fc2013w.bib

@inproceedings{KamaraW13fc,
  author = {Seny Kamara and
               Lei Wei},
  title = {Garbled Circuits via Structured Encryption},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {177-188},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_12},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{HenneS13fc,
  author = {Benjamin Henne and
               Matthew Smith},
  title = {Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs
               Could Help},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {131-148},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_9},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KelleyKMSVBCC13fc,
  author = {Patrick Gage Kelley and
               Saranga Komanduri and
               Michelle L. Mazurek and
               Richard Shay and
               Timothy Vidas and
               Lujo Bauer and
               Nicolas Christin and
               Lorrie Faith Cranor},
  title = {The Impact of Length and Mathematical Operators on the Usability
               and Security of System-Assigned One-Time PINs},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {34-51},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_3},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BringerCP13fc,
  author = {Julien Bringer and
               Herv{\'e} Chabanne and
               Alain Patey},
  title = {SHADE: Secure HAmming DistancE Computation from Oblivious
               Transfer},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {164-176},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_11},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{TsujiiDFGTS13fc,
  author = {Shigeo Tsujii and
               Hiroshi Doi and
               Ryou Fujita and
               Masahito Gotaishi and
               Yukiyasu Tsunoo and
               Takahiko Syouji},
  title = {Privacy Preserving Data Processing with Collaboration of
               Homomorphic Cryptosystems},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {201-212},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_14},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MooreHMOOC13fc,
  author = {Ciara Moore and
               Neil Hanley and
               John McAllister and
               M{\'a}ire O'Neill and
               Elizabeth O'Sullivan and
               Xiaolin Cao},
  title = {Targeting FPGA DSP Slices for a Large Integer Multiplier
               for Integer Based FHE},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {226-237},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_16},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KeHY13fc,
  author = {Ping Fan Ke and
               Kai Lung Hui and
               Wei T. Yue},
  title = {Information Security as a Credence Good},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {83-93},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_6},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LepointP13fc,
  author = {Tancr{\`e}de Lepoint and
               Pascal Paillier},
  title = {On the Minimal Number of Bootstrappings in Homomorphic Circuits},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {189-200},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_13},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{HarbachFYS13fc,
  author = {Marian Harbach and
               Sascha Fahl and
               Polina Yakovleva and
               Matthew Smith},
  title = {Sorry, I Don't Get It: An Analysis of Warning Message Texts},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {94-111},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_7},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KirlapposBS13fc,
  author = {Iacovos Kirlappos and
               Adam Beautement and
               Martina Angela Sasse},
  title = {"Comply or Die" Is Dead: Long Live Security-Aware Principal
               Agents},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {70-82},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_5},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KimGGHP13fc,
  author = {Tiffany Hyun-Jin Kim and
               Virgil D. Gligor and
               Jorge Guajardo and
               Jason I. Hong and
               Adrian Perrig},
  title = {Soulmate or Acquaintance? Visualizing Tie Strength for Trust
               Inference},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {112-130},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_8},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ArianezhadSM13fc,
  author = {Majid Arianezhad and
               Douglas Stebila and
               Behzad Mozaffari},
  title = {Usability and Security of Gaze-Based Graphical Grid Passwords},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {17-33},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_2},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ChuangNWJ13fc,
  author = {John C.-I. Chuang and
               Hamilton Nguyen and
               Charles Wang and
               Benjamin Johnson},
  title = {I Think, Therefore I Am: Usability and Security of Authentication
               Using Brainwaves},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {1-16},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_1},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Kamara013fc,
  author = {Seny Kamara and
               Mariana Raykova},
  title = {Parallel Homomorphic Encryption},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {213-225},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_15},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NorcieCB13fc,
  author = {Gregory Norcie and
               Emiliano De Cristofaro and
               Victoria Bellotti},
  title = {Bootstrapping Trust in Online Dating: Social Verification
               of Online Dating Profiles},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {149-163},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_10},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{VidasOWZCC13fc,
  author = {Timothy Vidas and
               Emmanuel Owusu and
               Shuai Wang and
               Cheng Zeng and
               Lorrie Faith Cranor and
               Nicolas Christin},
  title = {QRishing: The Susceptibility of Smartphone Users to QR Code
               Phishing Attacks},
  booktitle = {Financial Cryptography Workshops},
  year = {2013},
  pages = {52-69},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_4},
  crossref = {2013wfc},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
  editor = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title = {Financial Cryptography and Data Security - FC 2013 Workshops,
               USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
               Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7862},
  year = {2013},
  isbn = {978-3-642-41319-3},
  url = {http://ifca.ai/pub/},
  puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

This file was generated by bibtex2html 1.97.