


default search action
16th Financial Cryptography 2012: Kralendijk, Bonaire - Workshops
- Jim Blythe, Sven Dietrich, L. Jean Camp:

Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7398, Springer 2012, ISBN 978-3-642-34637-8
The Workshop on Usable Security (USEC 12)
- Joseph Bonneau, Ekaterina Shutova:

Linguistic Properties of Multi-word Passphrases. 1-12 - Marcelo Carlomagno Carlos, Geraint Price:

Understanding the Weaknesses of Human-Protocol Interaction. 13-26 - Alexei Czeskis, Jacob Appelbaum:

High Stakes: Designing a Privacy Preserving Registry. 27-43 - Alexei Czeskis, Dirk Balfanz:

Protected Login. 44-52 - Zheng Dong:

Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks. 53-67 - Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor

, Jaeyeon Jung, Norman M. Sadeh
, David Wetherall:
A Conundrum of Permissions: Installing Applications on an Android Smartphone. 68-79 - Fanny Lalonde Lévesque, Carlton R. Davis, José M. Fernandez

, Sonia Chiasson, Anil Somayaji:
Methodology for a Field Study of Anti-malware Software. 80-85 - Sameer Patil

, Yann Le Gall, Adam J. Lee, Apu Kapadia:
My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules. 86-97
The Workshop on Ethics in Computer Security Research (WECSR 12)
- Andrew G. West, Pedram Hayati, Vidyasagar M. Potdar

, Insup Lee:
Spamming for Science: Active Measurement in Web 2.0 Abuse Research. 98-111 - Michael D. Bailey, Erin Kenneally, David Dittrich:

A Refined Ethical Impact Assessment Tool and a Case Study of Its Application. 112-123 - Serge Egelman

, Joseph Bonneau, Sonia Chiasson, David Dittrich, Stuart E. Schechter:
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. 124-132 - Ross J. Anderson:

Ethics Committees and IRBs: Boon, or Bane, or More Research Needed? 133-135 - José M. Fernandez

, Andrew S. Patrick, Lenore D. Zuck:
Ethical and Secure Data Sharing across Borders. 136-140

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














