


default search action
17th Financial Cryptography 2013: Okinawa, Japan - Workshops
- Andrew A. Adams, Michael Brenner, Matthew Smith:
Financial Cryptography and Data Security - FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers. Lecture Notes in Computer Science 7862, Springer 2013, ISBN 978-3-642-41319-3
The Workshop on Usable Security (USEC 13)
- John C.-I. Chuang
, Hamilton Nguyen, Charles Wang, Benjamin Johnson:
I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves. 1-16 - Majid Arianezhad, Douglas Stebila
, Behzad Mozaffari:
Usability and Security of Gaze-Based Graphical Grid Passwords. 17-33 - Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin
, Lorrie Faith Cranor
:
The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs. 34-51 - Timothy Vidas, Emmanuel Owusu, Shuai Wang, Cheng Zeng, Lorrie Faith Cranor
, Nicolas Christin
:
QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks. 52-69 - Iacovos Kirlappos, Adam Beautement, Martina Angela Sasse:
"Comply or Die" Is Dead: Long Live Security-Aware Principal Agents. 70-82 - Ping Fan Ke
, Kai Lung Hui
, Wei T. Yue
:
Information Security as a Credence Good. 83-93 - Marian Harbach
, Sascha Fahl, Polina Yakovleva, Matthew Smith
:
Sorry, I Don't Get It: An Analysis of Warning Message Texts. 94-111 - Tiffany Hyun-Jin Kim, Virgil D. Gligor, Jorge Guajardo, Jason I. Hong
, Adrian Perrig:
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference. 112-130 - Benjamin Henne, Matthew Smith:
Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help. 131-148 - Gregory Norcie, Emiliano De Cristofaro, Victoria Bellotti:
Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles. 149-163
The Workshop on Applied Homomorphic Cryptography (WAHC 13)
- Julien Bringer, Hervé Chabanne, Alain Patey:
SHADE: Secure HAmming DistancE Computation from Oblivious Transfer. 164-176 - Seny Kamara, Lei Wei:
Garbled Circuits via Structured Encryption. 177-188 - Tancrède Lepoint
, Pascal Paillier:
On the Minimal Number of Bootstrappings in Homomorphic Circuits. 189-200 - Shigeo Tsujii, Hiroshi Doi, Ryou Fujita, Masahito Gotaishi, Yukiyasu Tsunoo, Takahiko Syouji:
Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems. 201-212 - Seny Kamara, Mariana Raykova:
Parallel Homomorphic Encryption. 213-225 - Ciara Moore
, Neil Hanley, John McAllister, Máire O'Neill, Elizabeth O'Sullivan, Xiaolin Cao:
Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE. 226-237

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.