The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2007 (conf/fc/2007)

  1. Leaving Room for the Bad Guys. [Citation Graph (, )][DBLP]

  2. Vulnerabilities in First-Generation RFID-enabled Credit Cards. [Citation Graph (, )][DBLP]

  3. Conditional E-Cash. [Citation Graph (, )][DBLP]

  4. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. [Citation Graph (, )][DBLP]

  5. Panel: RFID Security and Privacy. [Citation Graph (, )][DBLP]

  6. Position Statement in RFID S&P Panel: RFID and the Middleman. [Citation Graph (, )][DBLP]

  7. Position Statement in RFID S&P Panel: Contactless Smart Cards. [Citation Graph (, )][DBLP]

  8. Position Statement in RFID S&P Panel: From Relative Security to Perceived Secure. [Citation Graph (, )][DBLP]

  9. A Model of Onion Routing with Provable Anonymity. [Citation Graph (, )][DBLP]

  10. K-Anonymous Multi-party Secret Handshakes. [Citation Graph (, )][DBLP]

  11. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. [Citation Graph (, )][DBLP]

  12. Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. [Citation Graph (, )][DBLP]

  13. On Authentication with HMAC and Non-random Properties. [Citation Graph (, )][DBLP]

  14. Hidden Identity-Based Signatures. [Citation Graph (, )][DBLP]

  15. Space-Efficient Private Search with Applications to Rateless Codes. [Citation Graph (, )][DBLP]

  16. Cryptographic Securities Exchanges. [Citation Graph (, )][DBLP]

  17. Improved Multi-party Contract Signing. [Citation Graph (, )][DBLP]

  18. Informant: Detecting Sybils Using Incentives. [Citation Graph (, )][DBLP]

  19. Dynamic Virtual Credit Card Numbers. [Citation Graph (, )][DBLP]

  20. The Unbearable Lightness of PIN Cracking. [Citation Graph (, )][DBLP]

  21. Virtual Economies: Threats and Risks. [Citation Graph (, )][DBLP]

  22. Usable SPACE: Security, Privacy, and Context for the Mobile User. [Citation Graph (, )][DBLP]

  23. Personal Digital Rights Management for Mobile Cellular Devices. [Citation Graph (, )][DBLP]

  24. Certificate Revocation Using Fine Grained Certificate Space Partitioning. [Citation Graph (, )][DBLP]

  25. An Efficient Aggregate Shuffle Argument Scheme. [Citation Graph (, )][DBLP]

  26. Preface. [Citation Graph (, )][DBLP]

  27. An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. [Citation Graph (, )][DBLP]

  28. WSKE: Web Server Key Enabled Cookies. [Citation Graph (, )][DBLP]

  29. Usability Analysis of Secure Pairing Methods. [Citation Graph (, )][DBLP]

  30. Low-Cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup. [Citation Graph (, )][DBLP]

  31. Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. [Citation Graph (, )][DBLP]

  32. What Instills Trust? A Qualitative Study of Phishing. [Citation Graph (, )][DBLP]

  33. Phishing IQ Tests Measure Fear, Not Ability. [Citation Graph (, )][DBLP]

  34. Mental Models of Security Risks. [Citation Graph (, )][DBLP]

  35. Improving Usability by Adding Security to Video Conferencing Systems. [Citation Graph (, )][DBLP]

  36. A Sense of Security in Pervasive Computing - Is the Light on When the Refrigerator Door Is Closed? [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002