The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2010 (conf/fc/2010)


  1. Constructive Cryptography - A Primer. [Citation Graph (, )][DBLP]


  2. Security Mechanisms with Selfish Players in Wireless Networks. [Citation Graph (, )][DBLP]


  3. Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory. [Citation Graph (, )][DBLP]


  4. Multichannel Protocols to Prevent Relay Attacks. [Citation Graph (, )][DBLP]


  5. A Traceability Attack against e-Passports. [Citation Graph (, )][DBLP]


  6. Secure Computation with Fixed-Point Numbers. [Citation Graph (, )][DBLP]


  7. Implementing a High-Assurance Smart-Card OS. [Citation Graph (, )][DBLP]


  8. Unlinkable Priced Oblivious Transfer with Rechargeable Wallets. [Citation Graph (, )][DBLP]


  9. Multiple Denominations in E-cash with Compact Transaction Data. [Citation Graph (, )][DBLP]


  10. What's in a Name? [Citation Graph (, )][DBLP]


  11. Cryptographic Protocol Analysis of AN.ON. [Citation Graph (, )][DBLP]


  12. A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys. [Citation Graph (, )][DBLP]


  13. Practical Private Set Intersection Protocols with Linear Complexity. [Citation Graph (, )][DBLP]


  14. Design and Implementation of a Key-Lifecycle Management System. [Citation Graph (, )][DBLP]


  15. Measuring the Perpetrators and Funders of Typosquatting. [Citation Graph (, )][DBLP]


  16. A Learning-Based Approach to Reactive Security. [Citation Graph (, )][DBLP]


  17. Embedded SFE: Offloading Server and Network Using Hardware Tokens. [Citation Graph (, )][DBLP]


  18. The Phish-Market Protocol: Securely Sharing Attack Data between Competitors. [Citation Graph (, )][DBLP]


  19. Building Incentives into Tor. [Citation Graph (, )][DBLP]


  20. Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections. [Citation Graph (, )][DBLP]


  21. Automatically Preparing Safe SQL Queries. [Citation Graph (, )][DBLP]


  22. PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure. [Citation Graph (, )][DBLP]


  23. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. [Citation Graph (, )][DBLP]


  24. Designing for Audit: A Voting Machine with a Tiny TCB. [Citation Graph (, )][DBLP]


  25. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. [Citation Graph (, )][DBLP]


  26. Security Applications of Diodes with Unique Current-Voltage Characteristics. [Citation Graph (, )][DBLP]


  27. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. [Citation Graph (, )][DBLP]


  28. All You Can Eat or Breaking a Real-World Contactless Payment System. [Citation Graph (, )][DBLP]


  29. Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. [Citation Graph (, )][DBLP]


  30. Using Sphinx to Improve Onion Routing Circuit Construction. [Citation Graph (, )][DBLP]


  31. Secure Multiparty AES. [Citation Graph (, )][DBLP]


  32. Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis. [Citation Graph (, )][DBLP]


  33. On Robust Key Agreement Based on Public Key Authentication. [Citation Graph (, )][DBLP]


  34. A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing. [Citation Graph (, )][DBLP]


  35. Signatures of Reputation. [Citation Graph (, )][DBLP]


  36. Intention-Disguised Algorithmic Trading. [Citation Graph (, )][DBLP]


  37. When Information Improves Information Security. [Citation Graph (, )][DBLP]


  38. BetterThanPin: Empowering Users to Fight Phishing (Poster). [Citation Graph (, )][DBLP]


  39. Certification Intermediaries and the Alternative (Poster). [Citation Graph (, )][DBLP]


  40. SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs. [Citation Graph (, )][DBLP]


  41. Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  42. Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols. [Citation Graph (, )][DBLP]


  43. hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002