@inproceedings{KamaraW13fc,
author = {Seny Kamara and
Lei Wei},
title = {Garbled Circuits via Structured Encryption},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {177-188},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_12},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{HenneS13fc,
author = {Benjamin Henne and
Matthew Smith},
title = {Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs
Could Help},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {131-148},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_9},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KelleyKMSVBCC13fc,
author = {Patrick Gage Kelley and
Saranga Komanduri and
Michelle L. Mazurek and
Richard Shay and
Timothy Vidas and
Lujo Bauer and
Nicolas Christin and
Lorrie Faith Cranor},
title = {The Impact of Length and Mathematical Operators on the Usability
and Security of System-Assigned One-Time PINs},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {34-51},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_3},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{BringerCP13fc,
author = {Julien Bringer and
Herv{\'e} Chabanne and
Alain Patey},
title = {SHADE: Secure HAmming DistancE Computation from Oblivious
Transfer},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {164-176},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_11},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{TsujiiDFGTS13fc,
author = {Shigeo Tsujii and
Hiroshi Doi and
Ryou Fujita and
Masahito Gotaishi and
Yukiyasu Tsunoo and
Takahiko Syouji},
title = {Privacy Preserving Data Processing with Collaboration of
Homomorphic Cryptosystems},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {201-212},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_14},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{MooreHMOOC13fc,
author = {Ciara Moore and
Neil Hanley and
John McAllister and
M{\'a}ire O'Neill and
Elizabeth O'Sullivan and
Xiaolin Cao},
title = {Targeting FPGA DSP Slices for a Large Integer Multiplier
for Integer Based FHE},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {226-237},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_16},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KeHY13fc,
author = {Ping Fan Ke and
Kai Lung Hui and
Wei T. Yue},
title = {Information Security as a Credence Good},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {83-93},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_6},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{LepointP13fc,
author = {Tancr{\`e}de Lepoint and
Pascal Paillier},
title = {On the Minimal Number of Bootstrappings in Homomorphic Circuits},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {189-200},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_13},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{HarbachFYS13fc,
author = {Marian Harbach and
Sascha Fahl and
Polina Yakovleva and
Matthew Smith},
title = {Sorry, I Don't Get It: An Analysis of Warning Message Texts},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {94-111},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_7},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KirlapposBS13fc,
author = {Iacovos Kirlappos and
Adam Beautement and
Martina Angela Sasse},
title = {"Comply or Die" Is Dead: Long Live Security-Aware Principal
Agents},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {70-82},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_5},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{KimGGHP13fc,
author = {Tiffany Hyun-Jin Kim and
Virgil D. Gligor and
Jorge Guajardo and
Jason I. Hong and
Adrian Perrig},
title = {Soulmate or Acquaintance? Visualizing Tie Strength for Trust
Inference},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {112-130},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_8},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ArianezhadSM13fc,
author = {Majid Arianezhad and
Douglas Stebila and
Behzad Mozaffari},
title = {Usability and Security of Gaze-Based Graphical Grid Passwords},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {17-33},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_2},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{ChuangNWJ13fc,
author = {John C.-I. Chuang and
Hamilton Nguyen and
Charles Wang and
Benjamin Johnson},
title = {I Think, Therefore I Am: Usability and Security of Authentication
Using Brainwaves},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {1-16},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_1},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{Kamara013fc,
author = {Seny Kamara and
Mariana Raykova},
title = {Parallel Homomorphic Encryption},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {213-225},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_15},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{NorcieCB13fc,
author = {Gregory Norcie and
Emiliano De Cristofaro and
Victoria Bellotti},
title = {Bootstrapping Trust in Online Dating: Social Verification
of Online Dating Profiles},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {149-163},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_10},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{VidasOWZCC13fc,
author = {Timothy Vidas and
Emmanuel Owusu and
Shuai Wang and
Cheng Zeng and
Lorrie Faith Cranor and
Nicolas Christin},
title = {QRishing: The Susceptibility of Smartphone Users to QR Code
Phishing Attacks},
booktitle = {Financial Cryptography Workshops},
year = {2013},
pages = {52-69},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9_4},
crossref = {2013wfc},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
@proceedings{2013wfc,
editor = {Andrew A. Adams and
Michael Brenner and
Matthew Smith},
title = {Financial Cryptography and Data Security - FC 2013 Workshops,
USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised
Selected Papers},
booktitle = {Financial Cryptography Workshops},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7862},
year = {2013},
isbn = {978-3-642-41319-3},
url = {http://ifca.ai/pub/},
puburl = {http://dx.doi.org/10.1007/978-3-642-41320-9},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
This file was generated by bibtex2html 1.97.