Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2017
- Jens Grossklags, Bart Preneel:
Financial Cryptography and Data Security - 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9603, Springer 2017, ISBN 978-3-662-54969-8 [contents] - 2016
- Aydin Abadi, Sotirios Terzis, Changyu Dong:
VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets. Financial Cryptography 2016: 149-168 - Abdalnaser Algwil, Jeff Yan:
Failures of Security APIs: A New Case. Financial Cryptography 2016: 283-298 - Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. Financial Cryptography 2016: 60-77 - Abdelrahaman Aly, Mathieu Van Vyve:
Practically Efficient Secure Single-Commodity Multi-market Auctions. Financial Cryptography 2016: 110-129 - S. Abhishek Anand, Nitesh Saxena:
A Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds. Financial Cryptography 2016: 346-364 - Sajjad Arshad, Amin Kharraz, William Robertson:
Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. Financial Cryptography 2016: 441-459 - Amira Barki, Solenn Brunet, Nicolas Desmoulins, Sébastien Gambs, Saïd Gharout, Jacques Traoré:
Private eCash in Practice (Short Paper). Financial Cryptography 2016: 99-109 - Joseph Carrigan, Paul D. Martin, Michael Rushanan:
KBID: Kerberos Bracelet Identification (Short Paper). Financial Cryptography 2016: 544-551 - Patrick Carter, Collin Mulliner, Martina Lindorfer, William K. Robertson, Engin Kirda:
CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. Financial Cryptography 2016: 231-249 - Tristan Caulfield, Christos Ioannidis, David J. Pym:
Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper). Financial Cryptography 2016: 271-279 - Liuhua Chen, Shenghai Zhong, Li-e Wang, Xianxian Li:
A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data. Financial Cryptography 2016: 460-473 - Alberto Coletta, Victor van der Veen, Federico Maggi:
DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper). Financial Cryptography 2016: 250-259 - Ivan Damgård, Kasper Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft:
Confidential Benchmarking Based on Multiparty Computation. Financial Cryptography 2016: 169-187 - Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Zhuoqing Morley Mao, Atul Prakash:
Android UI Deception Revisited: Attacks and Defenses. Financial Cryptography 2016: 41-59 - Christina Garman, Matthew Green, Ian Miers:
Accountable Privacy for Decentralized Anonymous Payments. Financial Cryptography 2016: 81-98 - Sandra Guasch, Paz Morillo:
How to Challenge and Cast Your e-Vote. Financial Cryptography 2016: 130-145 - Lucjan Hanzlik, Kamil Kluczniak:
A Short Paper on Blind Signatures from Knowledge Assumptions. Financial Cryptography 2016: 535-543 - Stephan Heuser, Marco Negro, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi:
DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper). Financial Cryptography 2016: 260-268 - Handan Kilinç, Alptekin Küpçü:
Efficiently Making Secure Two-Party Computation Fair. Financial Cryptography 2016: 188-207 - Radhesh Krishnan Konoth, Victor van der Veen, Herbert Bos:
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication. Financial Cryptography 2016: 405-421 - Anna Krasnova, Moritz Neikes, Peter Schwabe:
Footprint Scheduling for Dining-Cryptographer Networks. Financial Cryptography 2016: 385-402 - Katharina Krombholz, Aljosha Judmayer, Matthias Gusenbauer, Edgar R. Weippl:
The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. Financial Cryptography 2016: 555-580 - Alptekin Küpçü, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. Financial Cryptography 2016: 208-228 - Juan Lang, Alexei Czeskis, Dirk Balfanz, Marius Schilder, Sampath Srinivas:
Security Keys: Practical Cryptographic Second Factors for the Modern Web. Financial Cryptography 2016: 422-440 - Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
Refund Attacks on Bitcoin's Payment Protocol. Financial Cryptography 2016: 581-599 - Ian M. Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens, Ron van Schaik:
Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. Financial Cryptography 2016: 22-40 - Steven J. Murdoch, Ingolf Becker, Ruba Abu-Salma, Ross J. Anderson, Nicholas Bohm, Alice Hutchings, M. Angela Sasse, Gianluca Stringhini:
Are Payment Card Contracts Unfair? (Short Paper). Financial Cryptography 2016: 600-608 - Youngsam Park, Damon McCoy, Elaine Shi:
Understanding Craigslist Rental Scams. Financial Cryptography 2016: 3-21 - Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar:
Optimal Selfish Mining Strategies in Bitcoin. Financial Cryptography 2016: 515-532
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-02 19:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint