Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/fc/fc2016.bht:"
@proceedings{DBLP:conf/fc/2016, editor = {Jens Grossklags and Bart Preneel}, title = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54970-4}, doi = {10.1007/978-3-662-54970-4}, isbn = {978-3-662-54969-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AbadiTD16, author = {Aydin Abadi and Sotirios Terzis and Changyu Dong}, editor = {Jens Grossklags and Bart Preneel}, title = {{VD-PSI:} Verifiable Delegated Private Set Intersection on Outsourced Private Datasets}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {149--168}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_9}, doi = {10.1007/978-3-662-54970-4\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/AbadiTD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AlgwilY16, author = {Abdalnaser Algwil and Jeff Yan}, editor = {Jens Grossklags and Bart Preneel}, title = {Failures of Security APIs: {A} New Case}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {283--298}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_17}, doi = {10.1007/978-3-662-54970-4\_17}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AlgwilY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AljuraidanBRB16, author = {Jassim Aljuraidan and Lujo Bauer and Michael K. Reiter and Matthias Beckerle}, editor = {Jens Grossklags and Bart Preneel}, title = {Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {60--77}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_4}, doi = {10.1007/978-3-662-54970-4\_4}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AljuraidanBRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AlyV16, author = {Abdelrahaman Aly and Mathieu Van Vyve}, editor = {Jens Grossklags and Bart Preneel}, title = {Practically Efficient Secure Single-Commodity Multi-market Auctions}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {110--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_7}, doi = {10.1007/978-3-662-54970-4\_7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AlyV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AnandS16, author = {S. Abhishek Anand and Nitesh Saxena}, editor = {Jens Grossklags and Bart Preneel}, title = {A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {346--364}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_21}, doi = {10.1007/978-3-662-54970-4\_21}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AnandS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ArshadK016, author = {Sajjad Arshad and Amin Kharraz and William Robertson}, editor = {Jens Grossklags and Bart Preneel}, title = {Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {441--459}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_26}, doi = {10.1007/978-3-662-54970-4\_26}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ArshadK016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BarkiBDGGT16, author = {Amira Barki and Solenn Brunet and Nicolas Desmoulins and S{\'{e}}bastien Gambs and Sa{\"{\i}}d Gharout and Jacques Traor{\'{e}}}, editor = {Jens Grossklags and Bart Preneel}, title = {Private eCash in Practice (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {99--109}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_6}, doi = {10.1007/978-3-662-54970-4\_6}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BarkiBDGGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Carrigan0R16, author = {Joseph Carrigan and Paul D. Martin and Michael Rushanan}, editor = {Jens Grossklags and Bart Preneel}, title = {{KBID:} Kerberos Bracelet Identification (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {544--551}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_32}, doi = {10.1007/978-3-662-54970-4\_32}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Carrigan0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CarterMLRK16, author = {Patrick Carter and Collin Mulliner and Martina Lindorfer and William K. Robertson and Engin Kirda}, editor = {Jens Grossklags and Bart Preneel}, title = {CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {231--249}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_13}, doi = {10.1007/978-3-662-54970-4\_13}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CarterMLRK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CaulfieldIP16, author = {Tristan Caulfield and Christos Ioannidis and David J. Pym}, editor = {Jens Grossklags and Bart Preneel}, title = {Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {271--279}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_16}, doi = {10.1007/978-3-662-54970-4\_16}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CaulfieldIP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ChenZWL16, author = {Liuhua Chen and Shenghai Zhong and Li{-}e Wang and Xianxian Li}, editor = {Jens Grossklags and Bart Preneel}, title = {A Sensitivity-Adaptive {\(\rho\)}-Uncertainty Model for Set-Valued Data}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {460--473}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_27}, doi = {10.1007/978-3-662-54970-4\_27}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ChenZWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ColettaVM16, author = {Alberto Coletta and Victor van der Veen and Federico Maggi}, editor = {Jens Grossklags and Bart Preneel}, title = {DroydSeuss: {A} Mobile Banking Trojan Tracker (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {250--259}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_14}, doi = {10.1007/978-3-662-54970-4\_14}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ColettaVM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DamgardDNNT16, author = {Ivan Damg{\aa}rd and Kasper Damg{\aa}rd and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft}, editor = {Jens Grossklags and Bart Preneel}, title = {Confidential Benchmarking Based on Multiparty Computation}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {169--187}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_10}, doi = {10.1007/978-3-662-54970-4\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/DamgardDNNT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FernandesCPEHMP16, author = {Earlence Fernandes and Qi Alfred Chen and Justin Paupore and Georg Essl and J. Alex Halderman and Zhuoqing Morley Mao and Atul Prakash}, editor = {Jens Grossklags and Bart Preneel}, title = {Android {UI} Deception Revisited: Attacks and Defenses}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {41--59}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_3}, doi = {10.1007/978-3-662-54970-4\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/FernandesCPEHMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Garman0M16, author = {Christina Garman and Matthew Green and Ian Miers}, editor = {Jens Grossklags and Bart Preneel}, title = {Accountable Privacy for Decentralized Anonymous Payments}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {81--98}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_5}, doi = {10.1007/978-3-662-54970-4\_5}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Garman0M16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GuaschM16, author = {Sandra Guasch and Paz Morillo}, editor = {Jens Grossklags and Bart Preneel}, title = {How to Challenge and Cast Your e-Vote}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {130--145}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_8}, doi = {10.1007/978-3-662-54970-4\_8}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/GuaschM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HanzlikK16, author = {Lucjan Hanzlik and Kamil Kluczniak}, editor = {Jens Grossklags and Bart Preneel}, title = {A Short Paper on Blind Signatures from Knowledge Assumptions}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {535--543}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_31}, doi = {10.1007/978-3-662-54970-4\_31}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/HanzlikK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HeuserNPS16, author = {Stephan Heuser and Marco Negro and Praveen Kumar Pendyala and Ahmad{-}Reza Sadeghi}, editor = {Jens Grossklags and Bart Preneel}, title = {DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {260--268}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_15}, doi = {10.1007/978-3-662-54970-4\_15}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/HeuserNPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KilincK16, author = {Handan Kilin{\c{c}} and Alptekin K{\"{u}}p{\c{c}}{\"{u}}}, editor = {Jens Grossklags and Bart Preneel}, title = {Efficiently Making Secure Two-Party Computation Fair}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {188--207}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_11}, doi = {10.1007/978-3-662-54970-4\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KilincK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KonothVB16, author = {Radhesh Krishnan Konoth and Victor van der Veen and Herbert Bos}, editor = {Jens Grossklags and Bart Preneel}, title = {How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {405--421}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_24}, doi = {10.1007/978-3-662-54970-4\_24}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/KonothVB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KrasnovaNS16, author = {Anna Krasnova and Moritz Neikes and Peter Schwabe}, editor = {Jens Grossklags and Bart Preneel}, title = {Footprint Scheduling for Dining-Cryptographer Networks}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {385--402}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_23}, doi = {10.1007/978-3-662-54970-4\_23}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KrasnovaNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KrombholzJGW16, author = {Katharina Krombholz and Aljosha Judmayer and Matthias Gusenbauer and Edgar R. Weippl}, editor = {Jens Grossklags and Bart Preneel}, title = {The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {555--580}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_33}, doi = {10.1007/978-3-662-54970-4\_33}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KrombholzJGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KupcuM16, author = {Alptekin K{\"{u}}p{\c{c}}{\"{u}} and Payman Mohassel}, editor = {Jens Grossklags and Bart Preneel}, title = {Fast Optimistically Fair Cut-and-Choose 2PC}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {208--228}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_12}, doi = {10.1007/978-3-662-54970-4\_12}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KupcuM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LangCBSS16, author = {Juan Lang and Alexei Czeskis and Dirk Balfanz and Marius Schilder and Sampath Srinivas}, editor = {Jens Grossklags and Bart Preneel}, title = {Security Keys: Practical Cryptographic Second Factors for the Modern Web}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {422--440}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_25}, doi = {10.1007/978-3-662-54970-4\_25}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/LangCBSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/McCorrySH16, author = {Patrick McCorry and Siamak F. Shahandashti and Feng Hao}, editor = {Jens Grossklags and Bart Preneel}, title = {Refund Attacks on Bitcoin's Payment Protocol}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {581--599}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_34}, doi = {10.1007/978-3-662-54970-4\_34}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/McCorrySH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MolloyCFWJHPJS16, author = {Ian M. Molloy and Suresh Chari and Ulrich Finkler and Mark Wiggerman and Coen Jonker and Ted Habeck and Youngja Park and Frank Jordens and Ron van Schaik}, editor = {Jens Grossklags and Bart Preneel}, title = {Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {22--40}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_2}, doi = {10.1007/978-3-662-54970-4\_2}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MolloyCFWJHPJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MurdochBAABHSS16, author = {Steven J. Murdoch and Ingolf Becker and Ruba Abu{-}Salma and Ross J. Anderson and Nicholas Bohm and Alice Hutchings and M. Angela Sasse and Gianluca Stringhini}, editor = {Jens Grossklags and Bart Preneel}, title = {Are Payment Card Contracts Unfair? (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {600--608}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_35}, doi = {10.1007/978-3-662-54970-4\_35}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MurdochBAABHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ParkMS16, author = {Youngsam Park and Damon McCoy and Elaine Shi}, editor = {Jens Grossklags and Bart Preneel}, title = {Understanding Craigslist Rental Scams}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {3--21}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_1}, doi = {10.1007/978-3-662-54970-4\_1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ParkMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SapirshteinSZ16, author = {Ayelet Sapirshtein and Yonatan Sompolinsky and Aviv Zohar}, editor = {Jens Grossklags and Bart Preneel}, title = {Optimal Selfish Mining Strategies in Bitcoin}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {515--532}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_30}, doi = {10.1007/978-3-662-54970-4\_30}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/SapirshteinSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Schoenmakers16, author = {Berry Schoenmakers}, editor = {Jens Grossklags and Bart Preneel}, title = {Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {299--320}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_18}, doi = {10.1007/978-3-662-54970-4\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Schoenmakers16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/SchrijversBBR16, author = {Okke Schrijvers and Joseph Bonneau and Dan Boneh and Tim Roughgarden}, editor = {Jens Grossklags and Bart Preneel}, title = {Incentive Compatibility of Bitcoin Mining Pool Reward Functions}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {477--498}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_28}, doi = {10.1007/978-3-662-54970-4\_28}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/SchrijversBBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/TeutschJS16, author = {Jason Teutsch and Sanjay Jain and Prateek Saxena}, editor = {Jens Grossklags and Bart Preneel}, title = {When Cryptocurrencies Mine Their Own Business}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {499--514}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_29}, doi = {10.1007/978-3-662-54970-4\_29}, timestamp = {Wed, 16 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/TeutschJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ValentaCLFBH16, author = {Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger}, editor = {Jens Grossklags and Bart Preneel}, title = {Factoring as a Service}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {321--338}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_19}, doi = {10.1007/978-3-662-54970-4\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ValentaCLFBH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/VanrykelAHD16, author = {Eline Vanrykel and Gunes Acar and Michael Herrmann and Claudia D{\'{\i}}az}, editor = {Jens Grossklags and Bart Preneel}, title = {Leaky Birds: Exploiting Mobile Application Traffic for Surveillance}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {367--384}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_22}, doi = {10.1007/978-3-662-54970-4\_22}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/VanrykelAHD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/VasekBCKM16, author = {Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore}, editor = {Jens Grossklags and Bart Preneel}, title = {The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {609--618}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_36}, doi = {10.1007/978-3-662-54970-4\_36}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/VasekBCKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/VerheulRH16, author = {Eric R. Verheul and Sietse Ringers and Jaap{-}Henk Hoepman}, editor = {Jens Grossklags and Bart Preneel}, title = {The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 20th International Conference, {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {339--345}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-54970-4\_20}, doi = {10.1007/978-3-662-54970-4\_20}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/VerheulRH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.