@inproceedings{KamaraW13fc, author = {Seny Kamara and Lei Wei}, title = {Garbled Circuits via Structured Encryption}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {177-188}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_12}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{HenneS13fc, author = {Benjamin Henne and Matthew Smith}, title = {Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {131-148}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_9}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{KelleyKMSVBCC13fc, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, title = {The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {34-51}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_3}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{BringerCP13fc, author = {Julien Bringer and Herv{\'e} Chabanne and Alain Patey}, title = {SHADE: Secure HAmming DistancE Computation from Oblivious Transfer}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {164-176}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_11}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{TsujiiDFGTS13fc, author = {Shigeo Tsujii and Hiroshi Doi and Ryou Fujita and Masahito Gotaishi and Yukiyasu Tsunoo and Takahiko Syouji}, title = {Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {201-212}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_14}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{MooreHMOOC13fc, author = {Ciara Moore and Neil Hanley and John McAllister and M{\'a}ire O'Neill and Elizabeth O'Sullivan and Xiaolin Cao}, title = {Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {226-237}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_16}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{KeHY13fc, author = {Ping Fan Ke and Kai Lung Hui and Wei T. Yue}, title = {Information Security as a Credence Good}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {83-93}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_6}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{LepointP13fc, author = {Tancr{\`e}de Lepoint and Pascal Paillier}, title = {On the Minimal Number of Bootstrappings in Homomorphic Circuits}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {189-200}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_13}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{HarbachFYS13fc, author = {Marian Harbach and Sascha Fahl and Polina Yakovleva and Matthew Smith}, title = {Sorry, I Don't Get It: An Analysis of Warning Message Texts}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {94-111}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_7}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{KirlapposBS13fc, author = {Iacovos Kirlappos and Adam Beautement and Martina Angela Sasse}, title = {"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {70-82}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_5}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{KimGGHP13fc, author = {Tiffany Hyun-Jin Kim and Virgil D. Gligor and Jorge Guajardo and Jason I. Hong and Adrian Perrig}, title = {Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {112-130}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_8}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{ArianezhadSM13fc, author = {Majid Arianezhad and Douglas Stebila and Behzad Mozaffari}, title = {Usability and Security of Gaze-Based Graphical Grid Passwords}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {17-33}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_2}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{ChuangNWJ13fc, author = {John C.-I. Chuang and Hamilton Nguyen and Charles Wang and Benjamin Johnson}, title = {I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {1-16}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_1}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{Kamara013fc, author = {Seny Kamara and Mariana Raykova}, title = {Parallel Homomorphic Encryption}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {213-225}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_15}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{NorcieCB13fc, author = {Gregory Norcie and Emiliano De Cristofaro and Victoria Bellotti}, title = {Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {149-163}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_10}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{VidasOWZCC13fc, author = {Timothy Vidas and Emmanuel Owusu and Shuai Wang and Cheng Zeng and Lorrie Faith Cranor and Nicolas Christin}, title = {QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks}, booktitle = {Financial Cryptography Workshops}, year = {2013}, pages = {52-69}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_4}, crossref = {2013wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2013wfc, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7862}, year = {2013}, isbn = {978-3-642-41319-3}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9}, bibsource = {DBLP, http://dblp.uni-trier.de} }
This file was generated by bibtex2html 1.97.