Search dblp for Publications

export results for "toc:db/conf/fc/fc2013w.bht:"

 download as .bib file

@inproceedings{DBLP:conf/fc/ArianezhadSM13,
  author       = {Majid Arianezhad and
                  Douglas Stebila and
                  Behzad Mozaffari},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Usability and Security of Gaze-Based Graphical Grid Passwords},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_2},
  doi          = {10.1007/978-3-642-41320-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ArianezhadSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BringerCP13,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {{SHADE:} Secure HAmming DistancE Computation from Oblivious Transfer},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {164--176},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_11},
  doi          = {10.1007/978-3-642-41320-9\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BringerCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChuangNWJ13,
  author       = {John C.{-}I. Chuang and
                  Hamilton Nguyen and
                  Charles Wang and
                  Benjamin Johnson},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {I Think, Therefore {I} Am: Usability and Security of Authentication
                  Using Brainwaves},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_1},
  doi          = {10.1007/978-3-642-41320-9\_1},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ChuangNWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HarbachFYS13,
  author       = {Marian Harbach and
                  Sascha Fahl and
                  Polina Yakovleva and
                  Matthew Smith},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Sorry, {I} Don't Get It: An Analysis of Warning Message Texts},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {94--111},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_7},
  doi          = {10.1007/978-3-642-41320-9\_7},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HarbachFYS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HenneS13,
  author       = {Benjamin Henne and
                  Matthew Smith},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs
                  Could Help},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {131--148},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_9},
  doi          = {10.1007/978-3-642-41320-9\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HenneS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Kamara013,
  author       = {Seny Kamara and
                  Mariana Raykova},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Parallel Homomorphic Encryption},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {213--225},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_15},
  doi          = {10.1007/978-3-642-41320-9\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Kamara013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KamaraW13,
  author       = {Seny Kamara and
                  Lei Wei},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Garbled Circuits via Structured Encryption},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {177--188},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_12},
  doi          = {10.1007/978-3-642-41320-9\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KamaraW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KeHY13,
  author       = {Ping Fan Ke and
                  Kai Lung Hui and
                  Wei T. Yue},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Information Security as a Credence Good},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {83--93},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_6},
  doi          = {10.1007/978-3-642-41320-9\_6},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KeHY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13,
  author       = {Patrick Gage Kelley and
                  Saranga Komanduri and
                  Michelle L. Mazurek and
                  Richard Shay and
                  Timothy Vidas and
                  Lujo Bauer and
                  Nicolas Christin and
                  Lorrie Faith Cranor},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {The Impact of Length and Mathematical Operators on the Usability and
                  Security of System-Assigned One-Time PINs},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_3},
  doi          = {10.1007/978-3-642-41320-9\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KelleyKMSVBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KimGGHP13,
  author       = {Tiffany Hyun{-}Jin Kim and
                  Virgil D. Gligor and
                  Jorge Guajardo and
                  Jason I. Hong and
                  Adrian Perrig},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {112--130},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_8},
  doi          = {10.1007/978-3-642-41320-9\_8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KimGGHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KirlapposBS13,
  author       = {Iacovos Kirlappos and
                  Adam Beautement and
                  Martina Angela Sasse},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {70--82},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_5},
  doi          = {10.1007/978-3-642-41320-9\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KirlapposBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LepointP13,
  author       = {Tancr{\`{e}}de Lepoint and
                  Pascal Paillier},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {On the Minimal Number of Bootstrappings in Homomorphic Circuits},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {189--200},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_13},
  doi          = {10.1007/978-3-642-41320-9\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/LepointP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MooreHMOOC13,
  author       = {Ciara Moore and
                  Neil Hanley and
                  John McAllister and
                  M{\'{a}}ire O'Neill and
                  Elizabeth O'Sullivan and
                  Xiaolin Cao},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Targeting {FPGA} {DSP} Slices for a Large Integer Multiplier for Integer
                  Based {FHE}},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {226--237},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_16},
  doi          = {10.1007/978-3-642-41320-9\_16},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MooreHMOOC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/NorcieCB13,
  author       = {Gregory Norcie and
                  Emiliano De Cristofaro and
                  Victoria Bellotti},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Bootstrapping Trust in Online Dating: Social Verification of Online
                  Dating Profiles},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_10},
  doi          = {10.1007/978-3-642-41320-9\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/NorcieCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/TsujiiDFGTS13,
  author       = {Shigeo Tsujii and
                  Hiroshi Doi and
                  Ryou Fujita and
                  Masahito Gotaishi and
                  Yukiyasu Tsunoo and
                  Takahiko Syouji},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Privacy Preserving Data Processing with Collaboration of Homomorphic
                  Cryptosystems},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_14},
  doi          = {10.1007/978-3-642-41320-9\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/TsujiiDFGTS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/VidasOWZCC13,
  author       = {Timothy Vidas and
                  Emmanuel Owusu and
                  Shuai Wang and
                  Cheng Zeng and
                  Lorrie Faith Cranor and
                  Nicolas Christin},
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {QRishing: The Susceptibility of Smartphone Users to {QR} Code Phishing
                  Attacks},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9\_4},
  doi          = {10.1007/978-3-642-41320-9\_4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/VidasOWZCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2013w,
  editor       = {Andrew A. Adams and
                  Michael Brenner and
                  Matthew Smith},
  title        = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
                  and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7862},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41320-9},
  doi          = {10.1007/978-3-642-41320-9},
  isbn         = {978-3-642-41319-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2013w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics