@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{BonneauS12fc, author = {Joseph Bonneau and Ekaterina Shutova}, title = {Linguistic Properties of Multi-word Passphrases}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {1-12}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_1}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{CarlosP12fc, author = {Marcelo Carlomagno Carlos and Geraint Price}, title = {Understanding the Weaknesses of Human-Protocol Interaction}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {13-26}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_2}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{CzeskisA12fc, author = {Alexei Czeskis and Jacob Appelbaum}, title = {High Stakes: Designing a Privacy Preserving Registry}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {27-43}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_3}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{CzeskisB12fc, author = {Alexei Czeskis and Dirk Balfanz}, title = {Protected Login}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {44-52}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_4}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{Dong12fc, author = {Zheng Dong}, title = {Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {53-67}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_5}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{KelleyCCJSW12fc, author = {Patrick Gage Kelley and Sunny Consolvo and Lorrie Faith Cranor and Jaeyeon Jung and Norman M. Sadeh and David Wetherall}, title = {A Conundrum of Permissions: Installing Applications on an Android Smartphone}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {68-79}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_6}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{LevesqueDFCS12fc, author = {Fanny Lalonde L{\'e}vesque and Carlton R. Davis and Jos{\'e} M. Fernandez and Sonia Chiasson and Anil Somayaji}, title = {Methodology for a Field Study of Anti-malware Software}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {80-85}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_7}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{PatilGLK12fc, author = {Sameer Patil and Yann Le Gall and Adam J. Lee and Apu Kapadia}, title = {My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {86-97}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_8}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{WestHPL12fc, author = {Andrew G. West and Pedram Hayati and Vidyasagar Potdar and Insup Lee}, title = {Spamming for Science: Active Measurement in Web 2.0 Abuse Research}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {98-111}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_9}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{BaileyKD12fc, author = {Michael Bailey and Erin Kenneally and David Dittrich}, title = {A Refined Ethical Impact Assessment Tool and a Case Study of Its Application}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {112-123}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_10}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{EgelmanBCDS12fc, author = {Serge Egelman and Joseph Bonneau and Sonia Chiasson and David Dittrich and Stuart E. Schechter}, title = {It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {124-132}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_11}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{Anderson12fc, author = {Ross Anderson}, title = {Ethics Committees and IRBs: Boon, or Bane, or More Research Needed?}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {133-135}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_12}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@inproceedings{FernandezPZ12fc, author = {Jos{\'e} M. Fernandez and Andrew S. Patrick and Lenore D. Zuck}, title = {Ethical and Secure Data Sharing across Borders}, booktitle = {Financial Cryptography Workshops}, year = {2012}, pages = {136-140}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_13}, crossref = {2012wfc}, bibsource = {DBLP, http://dblp.uni-trier.de} }
@proceedings{2012wfc, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7398}, year = {2012}, isbn = {978-3-642-34637-8}, url = {http://ifca.ai/pub/}, puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5}, bibsource = {DBLP, http://dblp.uni-trier.de} }
This file was generated by bibtex2html 1.97.