@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BonneauS12fc,
author = {Joseph Bonneau and
Ekaterina Shutova},
title = {Linguistic Properties of Multi-word Passphrases},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {1-12},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_1},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CarlosP12fc,
author = {Marcelo Carlomagno Carlos and
Geraint Price},
title = {Understanding the Weaknesses of Human-Protocol Interaction},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {13-26},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_2},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CzeskisA12fc,
author = {Alexei Czeskis and
Jacob Appelbaum},
title = {High Stakes: Designing a Privacy Preserving Registry},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {27-43},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_3},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{CzeskisB12fc,
author = {Alexei Czeskis and
Dirk Balfanz},
title = {Protected Login},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {44-52},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_4},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Dong12fc,
author = {Zheng Dong},
title = {Enabling Users to Self-manage Networks: Collaborative Anomaly
Detection in Wireless Personal Area Networks},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {53-67},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_5},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KelleyCCJSW12fc,
author = {Patrick Gage Kelley and
Sunny Consolvo and
Lorrie Faith Cranor and
Jaeyeon Jung and
Norman M. Sadeh and
David Wetherall},
title = {A Conundrum of Permissions: Installing Applications on an
Android Smartphone},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {68-79},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_6},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LevesqueDFCS12fc,
author = {Fanny Lalonde L{\'e}vesque and
Carlton R. Davis and
Jos{\'e} M. Fernandez and
Sonia Chiasson and
Anil Somayaji},
title = {Methodology for a Field Study of Anti-malware Software},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {80-85},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_7},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{PatilGLK12fc,
author = {Sameer Patil and
Yann Le Gall and
Adam J. Lee and
Apu Kapadia},
title = {My Privacy Policy: Exploring End-user Specification of Free-form
Location Access Rules},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {86-97},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_8},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{WestHPL12fc,
author = {Andrew G. West and
Pedram Hayati and
Vidyasagar Potdar and
Insup Lee},
title = {Spamming for Science: Active Measurement in Web 2.0 Abuse
Research},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {98-111},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_9},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BaileyKD12fc,
author = {Michael Bailey and
Erin Kenneally and
David Dittrich},
title = {A Refined Ethical Impact Assessment Tool and a Case Study
of Its Application},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {112-123},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_10},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{EgelmanBCDS12fc,
author = {Serge Egelman and
Joseph Bonneau and
Sonia Chiasson and
David Dittrich and
Stuart E. Schechter},
title = {It's Not Stealing If You Need It: A Panel on the Ethics
of Performing Research Using Public Data of Illicit Origin},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {124-132},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_11},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Anderson12fc,
author = {Ross Anderson},
title = {Ethics Committees and IRBs: Boon, or Bane, or More Research
Needed?},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {133-135},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_12},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{FernandezPZ12fc,
author = {Jos{\'e} M. Fernandez and
Andrew S. Patrick and
Lenore D. Zuck},
title = {Ethical and Secure Data Sharing across Borders},
booktitle = {Financial Cryptography Workshops},
year = {2012},
pages = {136-140},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5_13},
crossref = {2012wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2012wfc,
editor = {Jim Blythe and
Sven Dietrich and
L. Jean Camp},
title = {Financial Cryptography and Data Security - FC 2012 Workshops,
USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012,
Revised Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7398},
year = {2012},
isbn = {978-3-642-34637-8},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-34638-5},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
This file was generated by bibtex2html 1.97.