default search action
13th Financial Cryptography 2009: Accra Beach, Barbados
- Roger Dingledine, Philippe Golle:
Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers. Lecture Notes in Computer Science 5628, Springer 2009
Economics of Information Security I
- Debin Liu, XiaoFeng Wang, L. Jean Camp:
Mitigating Inadvertent Insider Threats with Incentives. 1-16 - Benjamin Edelman:
Deterring Online Advertising Fraud through Optimal Payment in Arrears. 17-31
Anonymity and Privacy I
- Aggelos Kiayias, Bülent Yener, Moti Yung:
Privacy-Preserving Information Markets for Computing Statistical Data. 32-50 - Susan Landau, Hubert Lê Van Gông, Robin Wilton:
Achieving Privacy in a Federated Identity Management System. 51-70 - M. Eric Johnson:
Data Hemorrhages in the Health-Care Sector. 71-89
Private Computation
- Tomas Toft:
Solving Linear Programs Using Multiparty Computation. 90-107 - Jan Camenisch, Gregory M. Zaverucha:
Private Intersection of Certified Sets. 108-127 - Justin Brickell, Vitaly Shmatikov:
Privacy-Preserving Classifier Learning. 128-147
Economics of Information Security II
- Christos Ioannidis, David J. Pym, Julian Williams:
Investments and Trade-offs in the Economics of Information Security. 148-166 - Neal Fultz, Jens Grossklags:
Blue versus Red: Towards a Model of Distributed Security Attacks. 167-183
Authentication and Identification
- Saar Drimer, Steven J. Murdoch, Ross J. Anderson:
Optimised to Fail: Card Readers for Online Banking. 184-200 - Shouhuai Xu, Moti Yung:
Expecting the Unexpected: Towards Robust Credential Infrastructure. 201-221 - Deepak Vijaywargi, Dave Lewis, Darko Kirovski:
Optical DNA. 222-229
Panel
- Cormac Herley, Paul C. van Oorschot, Andrew S. Patrick:
Passwords: If We're So Smart, Why Are We Still Using Them? 230-237
Fraud Detection
- Ziqing Mao, Ninghui Li, Ian M. Molloy:
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. 238-255 - Tyler Moore, Richard Clayton:
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. 256-272 - Norman Danner, Danny Krizanc, Marc Liberatore:
Detecting Denial of Service Attacks in Tor. 273-284
Auctions
- Christopher Thorpe, David C. Parkes:
Cryptographic Combinatorial Securities Exchanges. 285-304 - David C. Parkes, Michael O. Rabin, Christopher Thorpe:
Cryptographic Combinatorial Clock-Proxy Auctions. 305-324 - Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas P. Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, Michael I. Schwartzbach, Tomas Toft:
Secure Multiparty Computation Goes Live. 325-343
Anonymity and Privacy II
- Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:
Coercion Resistant End-to-end Voting. 344-361 - Jens-Matthias Bohli, Andreas Pashalidis:
Relations Among Privacy Notions. 362-380
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.