Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/fc/fc2013w.bht:"
@inproceedings{DBLP:conf/fc/ArianezhadSM13, author = {Majid Arianezhad and Douglas Stebila and Behzad Mozaffari}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Usability and Security of Gaze-Based Graphical Grid Passwords}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {17--33}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_2}, doi = {10.1007/978-3-642-41320-9\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/ArianezhadSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BringerCP13, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {{SHADE:} Secure HAmming DistancE Computation from Oblivious Transfer}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {164--176}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_11}, doi = {10.1007/978-3-642-41320-9\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BringerCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChuangNWJ13, author = {John C.{-}I. Chuang and Hamilton Nguyen and Charles Wang and Benjamin Johnson}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {I Think, Therefore {I} Am: Usability and Security of Authentication Using Brainwaves}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_1}, doi = {10.1007/978-3-642-41320-9\_1}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChuangNWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HarbachFYS13, author = {Marian Harbach and Sascha Fahl and Polina Yakovleva and Matthew Smith}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Sorry, {I} Don't Get It: An Analysis of Warning Message Texts}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {94--111}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_7}, doi = {10.1007/978-3-642-41320-9\_7}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/HarbachFYS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HenneS13, author = {Benjamin Henne and Matthew Smith}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {131--148}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_9}, doi = {10.1007/978-3-642-41320-9\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/HenneS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Kamara013, author = {Seny Kamara and Mariana Raykova}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Parallel Homomorphic Encryption}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {213--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_15}, doi = {10.1007/978-3-642-41320-9\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Kamara013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KamaraW13, author = {Seny Kamara and Lei Wei}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Garbled Circuits via Structured Encryption}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {177--188}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_12}, doi = {10.1007/978-3-642-41320-9\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KamaraW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KeHY13, author = {Ping Fan Ke and Kai Lung Hui and Wei T. Yue}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Information Security as a Credence Good}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {83--93}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_6}, doi = {10.1007/978-3-642-41320-9\_6}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KeHY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KelleyKMSVBCC13, author = {Patrick Gage Kelley and Saranga Komanduri and Michelle L. Mazurek and Richard Shay and Timothy Vidas and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {34--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_3}, doi = {10.1007/978-3-642-41320-9\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KelleyKMSVBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KimGGHP13, author = {Tiffany Hyun{-}Jin Kim and Virgil D. Gligor and Jorge Guajardo and Jason I. Hong and Adrian Perrig}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {112--130}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_8}, doi = {10.1007/978-3-642-41320-9\_8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KimGGHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KirlapposBS13, author = {Iacovos Kirlappos and Adam Beautement and Martina Angela Sasse}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {70--82}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_5}, doi = {10.1007/978-3-642-41320-9\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KirlapposBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LepointP13, author = {Tancr{\`{e}}de Lepoint and Pascal Paillier}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {On the Minimal Number of Bootstrappings in Homomorphic Circuits}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {189--200}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_13}, doi = {10.1007/978-3-642-41320-9\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/LepointP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MooreHMOOC13, author = {Ciara Moore and Neil Hanley and John McAllister and M{\'{a}}ire O'Neill and Elizabeth O'Sullivan and Xiaolin Cao}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Targeting {FPGA} {DSP} Slices for a Large Integer Multiplier for Integer Based {FHE}}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {226--237}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_16}, doi = {10.1007/978-3-642-41320-9\_16}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MooreHMOOC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/NorcieCB13, author = {Gregory Norcie and Emiliano De Cristofaro and Victoria Bellotti}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {149--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_10}, doi = {10.1007/978-3-642-41320-9\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/NorcieCB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TsujiiDFGTS13, author = {Shigeo Tsujii and Hiroshi Doi and Ryou Fujita and Masahito Gotaishi and Yukiyasu Tsunoo and Takahiko Syouji}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {201--212}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_14}, doi = {10.1007/978-3-642-41320-9\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/TsujiiDFGTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/VidasOWZCC13, author = {Timothy Vidas and Emmanuel Owusu and Shuai Wang and Cheng Zeng and Lorrie Faith Cranor and Nicolas Christin}, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {QRishing: The Susceptibility of Smartphone Users to {QR} Code Phishing Attacks}, booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, pages = {52--69}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9\_4}, doi = {10.1007/978-3-642-41320-9\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/VidasOWZCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2013w, editor = {Andrew A. Adams and Michael Brenner and Matthew Smith}, title = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC} and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7862}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41320-9}, doi = {10.1007/978-3-642-41320-9}, isbn = {978-3-642-41319-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2013w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.