


default search action
16th Financial Cryptography 2012: Kralendijk, Bonaire
- Angelos D. Keromytis:

Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7397, Springer 2012, ISBN 978-3-642-32945-6 - Hyoungshick Kim, John Kit Tang, Ross J. Anderson:

Social Authentication: Harder Than It Looks. 1-15 - Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Bruna Freitas Machado, Alain Forget, Nicholas Wright, Gerry Chan

, Robert Biddle:
The MVP Web-Based Authentication Framework - (Short Paper). 16-24 - Joseph Bonneau, Sören Preibusch, Ross J. Anderson:

A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. 25-40 - Tyler Moore

, Jie Han, Richard Clayton:
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs. 41-56 - Dan Bogdanov

, Riivo Talviste
, Jan Willemson:
Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper). 57-64 - Christopher Thorpe, Steven R. Willis:

Cryptographic Rule-Based Trading - (Short Paper). 65-72 - Zi Lin, Denis Foo Kune, Nicholas Hopper:

Efficient Private Proximity Testing with GSM Location Sketches. 73-88 - Benjamin Johnson, John Chuang

, Jens Grossklags, Nicolas Christin
:
Metrics for Measuring ISP Badness: The Case of Spam - (Short Paper). 89-97 - Tao Wang, Kevin S. Bauer, Clara Forero, Ian Goldberg:

Congestion-Aware Path Selection for Tor. 98-113 - Scott Wolchok, Eric Wustrow, Dawn Isabel, J. Alex Halderman:

Attacking the Washington, D.C. Internet Voting System. 114-128 - Rainer Böhme:

Security Audits Revisited. 129-147 - Attila Altay Yavuz

, Peng Ning, Michael K. Reiter:
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. 148-163 - Morten Dahl, Chao Ning, Tomas Toft:

On Secure Two-Party Integer Division. 164-178 - Rafik Chaabouni, Helger Lipmaa

, Bingsheng Zhang:
A Non-interactive Range Proof with Constant Communication. 179-199 - T.-H. Hubert Chan, Elaine Shi, Dawn Song:

Privacy-Preserving Stream Aggregation with Fault Tolerance. 200-214 - Daniel Slamanig

:
Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper). 215-222 - Mariana Raykova, Hang Zhao, Steven M. Bellovin:

Privacy Enhanced Access Control for Outsourced Data Sharing. 223-238 - Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy

, David E. Irwin:
Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers. 239-253 - Benjamin Mood, Lara Letaw, Kevin R. B. Butler

:
Memory-Efficient Garbled Circuit Generation for Mobile Devices. 254-268 - Payman Mohassel, Salman Niksefat:

Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions. 269-284 - Kaoru Kurosawa, Yasuhiro Ohtaki:

UC-Secure Searchable Symmetric Encryption. 285-298 - Junaid Jameel Ahmad, Shujun Li

, Ahmad-Reza Sadeghi, Thomas Schneider
:
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. 299-313 - Michael Weiß

, Benedikt Heinz, Frederic Stumpf:
A Cache Timing Attack on AES in Virtualization Environments. 314-328 - Franz Ferdinand Peter Brasser, Sven Bugiel, Atanas Filyanov, Ahmad-Reza Sadeghi, Steffen Schulz:

Softer Smartcards - Usable Cryptographic Tokens with Secure Execution. 329-343 - Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:

The PACE|AA Protocol for Machine Readable Travel Documents, and Its Security. 344-358 - Aleksander Essex

, Urs Hengartner:
Oblivious Printing of Secret Messages in a Multi-party Setting. 359-373 - Anthony Van Herrewege, Stefan Katzenbeisser, Roel Maes

, Roel Peeters
, Ahmad-Reza Sadeghi, Ingrid Verbauwhede
, Christian Wachsmann:
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. 374-389 - Jeremy Clark, Aleksander Essex

:
CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper). 390-398 - Simon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun

:
Bitter to Better - How to Make Bitcoin a Better Currency. 399-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














