fc2012w.bib

@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BonneauS12fc,
  author = {Joseph Bonneau and
               Ekaterina Shutova},
  title = {Linguistic Properties of Multi-word Passphrases},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {1-12},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_1},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CarlosP12fc,
  author = {Marcelo Carlomagno Carlos and
               Geraint Price},
  title = {Understanding the Weaknesses of Human-Protocol Interaction},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {13-26},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_2},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CzeskisA12fc,
  author = {Alexei Czeskis and
               Jacob Appelbaum},
  title = {High Stakes: Designing a Privacy Preserving Registry},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {27-43},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_3},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CzeskisB12fc,
  author = {Alexei Czeskis and
               Dirk Balfanz},
  title = {Protected Login},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {44-52},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_4},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Dong12fc,
  author = {Zheng Dong},
  title = {Enabling Users to Self-manage Networks: Collaborative Anomaly
               Detection in Wireless Personal Area Networks},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {53-67},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_5},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KelleyCCJSW12fc,
  author = {Patrick Gage Kelley and
               Sunny Consolvo and
               Lorrie Faith Cranor and
               Jaeyeon Jung and
               Norman M. Sadeh and
               David Wetherall},
  title = {A Conundrum of Permissions: Installing Applications on an
               Android Smartphone},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {68-79},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_6},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LevesqueDFCS12fc,
  author = {Fanny Lalonde L{\'e}vesque and
               Carlton R. Davis and
               Jos{\'e} M. Fernandez and
               Sonia Chiasson and
               Anil Somayaji},
  title = {Methodology for a Field Study of Anti-malware Software},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {80-85},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_7},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{PatilGLK12fc,
  author = {Sameer Patil and
               Yann Le Gall and
               Adam J. Lee and
               Apu Kapadia},
  title = {My Privacy Policy: Exploring End-user Specification of Free-form
               Location Access Rules},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {86-97},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_8},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{WestHPL12fc,
  author = {Andrew G. West and
               Pedram Hayati and
               Vidyasagar Potdar and
               Insup Lee},
  title = {Spamming for Science: Active Measurement in Web 2.0 Abuse
               Research},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {98-111},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_9},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BaileyKD12fc,
  author = {Michael Bailey and
               Erin Kenneally and
               David Dittrich},
  title = {A Refined Ethical Impact Assessment Tool and a Case Study
               of Its Application},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {112-123},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_10},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{EgelmanBCDS12fc,
  author = {Serge Egelman and
               Joseph Bonneau and
               Sonia Chiasson and
               David Dittrich and
               Stuart E. Schechter},
  title = {It's Not Stealing If You Need It: A Panel on the Ethics
               of Performing Research Using Public Data of Illicit Origin},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {124-132},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_11},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Anderson12fc,
  author = {Ross Anderson},
  title = {Ethics Committees and IRBs: Boon, or Bane, or More Research
               Needed?},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {133-135},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_12},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FernandezPZ12fc,
  author = {Jos{\'e} M. Fernandez and
               Andrew S. Patrick and
               Lenore D. Zuck},
  title = {Ethical and Secure Data Sharing across Borders},
  booktitle = {Financial Cryptography Workshops},
  year = {2012},
  pages = {136-140},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_13},
  crossref = {2012wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
  editor = {Jim Blythe and
               Sven Dietrich and
               L. Jean Camp},
  title = {Financial Cryptography and Data Security - FC 2012 Workshops,
               USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
               Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7398},
  year = {2012},
  isbn = {978-3-642-34637-8},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

This file was generated by bibtex2html 1.97.