Search dblp for Publications

export results for "toc:db/conf/fc/fc2012w.bht:"

 download as .bib file

@inproceedings{DBLP:conf/fc/Anderson12,
  author       = {Ross J. Anderson},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Ethics Committees and IRBs: Boon, or Bane, or More Research Needed?},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {133--135},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_12},
  doi          = {10.1007/978-3-642-34638-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Anderson12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BaileyKD12,
  author       = {Michael D. Bailey and
                  Erin Kenneally and
                  David Dittrich},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {A Refined Ethical Impact Assessment Tool and a Case Study of Its Application},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {112--123},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_10},
  doi          = {10.1007/978-3-642-34638-5\_10},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BaileyKD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BonneauS12,
  author       = {Joseph Bonneau and
                  Ekaterina Shutova},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Linguistic Properties of Multi-word Passphrases},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_1},
  doi          = {10.1007/978-3-642-34638-5\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BonneauS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CarlosP12,
  author       = {Marcelo Carlomagno Carlos and
                  Geraint Price},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Understanding the Weaknesses of Human-Protocol Interaction},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_2},
  doi          = {10.1007/978-3-642-34638-5\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CarlosP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CzeskisA12,
  author       = {Alexei Czeskis and
                  Jacob Appelbaum},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {High Stakes: Designing a Privacy Preserving Registry},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {27--43},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_3},
  doi          = {10.1007/978-3-642-34638-5\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CzeskisA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CzeskisB12,
  author       = {Alexei Czeskis and
                  Dirk Balfanz},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Protected Login},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {44--52},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_4},
  doi          = {10.1007/978-3-642-34638-5\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CzeskisB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Dong12,
  author       = {Zheng Dong},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Enabling Users to Self-manage Networks: Collaborative Anomaly Detection
                  in Wireless Personal Area Networks},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {53--67},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_5},
  doi          = {10.1007/978-3-642-34638-5\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Dong12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/EgelmanBCDS12,
  author       = {Serge Egelman and
                  Joseph Bonneau and
                  Sonia Chiasson and
                  David Dittrich and
                  Stuart E. Schechter},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {It's Not Stealing If You Need It: {A} Panel on the Ethics of Performing
                  Research Using Public Data of Illicit Origin},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {124--132},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_11},
  doi          = {10.1007/978-3-642-34638-5\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/EgelmanBCDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FernandezPZ12,
  author       = {Jos{\'{e}} M. Fernandez and
                  Andrew S. Patrick and
                  Lenore D. Zuck},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Ethical and Secure Data Sharing across Borders},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {136--140},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_13},
  doi          = {10.1007/978-3-642-34638-5\_13},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/FernandezPZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KelleyCCJSW12,
  author       = {Patrick Gage Kelley and
                  Sunny Consolvo and
                  Lorrie Faith Cranor and
                  Jaeyeon Jung and
                  Norman M. Sadeh and
                  David Wetherall},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {A Conundrum of Permissions: Installing Applications on an Android
                  Smartphone},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_6},
  doi          = {10.1007/978-3-642-34638-5\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KelleyCCJSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/LevesqueDFCS12,
  author       = {Fanny Lalonde L{\'{e}}vesque and
                  Carlton R. Davis and
                  Jos{\'{e}} M. Fernandez and
                  Sonia Chiasson and
                  Anil Somayaji},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Methodology for a Field Study of Anti-malware Software},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {80--85},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_7},
  doi          = {10.1007/978-3-642-34638-5\_7},
  timestamp    = {Thu, 21 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/LevesqueDFCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/PatilGLK12,
  author       = {Sameer Patil and
                  Yann Le Gall and
                  Adam J. Lee and
                  Apu Kapadia},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {My Privacy Policy: Exploring End-user Specification of Free-form Location
                  Access Rules},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {86--97},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_8},
  doi          = {10.1007/978-3-642-34638-5\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/PatilGLK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/WestHPL12,
  author       = {Andrew G. West and
                  Pedram Hayati and
                  Vidyasagar M. Potdar and
                  Insup Lee},
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Spamming for Science: Active Measurement in Web 2.0 Abuse Research},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  pages        = {98--111},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5\_9},
  doi          = {10.1007/978-3-642-34638-5\_9},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/WestHPL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2012w,
  editor       = {Jim Blythe and
                  Sven Dietrich and
                  L. Jean Camp},
  title        = {Financial Cryptography and Data Security - {FC} 2012 Workshops, {USEC}
                  and {WECSR} 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7398},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34638-5},
  doi          = {10.1007/978-3-642-34638-5},
  isbn         = {978-3-642-34637-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2012w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics