|
Conferences in DBLP
Leaving Room for the Bad Guys. [Citation Graph (, )][DBLP]
Vulnerabilities in First-Generation RFID-enabled Credit Cards. [Citation Graph (, )][DBLP]
Conditional E-Cash. [Citation Graph (, )][DBLP]
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. [Citation Graph (, )][DBLP]
Panel: RFID Security and Privacy. [Citation Graph (, )][DBLP]
Position Statement in RFID S&P Panel: RFID and the Middleman. [Citation Graph (, )][DBLP]
Position Statement in RFID S&P Panel: Contactless Smart Cards. [Citation Graph (, )][DBLP]
Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. [Citation Graph (, )][DBLP]
A Model of Onion Routing with Provable Anonymity. [Citation Graph (, )][DBLP]
K-Anonymous Multi-party Secret Handshakes. [Citation Graph (, )][DBLP]
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. [Citation Graph (, )][DBLP]
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. [Citation Graph (, )][DBLP]
On Authentication with HMAC and Non-random Properties. [Citation Graph (, )][DBLP]
Hidden Identity-Based Signatures. [Citation Graph (, )][DBLP]
Space-Efficient Private Search with Applications to Rateless Codes. [Citation Graph (, )][DBLP]
Cryptographic Securities Exchanges. [Citation Graph (, )][DBLP]
Improved Multi-party Contract Signing. [Citation Graph (, )][DBLP]
Informant: Detecting Sybils Using Incentives. [Citation Graph (, )][DBLP]
Dynamic Virtual Credit Card Numbers. [Citation Graph (, )][DBLP]
The Unbearable Lightness of PIN Cracking. [Citation Graph (, )][DBLP]
Virtual Economies: Threats and Risks. [Citation Graph (, )][DBLP]
Usable SPACE: Security, Privacy, and Context for the Mobile User. [Citation Graph (, )][DBLP]
Personal Digital Rights Management for Mobile Cellular Devices. [Citation Graph (, )][DBLP]
Certificate Revocation Using Fine Grained Certificate Space Partitioning. [Citation Graph (, )][DBLP]
An Efficient Aggregate Shuffle Argument Scheme. [Citation Graph (, )][DBLP]
Preface. [Citation Graph (, )][DBLP]
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. [Citation Graph (, )][DBLP]
WSKE: Web Server Key Enabled Cookies. [Citation Graph (, )][DBLP]
Usability Analysis of Secure Pairing Methods. [Citation Graph (, )][DBLP]
Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. [Citation Graph (, )][DBLP]
Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. [Citation Graph (, )][DBLP]
What Instills Trust? A Qualitative Study of Phishing. [Citation Graph (, )][DBLP]
Phishing IQ Tests Measure Fear, Not Ability. [Citation Graph (, )][DBLP]
Mental Models of Security Risks. [Citation Graph (, )][DBLP]
Improving Usability by Adding Security to Video Conferencing Systems. [Citation Graph (, )][DBLP]
A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed? [Citation Graph (, )][DBLP]
|