Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/fc/fc2012w.bht:"
@inproceedings{DBLP:conf/fc/Anderson12, author = {Ross J. Anderson}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Ethics Committees and IRBs: Boon, or Bane, or More Research Needed?}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {133--135}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_12}, doi = {10.1007/978-3-642-34638-5\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Anderson12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BaileyKD12, author = {Michael D. Bailey and Erin Kenneally and David Dittrich}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {A Refined Ethical Impact Assessment Tool and a Case Study of Its Application}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {112--123}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_10}, doi = {10.1007/978-3-642-34638-5\_10}, timestamp = {Mon, 20 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/BaileyKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BonneauS12, author = {Joseph Bonneau and Ekaterina Shutova}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Linguistic Properties of Multi-word Passphrases}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {1--12}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_1}, doi = {10.1007/978-3-642-34638-5\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BonneauS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CarlosP12, author = {Marcelo Carlomagno Carlos and Geraint Price}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Understanding the Weaknesses of Human-Protocol Interaction}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {13--26}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_2}, doi = {10.1007/978-3-642-34638-5\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CarlosP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CzeskisA12, author = {Alexei Czeskis and Jacob Appelbaum}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {High Stakes: Designing a Privacy Preserving Registry}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {27--43}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_3}, doi = {10.1007/978-3-642-34638-5\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CzeskisA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CzeskisB12, author = {Alexei Czeskis and Dirk Balfanz}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Protected Login}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {44--52}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_4}, doi = {10.1007/978-3-642-34638-5\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CzeskisB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Dong12, author = {Zheng Dong}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {53--67}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_5}, doi = {10.1007/978-3-642-34638-5\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Dong12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/EgelmanBCDS12, author = {Serge Egelman and Joseph Bonneau and Sonia Chiasson and David Dittrich and Stuart E. Schechter}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {It's Not Stealing If You Need It: {A} Panel on the Ethics of Performing Research Using Public Data of Illicit Origin}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {124--132}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_11}, doi = {10.1007/978-3-642-34638-5\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/EgelmanBCDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FernandezPZ12, author = {Jos{\'{e}} M. Fernandez and Andrew S. Patrick and Lenore D. Zuck}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Ethical and Secure Data Sharing across Borders}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {136--140}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_13}, doi = {10.1007/978-3-642-34638-5\_13}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/FernandezPZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KelleyCCJSW12, author = {Patrick Gage Kelley and Sunny Consolvo and Lorrie Faith Cranor and Jaeyeon Jung and Norman M. Sadeh and David Wetherall}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {A Conundrum of Permissions: Installing Applications on an Android Smartphone}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {68--79}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_6}, doi = {10.1007/978-3-642-34638-5\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KelleyCCJSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LevesqueDFCS12, author = {Fanny Lalonde L{\'{e}}vesque and Carlton R. Davis and Jos{\'{e}} M. Fernandez and Sonia Chiasson and Anil Somayaji}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Methodology for a Field Study of Anti-malware Software}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {80--85}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_7}, doi = {10.1007/978-3-642-34638-5\_7}, timestamp = {Thu, 21 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/LevesqueDFCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/PatilGLK12, author = {Sameer Patil and Yann Le Gall and Adam J. Lee and Apu Kapadia}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {86--97}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_8}, doi = {10.1007/978-3-642-34638-5\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/PatilGLK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/WestHPL12, author = {Andrew G. West and Pedram Hayati and Vidyasagar M. Potdar and Insup Lee}, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Spamming for Science: Active Measurement in Web 2.0 Abuse Research}, booktitle = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, pages = {98--111}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5\_9}, doi = {10.1007/978-3-642-34638-5\_9}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/WestHPL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2012w, editor = {Jim Blythe and Sven Dietrich and L. Jean Camp}, title = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC} and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7398}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34638-5}, doi = {10.1007/978-3-642-34638-5}, isbn = {978-3-642-34637-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2012w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.