Financial Cryptography and Data Security
Conference Proceedings Archive
[1] | Joseph Bonneau and Ekaterina Shutova. Linguistic properties of multi-word passphrases. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, %booktitle%, volume 7398 of %series%, pages 1-12. Springer, 2012. [ bib | paper | publisher ] |
[2] | Marcelo Carlomagno Carlos and Geraint Price. Understanding the weaknesses of human-protocol interaction. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 13-26. Springer, 2012. [ bib | paper | publisher ] |
[3] | Alexei Czeskis and Jacob Appelbaum. High stakes: Designing a privacy preserving registry. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 27-43. Springer, 2012. [ bib | paper | publisher ] |
[4] | Alexei Czeskis and Dirk Balfanz. Protected login. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 44-52. Springer, 2012. [ bib | paper | publisher ] |
[5] | Zheng Dong. Enabling users to self-manage networks: Collaborative anomaly detection in wireless personal area networks. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 53-67. Springer, 2012. [ bib | paper | publisher ] |
[6] | Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman M. Sadeh, and David Wetherall. A conundrum of permissions: Installing applications on an android smartphone. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 68-79. Springer, 2012. [ bib | paper | publisher ] |
[7] | Fanny Lalonde Lévesque, Carlton R. Davis, José M. Fernandez, Sonia Chiasson, and Anil Somayaji. Methodology for a field study of anti-malware software. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 80-85. Springer, 2012. [ bib | paper | publisher ] |
[8] | Sameer Patil, Yann Le Gall, Adam J. Lee, and Apu Kapadia. My privacy policy: Exploring end-user specification of free-form location access rules. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 86-97. Springer, 2012. [ bib | paper | publisher ] |
[9] | Andrew G. West, Pedram Hayati, Vidyasagar Potdar, and Insup Lee. Spamming for science: Active measurement in web 2.0 abuse research. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 98-111. Springer, 2012. [ bib | paper | publisher ] |
[10] | Michael Bailey, Erin Kenneally, and David Dittrich. A refined ethical impact assessment tool and a case study of its application. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 112-123. Springer, 2012. [ bib | paper | publisher ] |
[11] | Serge Egelman, Joseph Bonneau, Sonia Chiasson, David Dittrich, and Stuart E. Schechter. It's not stealing if you need it: A panel on the ethics of performing research using public data of illicit origin. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 124-132. Springer, 2012. [ bib | paper | publisher ] |
[12] | Ross Anderson. Ethics committees and irbs: Boon, or bane, or more research needed? In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 133-135. Springer, 2012. [ bib | paper | publisher ] |
[13] | José M. Fernandez, Andrew S. Patrick, and Lenore D. Zuck. Ethical and secure data sharing across borders. In Jim Blythe, Sven Dietrich, and L. Jean Camp, editors, Financial Cryptography Workshops, volume 7398 of Lecture Notes in Computer Science, pages 136-140. Springer, 2012. [ bib | paper | publisher ] |
This conference is organized annually by the International Financial Cryptography Association.