- 2010
- Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett:
A Learning-Based Approach to Reactive Security. Financial Cryptography 2010: 192-206 - John Bethencourt, Elaine Shi, Dawn Song:
Signatures of Reputation. Financial Cryptography 2010: 400-407 - Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakrishnan:
Automatically Preparing Safe SQL Queries. Financial Cryptography 2010: 272-288 - Mathias Björkqvist, Christian Cachin, Robert Haas, Xiao-Yu Hu, Anil Kurmus, René Pawlitzek, Marko Vukolic:
Design and Implementation of a Key-Lifecycle Management System. Financial Cryptography 2010: 160-174 - Joseph Bonneau, Mike Just, Greg Matthews:
What's in a Name? Financial Cryptography 2010: 98-113 - Daniel Bußmeyer, Felix Gröbert, Jörg Schwenk, Christoph Wegener:
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. Financial Cryptography 2010: 320-327 - Pino Caballero-Gil, Jezabel Molina-Gil, Cándido Caballero-Gil, Candelaria Hernández-Goya:
Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks. Financial Cryptography 2010: 427 - Jan Camenisch, Maria Dubovitskaya, Gregory Neven:
Unlinkable Priced Oblivious Transfer with Rechargeable Wallets. Financial Cryptography 2010: 66-81 - Sébastien Canard, Aline Gouget:
Multiple Denominations in E-cash with Compact Transaction Data. Financial Cryptography 2010: 82-97 - Octavian Catrina, Amitabh Saxena:
Secure Computation with Fixed-Point Numbers. Financial Cryptography 2010: 35-50 - Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Jangseong Kim, Kwangjo Kim:
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. Financial Cryptography 2010: 304-311 - Pern Hui Chia:
Certification Intermediaries and the Alternative (Poster). Financial Cryptography 2010: 425 - Tom Chothia, Vitaliy Smirnov:
A Traceability Attack against e-Passports. Financial Cryptography 2010: 20-34 - Lorrie Faith Cranor:
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory. Financial Cryptography 2010: 3 - Emiliano De Cristofaro, Gene Tsudik:
Practical Private Set Intersection Protocols with Linear Complexity. Financial Cryptography 2010: 143-159 - Ivan Damgård, Marcel Keller:
Secure Multiparty AES. Financial Cryptography 2010: 367-374 - Ryan W. Gardner, Sujata Garera, Aviel D. Rubin:
Designing for Audit: A Voting Machine with a Tiny TCB. Financial Cryptography 2010: 312-319 - Lilia Georgieva:
Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols. Financial Cryptography 2010: 428 - Jens Grossklags, Benjamin Johnson, Nicolas Christin:
When Information Improves Information Security. Financial Cryptography 2010: 416-423 - Bogdan Groza, Marius Minea:
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing. Financial Cryptography 2010: 391-399 - Slawomir Grzonkowski:
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs. Financial Cryptography 2010: 426 - Jorge Guajardo, Bart Mennink, Berry Schoenmakers:
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis. Financial Cryptography 2010: 375-382 - Feng Hao:
On Robust Key Agreement Based on Public Key Authentication. Financial Cryptography 2010: 383-390 - Jean-Pierre Hubaux:
Security Mechanisms with Selfish Players in Wireless Networks. Financial Cryptography 2010: 2 - Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider:
Embedded SFE: Offloading Server and Network Using Hardware Tokens. Financial Cryptography 2010: 207-221 - Dan Kaminsky, Meredith L. Patterson, Len Sassaman:
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure. Financial Cryptography 2010: 289-303 - Paul A. Karger, David C. Toll, Elaine R. Palmer, Suzanne McIntosh, Samuel Weber, Jonathan W. Edwards:
Implementing a High-Assurance Smart-Card OS. Financial Cryptography 2010: 51-65 - Timo Kasper, Michael Silbermann, Christof Paar:
All You Can Eat or Breaking a Real-World Contactless Payment System. Financial Cryptography 2010: 343-350 - Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. Financial Cryptography 2010: 359-366 - Aggelos Kiayias, Moti Yung:
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections. Financial Cryptography 2010: 257-271