC11fc,
  author = {Erin Kenneally and
               Angelos Stavrou and
               John McHugh and
               Nicolas Christin},
  title = {Moving Forward, Building an Ethics Community (Panel Statements)},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {178-183},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_16},
  crossref = {2011wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

This file was generated by bibtex2html 1.97.