BibTeX records: Benjamin Johnson 0001

download as .bib file

@article{DBLP:journals/corr/abs-1904-09381,
  author    = {Benjamin Johnson and
               Aron Laszka and
               Jens Grossklags and
               Tyler Moore},
  title     = {Economic Analyses of Security Investments on Cryptocurrency Exchanges},
  journal   = {CoRR},
  volume    = {abs/1904.09381},
  year      = {2019},
  url       = {http://arxiv.org/abs/1904.09381},
  archivePrefix = {arXiv},
  eprint    = {1904.09381},
  timestamp = {Fri, 26 Apr 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1904-09381},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/LaszkaJG18,
  author    = {Aron Laszka and
               Benjamin Johnson and
               Jens Grossklags},
  title     = {On the Assessment of Systematic Risk in Networked Systems},
  journal   = {{ACM} Trans. Internet Techn.},
  volume    = {18},
  number    = {4},
  pages     = {48:1--48:28},
  year      = {2018},
  url       = {https://doi.org/10.1145/3166069},
  doi       = {10.1145/3166069},
  timestamp = {Fri, 10 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/toit/LaszkaJG18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/0001LGM18,
  author    = {Benjamin Johnson and
               Aron Laszka and
               Jens Grossklags and
               Tyler Moore},
  title     = {Economic Analyses of Security Investments on Cryptocurrency Exchanges},
  booktitle = {{IEEE} International Conference on Internet of Things (iThings) and
               {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
               Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
               iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
               30 - August 3, 2018},
  pages     = {1253--1262},
  year      = {2018},
  crossref  = {DBLP:conf/ithings/2018},
  url       = {https://doi.org/10.1109/Cybermatics\_2018.2018.00220},
  doi       = {10.1109/Cybermatics\_2018.2018.00220},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ithings/0001LGM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/JohnsonL18,
  author    = {Benjamin Johnson and
               Paul Laskowski},
  title     = {Privacy, Polarization, and Passage of Divisive Laws},
  booktitle = {2018 {IEEE} Symposium on Privacy-Aware Computing, {PAC} 2018, Washington,
               DC, USA, September 26-28, 2018},
  pages     = {1--9},
  year      = {2018},
  crossref  = {DBLP:conf/pac/2018},
  url       = {https://doi.org/10.1109/PAC.2018.00007},
  doi       = {10.1109/PAC.2018.00007},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pac/JohnsonL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdhms/JohnsonSLGB15,
  author    = {Benjamin Johnson and
               Pascal Sch{\"{o}}ttle and
               Aron Laszka and
               Jens Grossklags and
               Rainer B{\"{o}}hme},
  title     = {Adaptive Steganography and Steganalysis with Fixed-Size Embedding},
  journal   = {Trans. Data Hiding and Multimedia Security},
  volume    = {10},
  pages     = {69--91},
  year      = {2015},
  crossref  = {DBLP:journals/tdhms/2015-10},
  url       = {https://doi.org/10.1007/978-3-662-46739-8\_5},
  doi       = {10.1007/978-3-662-46739-8\_5},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tdhms/JohnsonSLGB15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LaszkaJG15,
  author    = {Aron Laszka and
               Benjamin Johnson and
               Jens Grossklags},
  title     = {When Bitcoin Mining Pools Run Dry - {A} Game-Theoretic Analysis of
               the Long-Term Impact of Attacks Between Mining Pools},
  booktitle = {Financial Cryptography and Data Security - {FC} 2015 International
               Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
               30, 2015, Revised Selected Papers},
  pages     = {63--77},
  year      = {2015},
  crossref  = {DBLP:conf/fc/2015w},
  url       = {https://doi.org/10.1007/978-3-662-48051-9\_5},
  doi       = {10.1007/978-3-662-48051-9\_5},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/LaszkaJG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonLG15,
  author    = {Benjamin Johnson and
               Aron Laszka and
               Jens Grossklags},
  title     = {Games of Timing for Security in Dynamic Environments},
  booktitle = {Decision and Game Theory for Security - 6th International Conference,
               GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  pages     = {57--73},
  year      = {2015},
  crossref  = {DBLP:conf/gamesec/2015},
  url       = {https://doi.org/10.1007/978-3-319-25594-1\_4},
  doi       = {10.1007/978-3-319-25594-1\_4},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/JohnsonLG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/phycs/MerrillMJC15,
  author    = {Nick Merrill and
               Thomas Maillart and
               Benjamin Johnson and
               John C.{-}I. Chuang},
  title     = {Improving Physiological Signal Classification Using Logarithmic Quantization
               and a Progressive Calibration Technique},
  booktitle = {PhyCS 2015 - Proceedings of the 2nd International Conference on Physiological
               Computing Systems, ESEO, Angers, Loire Valley, France, 11 - 13 February,
               2015.},
  pages     = {44--51},
  year      = {2015},
  crossref  = {DBLP:conf/phycs/2015},
  url       = {https://doi.org/10.5220/0005238800440051},
  doi       = {10.5220/0005238800440051},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/phycs/MerrillMJC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/JohnsonLMCC15,
  author    = {Benjamin Johnson and
               Paul Laskowski and
               Thomas Maillart and
               John C.{-}I. Chuang and
               Nicolas Christin},
  title     = {Caviar and Yachts: How Your Purchase Data May Come Back to Haunt You},
  booktitle = {14th Annual Workshop on the Economics of Information Security, {WEIS}
               2015, Delft, The Netherlands, 22-23 June, 2015},
  year      = {2015},
  crossref  = {DBLP:conf/weis/2015},
  url       = {http://www.econinfosec.org/archive/weis2015/papers/WEIS\_2015\_johnson.pdf},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/weis/JohnsonLMCC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2015w,
  editor    = {Michael Brenner and
               Nicolas Christin and
               Benjamin Johnson and
               Kurt Rohloff},
  title     = {Financial Cryptography and Data Security - {FC} 2015 International
               Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
               30, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8976},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48051-9},
  doi       = {10.1007/978-3-662-48051-9},
  isbn      = {978-3-662-48050-2},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2015w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/LaszkaJSGB14,
  author    = {Aron Laszka and
               Benjamin Johnson and
               Pascal Sch{\"{o}}ttle and
               Jens Grossklags and
               Rainer B{\"{o}}hme},
  title     = {Secure Team Composition to Thwart Insider Threats and Cyber-Espionage},
  journal   = {{ACM} Trans. Internet Techn.},
  volume    = {14},
  number    = {2-3},
  pages     = {19:1--19:22},
  year      = {2014},
  url       = {https://doi.org/10.1145/2663499},
  doi       = {10.1145/2663499},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/toit/LaszkaJSGB14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JohnsonLG14,
  author    = {Benjamin Johnson and
               Aron Laszka and
               Jens Grossklags},
  title     = {How many down?: toward understanding systematic risk in networks},
  booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages     = {495--500},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014asia},
  url       = {https://doi.org/10.1145/2590296.2590308},
  doi       = {10.1145/2590296.2590308},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/JohnsonLG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JohnsonLG14,
  author    = {Benjamin Johnson and
               Aron Laszka and
               Jens Grossklags},
  title     = {The Complexity of Estimating Systematic Risk in Networks},
  booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
               Austria, 19-22 July, 2014},
  pages     = {325--336},
  year      = {2014},
  crossref  = {DBLP:conf/csfw/2014},
  url       = {https://doi.org/10.1109/CSF.2014.30},
  doi       = {10.1109/CSF.2014.30},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/JohnsonLG14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JohnsonLGVM14,
  author    = {Benjamin Johnson and
               Aron Laszka and
               Jens Grossklags and
               Marie Vasek and
               Tyler Moore},
  title     = {Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools},
  booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
               and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
               Papers},
  pages     = {72--86},
  year      = {2014},
  crossref  = {DBLP:conf/fc/2014w},
  url       = {https://doi.org/10.1007/978-3-662-44774-1\_6},
  doi       = {10.1007/978-3-662-44774-1\_6},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JohnsonLGVM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LaszkaJGF14,
  author    = {Aron Laszka and
               Benjamin Johnson and
               Jens Grossklags and
               M{\'{a}}rk F{\'{e}}legyh{\'{a}}zi},
  title     = {Estimating Systematic Risk in Real-World Networks},
  booktitle = {Financial Cryptography and Data Security - 18th International Conference,
               {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
               Papers},
  pages     = {417--435},
  year      = {2014},
  crossref  = {DBLP:conf/fc/2014},
  url       = {https://doi.org/10.1007/978-3-662-45472-5\_27},
  doi       = {10.1007/978-3-662-45472-5\_27},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/LaszkaJGF14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/JohnsonMC14,
  author    = {Benjamin Johnson and
               Thomas Maillart and
               John C.{-}I. Chuang},
  title     = {My thoughts are not your thoughts},
  booktitle = {The 2014 {ACM} Conference on Ubiquitous Computing, UbiComp '14 Adjunct,
               Seattle, WA, {USA} - September 13 - 17, 2014},
  pages     = {1329--1338},
  year      = {2014},
  crossref  = {DBLP:conf/huc/2014ap},
  url       = {https://doi.org/10.1145/2638728.2641710},
  doi       = {10.1145/2638728.2641710},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/huc/JohnsonMC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LaszkaJSGB13,
  author    = {Aron Laszka and
               Benjamin Johnson and
               Pascal Sch{\"{o}}ttle and
               Jens Grossklags and
               Rainer B{\"{o}}hme},
  title     = {Managing the Weakest Link - {A} Game-Theoretic Approach for the Mitigation
               of Insider Threats},
  booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  pages     = {273--290},
  year      = {2013},
  crossref  = {DBLP:conf/esorics/2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6\_16},
  doi       = {10.1007/978-3-642-40203-6\_16},
  timestamp = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/LaszkaJSGB13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/SchottleLJGB13,
  author    = {Pascal Sch{\"{o}}ttle and
               Aron Laszka and
               Benjamin Johnson and
               Jens Grossklags and
               Rainer B{\"{o}}hme},
  title     = {A game-theoretic analysis of content-adaptive steganography with independent
               embedding},
  booktitle = {21st European Signal Processing Conference, {EUSIPCO} 2013, Marrakech,
               Morocco, September 9-13, 2013},
  pages     = {1--5},
  year      = {2013},
  crossref  = {DBLP:conf/eusipco/2013},
  url       = {http://ieeexplore.ieee.org/document/6811726/},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eusipco/SchottleLJGB13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChuangNWJ13,
  author    = {John C.{-}I. Chuang and
               Hamilton Nguyen and
               Charles Wang and
               Benjamin Johnson},
  title     = {I Think, Therefore {I} Am: Usability and Security of Authentication
               Using Brainwaves},
  booktitle = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
               and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  pages     = {1--16},
  year      = {2013},
  crossref  = {DBLP:conf/fc/2013w},
  url       = {https://doi.org/10.1007/978-3-642-41320-9\_1},
  doi       = {10.1007/978-3-642-41320-9\_1},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/ChuangNWJ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/LaszkaJG13,
  author    = {Aron Laszka and
               Benjamin Johnson and
               Jens Grossklags},
  title     = {Mitigation of Targeted and Non-targeted Covert Attacks as a Timing
               Game},
  booktitle = {Decision and Game Theory for Security - 4th International Conference,
               GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  pages     = {175--191},
  year      = {2013},
  crossref  = {DBLP:conf/gamesec/2013},
  url       = {https://doi.org/10.1007/978-3-319-02786-9\_11},
  doi       = {10.1007/978-3-319-02786-9\_11},
  timestamp = {Tue, 10 Sep 2019 13:47:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/LaszkaJG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/JohnsonSLGB13,
  author    = {Benjamin Johnson and
               Pascal Sch{\"{o}}ttle and
               Aron Laszka and
               Jens Grossklags and
               Rainer B{\"{o}}hme},
  title     = {Bitspotting: Detecting Optimal Adaptive Steganography},
  booktitle = {Digital-Forensics and Watermarking - 12th International Workshop,
               {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
               Papers},
  pages     = {3--18},
  year      = {2013},
  crossref  = {DBLP:conf/iwdw/2013},
  url       = {https://doi.org/10.1007/978-3-662-43886-2\_1},
  doi       = {10.1007/978-3-662-43886-2\_1},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwdw/JohnsonSLGB13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wine/LaszkaJG13,
  author    = {Aron Laszka and
               Benjamin Johnson and
               Jens Grossklags},
  title     = {Mitigating Covert Compromises - {A} Game-Theoretic Model of Targeted
               and Non-Targeted Covert Attacks},
  booktitle = {Web and Internet Economics - 9th International Conference, {WINE}
               2013, Cambridge, MA, USA, December 11-14, 2013, Proceedings},
  pages     = {319--332},
  year      = {2013},
  crossref  = {DBLP:conf/wine/2013},
  url       = {https://doi.org/10.1007/978-3-642-45046-4\_26},
  doi       = {10.1007/978-3-642-45046-4\_26},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wine/LaszkaJG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JohnsonCGC12,
  author    = {Benjamin Johnson and
               John Chuang and
               Jens Grossklags and
               Nicolas Christin},
  title     = {Metrics for Measuring {ISP} Badness: The Case of Spam - (Short Paper)},
  booktitle = {Financial Cryptography and Data Security - 16th International Conference,
               {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
               Selected Papers},
  pages     = {89--97},
  year      = {2012},
  crossref  = {DBLP:conf/fc/2012},
  url       = {https://doi.org/10.1007/978-3-642-32946-3\_8},
  doi       = {10.1007/978-3-642-32946-3\_8},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/JohnsonCGC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonSB12,
  author    = {Benjamin Johnson and
               Pascal Sch{\"{o}}ttle and
               Rainer B{\"{o}}hme},
  title     = {Where to Hide the Bits ?},
  booktitle = {Decision and Game Theory for Security - Third International Conference,
               GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  pages     = {1--17},
  year      = {2012},
  crossref  = {DBLP:conf/gamesec/2012},
  url       = {https://doi.org/10.1007/978-3-642-34266-0\_1},
  doi       = {10.1007/978-3-642-34266-0\_1},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/JohnsonSB12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/JohnsonGCC11,
  author    = {Benjamin Johnson and
               Jens Grossklags and
               Nicolas Christin and
               John Chuang},
  title     = {Nash Equilibria for Weakest Target Security Games with Heterogeneous
               Agents},
  booktitle = {Game Theory for Networks - 2nd International {ICST} Conference, {GAMENETS}
               2011, Shanghai, China, April 16-18, 2011, Revised Selected Papers},
  pages     = {444--458},
  year      = {2011},
  crossref  = {DBLP:conf/gamenets/2011},
  url       = {https://doi.org/10.1007/978-3-642-30373-9\_31},
  doi       = {10.1007/978-3-642-30373-9\_31},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/gamenets/JohnsonGCC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonBG11,
  author    = {Benjamin Johnson and
               Rainer B{\"{o}}hme and
               Jens Grossklags},
  title     = {Security Games with Market Insurance},
  booktitle = {Decision and Game Theory for Security - Second International Conference,
               GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
               Proceedings},
  pages     = {117--130},
  year      = {2011},
  crossref  = {DBLP:conf/gamesec/2011},
  url       = {https://doi.org/10.1007/978-3-642-25280-8\_11},
  doi       = {10.1007/978-3-642-25280-8\_11},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/JohnsonBG11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JohnsonGCC10,
  author    = {Benjamin Johnson and
               Jens Grossklags and
               Nicolas Christin and
               John Chuang},
  title     = {Are Security Experts Useful? Bayesian Nash Equilibria for Network
               Security Games with Limited Information},
  booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  pages     = {588--606},
  year      = {2010},
  crossref  = {DBLP:conf/esorics/2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3\_36},
  doi       = {10.1007/978-3-642-15497-3\_36},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/JohnsonGCC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/GrossklagsJC10,
  author    = {Jens Grossklags and
               Benjamin Johnson and
               Nicolas Christin},
  title     = {When Information Improves Information Security},
  booktitle = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  pages     = {416--423},
  year      = {2010},
  crossref  = {DBLP:conf/fc/2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3\_37},
  doi       = {10.1007/978-3-642-14577-3\_37},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/GrossklagsJC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/JohnsonGCC10,
  author    = {Benjamin Johnson and
               Jens Grossklags and
               Nicolas Christin and
               John Chuang},
  title     = {Uncertainty in Interdependent Security Games},
  booktitle = {Decision and Game Theory for Security - First International Conference,
               GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  pages     = {234--244},
  year      = {2010},
  crossref  = {DBLP:conf/gamesec/2010},
  url       = {https://doi.org/10.1007/978-3-642-17197-0\_16},
  doi       = {10.1007/978-3-642-17197-0\_16},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/JohnsonGCC10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tqc/Johnson10,
  author    = {Benjamin Johnson},
  title     = {The Polynomial Degree of Recursive Fourier Sampling},
  booktitle = {Theory of Quantum Computation, Communication, and Cryptography - 5th
               Conference, {TQC} 2010, Leeds, UK, April 13-15, 2010, Revised Selected
               Papers},
  pages     = {104--112},
  year      = {2010},
  crossref  = {DBLP:conf/tqc/2010},
  url       = {https://doi.org/10.1007/978-3-642-18073-6\_9},
  doi       = {10.1007/978-3-642-18073-6\_9},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tqc/Johnson10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/GrossklagsJ09,
  author    = {Jens Grossklags and
               Benjamin Johnson},
  title     = {Uncertainty in the weakest-link security game},
  booktitle = {1st International Conference on Game Theory for Networks, {GAMENETS}
               2009, Istanbul, Turkey, May 13-15, 2009},
  pages     = {673--682},
  year      = {2009},
  crossref  = {DBLP:conf/gamenets/2009},
  url       = {https://doi.org/10.1109/GAMENETS.2009.5137460},
  doi       = {10.1109/GAMENETS.2009.5137460},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamenets/GrossklagsJ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weis/GrossklagsJC09,
  author    = {Jens Grossklags and
               Benjamin Johnson and
               Nicolas Christin},
  title     = {The Price of Uncertainty in Security Games},
  booktitle = {8th Annual Workshop on the Economics of Information Security, {WEIS}
               2009, University College London, England, UK, June 24-25, 2009},
  year      = {2009},
  crossref  = {DBLP:conf/weis/2009},
  url       = {http://weis09.infosecon.net/files/161/index.html},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/weis/GrossklagsJC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LaskowskiJC08,
  author    = {Paul Laskowski and
               Benjamin Johnson and
               John Chuang},
  title     = {User-directed routing: from theory, towards practice},
  booktitle = {Proceedings of the {ACM} {SIGCOMM} 2008 Workshop on Economics of Networked
               Systems, NetEcon 2008, Seattle, WA, USA, August 22, 2008},
  pages     = {1--6},
  year      = {2008},
  crossref  = {DBLP:conf/sigcomm/2008netecon},
  url       = {https://doi.org/10.1145/1403027.1403029},
  doi       = {10.1145/1403027.1403029},
  timestamp = {Mon, 18 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/LaskowskiJC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ithings/2018,
  title     = {{IEEE} International Conference on Internet of Things (iThings) and
               {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
               Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
               iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
               30 - August 3, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8716290/proceeding},
  isbn      = {978-1-5386-7975-3},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ithings/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pac/2018,
  title     = {2018 {IEEE} Symposium on Privacy-Aware Computing, {PAC} 2018, Washington,
               DC, USA, September 26-28, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8510985/proceeding},
  isbn      = {978-1-5386-8442-9},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pac/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/tdhms/2015-10,
  editor    = {Yun Q. Shi},
  title     = {Transactions on Data Hiding and Multimedia Security {X}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8948},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46739-8},
  doi       = {10.1007/978-3-662-46739-8},
  isbn      = {978-3-662-46738-1},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdhms/2015-10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2015w,
  editor    = {Michael Brenner and
               Nicolas Christin and
               Benjamin Johnson and
               Kurt Rohloff},
  title     = {Financial Cryptography and Data Security - {FC} 2015 International
               Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January
               30, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8976},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48051-9},
  doi       = {10.1007/978-3-662-48051-9},
  isbn      = {978-3-662-48050-2},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2015w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2015,
  editor    = {M. H. R. Khouzani and
               Emmanouil A. Panaousis and
               George Theodorakopoulos},
  title     = {Decision and Game Theory for Security - 6th International Conference,
               GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9406},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-25594-1},
  doi       = {10.1007/978-3-319-25594-1},
  isbn      = {978-3-319-25593-4},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/phycs/2015,
  editor    = {Hugo Pl{\'{a}}cido da Silva and
               Pierre Chauvet and
               Andreas Holzinger and
               Stephen H. Fairclough and
               Dennis Majoe},
  title     = {PhyCS 2015 - Proceedings of the 2nd International Conference on Physiological
               Computing Systems, ESEO, Angers, Loire Valley, France, 11 - 13 February,
               2015},
  publisher = {SciTePress},
  year      = {2015},
  isbn      = {978-989-758-085-7},
  timestamp = {Thu, 06 Aug 2015 11:31:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/phycs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/weis/2015,
  title     = {14th Annual Workshop on the Economics of Information Security, {WEIS}
               2015, Delft, The Netherlands, 22-23 June, 2015},
  year      = {2015},
  url       = {http://www.econinfosec.org/archive/weis2015/},
  timestamp = {Fri, 13 Jan 2017 12:04:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/weis/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014asia,
  editor    = {Shiho Moriai and
               Trent Jaeger and
               Kouichi Sakurai},
  title     = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2590296},
  isbn      = {978-1-4503-2800-5},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2014,
  title     = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
               Austria, 19-22 July, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6954678/proceeding},
  isbn      = {978-1-4799-4290-9},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2014w,
  editor    = {Rainer B{\"{o}}hme and
               Michael Brenner and
               Tyler Moore and
               Matthew Smith},
  title     = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
               and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8438},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44774-1},
  doi       = {10.1007/978-3-662-44774-1},
  isbn      = {978-3-662-44773-4},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2014w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2014,
  editor    = {Nicolas Christin and
               Reihaneh Safavi{-}Naini},
  title     = {Financial Cryptography and Data Security - 18th International Conference,
               {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8437},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45472-5},
  doi       = {10.1007/978-3-662-45472-5},
  isbn      = {978-3-662-45471-8},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/huc/2014ap,
  editor    = {A. J. Brush and
               Adrian Friday and
               Julie A. Kientz and
               James Scott and
               Junehwa Song},
  title     = {The 2014 {ACM} Conference on Ubiquitous Computing, UbiComp '14 Adjunct,
               Seattle, WA, {USA} - September 13 - 17, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2638728},
  isbn      = {978-1-4503-3047-3},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/huc/2014ap},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2013,
  editor    = {Jason Crampton and
               Sushil Jajodia and
               Keith Mayes},
  title     = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8134},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6},
  doi       = {10.1007/978-3-642-40203-6},
  isbn      = {978-3-642-40202-9},
  timestamp = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eusipco/2013,
  title     = {21st European Signal Processing Conference, {EUSIPCO} 2013, Marrakech,
               Morocco, September 9-13, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6805348/proceeding},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eusipco/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2013w,
  editor    = {Andrew A. Adams and
               Michael Brenner and
               Matthew Smith},
  title     = {Financial Cryptography and Data Security - {FC} 2013 Workshops, {USEC}
               and {WAHC} 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7862},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-41320-9},
  doi       = {10.1007/978-3-642-41320-9},
  isbn      = {978-3-642-41319-3},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2013w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2013,
  editor    = {Sajal K. Das and
               Cristina Nita{-}Rotaru and
               Murat Kantarcioglu},
  title     = {Decision and Game Theory for Security - 4th International Conference,
               GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8252},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-02786-9},
  doi       = {10.1007/978-3-319-02786-9},
  isbn      = {978-3-319-02785-2},
  timestamp = {Tue, 10 Sep 2019 13:47:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdw/2013,
  editor    = {Yun{-}Qing Shi and
               Hyoung{-}Joong Kim and
               Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez},
  title     = {Digital-Forensics and Watermarking - 12th International Workshop,
               {IWDW} 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8389},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-43886-2},
  doi       = {10.1007/978-3-662-43886-2},
  isbn      = {978-3-662-43885-5},
  timestamp = {Tue, 14 May 2019 10:00:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwdw/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wine/2013,
  editor    = {Yiling Chen and
               Nicole Immorlica},
  title     = {Web and Internet Economics - 9th International Conference, {WINE}
               2013, Cambridge, MA, USA, December 11-14, 2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8289},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-45046-4},
  doi       = {10.1007/978-3-642-45046-4},
  isbn      = {978-3-642-45045-7},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wine/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2012,
  editor    = {Angelos D. Keromytis},
  title     = {Financial Cryptography and Data Security - 16th International Conference,
               {FC} 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7397},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32946-3},
  doi       = {10.1007/978-3-642-32946-3},
  isbn      = {978-3-642-32945-6},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2012,
  editor    = {Jens Grossklags and
               Jean C. Walrand},
  title     = {Decision and Game Theory for Security - Third International Conference,
               GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7638},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34266-0},
  doi       = {10.1007/978-3-642-34266-0},
  isbn      = {978-3-642-34265-3},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamenets/2011,
  editor    = {Rahul Jain and
               Rajgopal Kannan},
  title     = {Game Theory for Networks - 2nd International {ICST} Conference, {GAMENETS}
               2011, Shanghai, China, April 16-18, 2011, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {75},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30373-9},
  doi       = {10.1007/978-3-642-30373-9},
  isbn      = {978-3-642-30372-2},
  timestamp = {Mon, 05 Nov 2018 11:12:21 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/gamenets/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2011,
  editor    = {John S. Baras and
               Jonathan Katz and
               Eitan Altman},
  title     = {Decision and Game Theory for Security - Second International Conference,
               GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7037},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25280-8},
  doi       = {10.1007/978-3-642-25280-8},
  isbn      = {978-3-642-25279-2},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
  editor    = {Dimitris Gritzalis and
               Bart Preneel and
               Marianthi Theoharidou},
  title     = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6345},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3},
  doi       = {10.1007/978-3-642-15497-3},
  isbn      = {978-3-642-15496-6},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010,
  editor    = {Radu Sion},
  title     = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6052},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3},
  doi       = {10.1007/978-3-642-14577-3},
  isbn      = {978-3-642-14576-6},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2010,
  editor    = {Tansu Alpcan and
               Levente Butty{\'{a}}n and
               John S. Baras},
  title     = {Decision and Game Theory for Security - First International Conference,
               GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6442},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17197-0},
  doi       = {10.1007/978-3-642-17197-0},
  isbn      = {978-3-642-17196-3},
  timestamp = {Tue, 14 May 2019 10:00:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tqc/2010,
  editor    = {Wim van Dam and
               Vivien M. Kendon and
               Simone Severini},
  title     = {Theory of Quantum Computation, Communication, and Cryptography - 5th
               Conference, {TQC} 2010, Leeds, UK, April 13-15, 2010, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6519},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-18073-6},
  doi       = {10.1007/978-3-642-18073-6},
  isbn      = {978-3-642-18072-9},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tqc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamenets/2009,
  editor    = {Tamer Basar and
               Hitay {\"{O}}zbay},
  title     = {1st International Conference on Game Theory for Networks, {GAMENETS}
               2009, Istanbul, Turkey, May 13-15, 2009},
  publisher = {{IEEE}},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5076471/proceeding},
  isbn      = {978-1-4244-4176-1},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamenets/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/weis/2009,
  title     = {8th Annual Workshop on the Economics of Information Security, {WEIS}
               2009, University College London, England, UK, June 24-25, 2009},
  year      = {2009},
  url       = {http://weis2009.econinfosec.org/},
  timestamp = {Fri, 13 Jan 2017 12:11:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/weis/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2008netecon,
  editor    = {Joan Feigenbaum and
               Yang Richard Yang},
  title     = {Proceedings of the {ACM} {SIGCOMM} 2008 Workshop on Economics of Networked
               Systems, NetEcon 2008, Seattle, WA, USA, August 22, 2008},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://dl.acm.org/citation.cfm?id=1403027},
  isbn      = {978-1-60558-179-8},
  timestamp = {Wed, 09 Jan 2019 16:32:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2008netecon},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics