default search action
16th Financial Cryptography 2012: Kralendijk, Bonaire
- Angelos D. Keromytis:
Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7397, Springer 2012, ISBN 978-3-642-32945-6 - Hyoungshick Kim, John Kit Tang, Ross J. Anderson:
Social Authentication: Harder Than It Looks. 1-15 - Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Bruna Freitas Machado, Alain Forget, Nicholas Wright, Gerry Chan, Robert Biddle:
The MVP Web-Based Authentication Framework - (Short Paper). 16-24 - Joseph Bonneau, Sören Preibusch, Ross J. Anderson:
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. 25-40 - Tyler Moore, Jie Han, Richard Clayton:
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs. 41-56 - Dan Bogdanov, Riivo Talviste, Jan Willemson:
Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper). 57-64 - Christopher Thorpe, Steven R. Willis:
Cryptographic Rule-Based Trading - (Short Paper). 65-72 - Zi Lin, Denis Foo Kune, Nicholas Hopper:
Efficient Private Proximity Testing with GSM Location Sketches. 73-88 - Benjamin Johnson, John Chuang, Jens Grossklags, Nicolas Christin:
Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper). 89-97 - Tao Wang, Kevin S. Bauer, Clara Forero, Ian Goldberg:
Congestion-Aware Path Selection for Tor. 98-113 - Scott Wolchok, Eric Wustrow, Dawn Isabel, J. Alex Halderman:
Attacking the Washington, D.C. Internet Voting System. 114-128 - Rainer Böhme:
Security Audits Revisited. 129-147 - Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. 148-163 - Morten Dahl, Chao Ning, Tomas Toft:
On Secure Two-Party Integer Division. 164-178 - Rafik Chaabouni, Helger Lipmaa, Bingsheng Zhang:
A Non-interactive Range Proof with Constant Communication. 179-199 - T.-H. Hubert Chan, Elaine Shi, Dawn Song:
Privacy-Preserving Stream Aggregation with Fault Tolerance. 200-214 - Daniel Slamanig:
Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper). 215-222 - Mariana Raykova, Hang Zhao, Steven M. Bellovin:
Privacy Enhanced Access Control for Outsourced Data Sharing. 223-238 - Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:
Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers. 239-253 - Benjamin Mood, Lara Letaw, Kevin R. B. Butler:
Memory-Efficient Garbled Circuit Generation for Mobile Devices. 254-268 - Payman Mohassel, Salman Niksefat:
Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions. 269-284 - Kaoru Kurosawa, Yasuhiro Ohtaki:
UC-Secure Searchable Symmetric Encryption. 285-298 - Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider:
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. 299-313 - Michael Weiß, Benedikt Heinz, Frederic Stumpf:
A Cache Timing Attack on AES in Virtualization Environments. 314-328 - Franz Ferdinand Peter Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi, Steffen Schulz:
Softer Smartcards - Usable Cryptographic Tokens with Secure Execution. 329-343 - Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security. 344-358 - Aleksander Essex, Urs Hengartner:
Oblivious Printing of Secret Messages in a Multi-party Setting. 359-373 - Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes, Roel Peeters, Ahmad-Reza Sadeghi, Ingrid Verbauwhede, Christian Wachsmann:
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. 374-389 - Jeremy Clark, Aleksander Essex:
CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper). 390-398 - Simon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun:
Bitter to Better - How to Make Bitcoin a Better Currency. 399-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.