<?xml version="1.0" encoding="UTF-8"?>
<result>
<query id="173723">:facetid:toc:\"db/conf/fc/fc2013.bht\"</query>
<status code="200">OK</status>
<time unit="msecs">82.11</time>
<completions total="1" computed="1" sent="1">
<c sc="40" dc="40" oc="40" id="54840277">:facetid:toc:db/conf/fc/fc2013.bht</c>
</completions>
<hits total="40" computed="40" sent="40" first="0">
<hit score="1" id="5442606">
<info><authors><author pid="43/5044">Tolga Acar</author><author pid="c/ShermanSMChow">Sherman S. M. Chow</author><author pid="54/6022">Lan Nguyen</author></authors><title>Accumulators and U-Prove Revocation.</title><venue>Financial Cryptography</venue><pages>189-196</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/AcarCN13</key><doi>10.1007/978-3-642-39884-1_15</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_15</ee><url>https://dblp.org/rec/conf/fc/AcarCN13</url></info>
<url>URL#5442606</url>
</hit>
<hit score="1" id="5442607">
<info><authors><author pid="148/1154">Manal T. Adham</author><author pid="133/2363">Amir Azodi</author><author pid="d/YvoDesmedt">Yvo Desmedt</author><author pid="133/2372">Ioannis Karaolis</author></authors><title>How to Attack Two-Factor Authentication Internet Banking.</title><venue>Financial Cryptography</venue><pages>322-328</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/AdhamADK13</key><doi>10.1007/978-3-642-39884-1_27</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_27</ee><url>https://dblp.org/rec/conf/fc/AdhamADK13</url></info>
<url>URL#5442607</url>
</hit>
<hit score="1" id="5442608">
<info><authors><author pid="133/2391">Abdelrahaman Aly</author><author pid="129/5174">Edouard Cuvelier</author><author pid="133/2419">Sophie Mawet</author><author pid="78/1061">Olivier Pereira</author><author pid="v/MathieuVanVyve">Mathieu Van Vyve</author></authors><title>Securely Solving Simple Combinatorial Graph Problems.</title><venue>Financial Cryptography</venue><pages>239-257</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/AlyCMPV13</key><doi>10.1007/978-3-642-39884-1_21</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_21</ee><url>https://dblp.org/rec/conf/fc/AlyCMPV13</url></info>
<url>URL#5442608</url>
</hit>
<hit score="1" id="5442609">
<info><authors><author pid="88/5184">Elli Androulaki</author><author pid="36/1531">Ghassan Karame</author><author pid="121/9557">Marc Roeschlin</author><author pid="121/9450">Tobias Scherer</author><author pid="51/1639">Srdjan Capkun</author></authors><title>Evaluating User Privacy in Bitcoin.</title><venue>Financial Cryptography</venue><pages>34-51</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/AndroulakiKRSC13</key><doi>10.1007/978-3-642-39884-1_4</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_4</ee><url>https://dblp.org/rec/conf/fc/AndroulakiKRSC13</url></info>
<url>URL#5442609</url>
</hit>
<hit score="1" id="5442611">
<info><authors><author pid="39/2508">N. Asokan</author><author pid="48/6310">Jan-Erik Ekberg</author><author pid="42/2366">Kari Kostiainen</author></authors><title>The Untapped Potential of Trusted Execution Environments on Mobile Devices.</title><venue>Financial Cryptography</venue><pages>293-294</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/AsokanEK13</key><doi>10.1007/978-3-642-39884-1_24</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_24</ee><url>https://dblp.org/rec/conf/fc/AsokanEK13</url></info>
<url>URL#5442611</url>
</hit>
<hit score="1" id="5442612">
<info><authors><author pid="19/6243">David Aspinall 0001</author><author pid="03/3777">Mike Just</author></authors><title>&quot;Give Me Letters 2, 3 and 6!&quot;: Partial Password Implementations and Attacks.</title><venue>Financial Cryptography</venue><pages>126-143</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/AspinallJ13</key><doi>10.1007/978-3-642-39884-1_11</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_11</ee><url>https://dblp.org/rec/conf/fc/AspinallJ13</url></info>
<url>URL#5442612</url>
</hit>
<hit score="1" id="5442613">
<info><authors><author pid="83/2180">Gergely Biczók</author><author pid="34/8322">Pern Hui Chia</author></authors><title>Interdependent Privacy: Let Me Share Your Data.</title><venue>Financial Cryptography</venue><pages>338-353</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/BiczokC13</key><doi>10.1007/978-3-642-39884-1_29</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_29</ee><url>https://dblp.org/rec/conf/fc/BiczokC13</url></info>
<url>URL#5442613</url>
</hit>
<hit score="1" id="5442615">
<info><authors><author pid="b/JohannesBuchmann">Johannes Buchmann 0001</author><author pid="85/10370">Denise Demirel</author><author pid="27/6925">Jeroen van de Graaf</author></authors><title>Towards a Publicly-Verifiable Mix-Net Providing Everlasting Privacy.</title><venue>Financial Cryptography</venue><pages>197-204</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/BuchmannDG13</key><doi>10.1007/978-3-642-39884-1_16</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_16</ee><url>https://dblp.org/rec/conf/fc/BuchmannDG13</url></info>
<url>URL#5442615</url>
</hit>
<hit score="1" id="5442616">
<info><authors><author pid="27/5136">Justin Cappos</author></authors><title>Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates.</title><venue>Financial Cryptography</venue><pages>386-394</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/Cappos13</key><doi>10.1007/978-3-642-39884-1_33</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_33</ee><url>https://dblp.org/rec/conf/fc/Cappos13</url></info>
<url>URL#5442616</url>
</hit>
<hit score="1" id="5442618">
<info><authors><author pid="84/5118-1">Anupam Das 0001</author><author pid="22/2650">Nikita Borisov</author></authors><title>Securing Anonymous Communication Channels under the Selective DoS Attack.</title><venue>Financial Cryptography</venue><pages>362-370</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/DasB13</key><doi>10.1007/978-3-642-39884-1_31</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_31</ee><url>https://dblp.org/rec/conf/fc/DasB13</url></info>
<url>URL#5442618</url>
</hit>
<hit score="1" id="5442619">
<info><authors><author pid="07/1108">Serge Egelman</author><author pid="s/SESchechter">Stuart E. Schechter</author></authors><title>The Importance of Being Earnest [In Security Warnings].</title><venue>Financial Cryptography</venue><pages>52-59</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/EgelmanS13</key><doi>10.1007/978-3-642-39884-1_5</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_5</ee><url>https://dblp.org/rec/conf/fc/EgelmanS13</url></info>
<url>URL#5442619</url>
</hit>
<hit score="1" id="5442620">
<info><authors><author pid="87/2089">Martin Emms</author><author pid="36/655">Budi Arief</author><author pid="133/2385">Nicholas Little</author><author pid="45/6478">Aad P. A. van Moorsel</author></authors><title>Risks of Offline Verify PIN on Contactless Cards.</title><venue>Financial Cryptography</venue><pages>313-321</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/EmmsALM13</key><doi>10.1007/978-3-642-39884-1_26</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_26</ee><url>https://dblp.org/rec/conf/fc/EmmsALM13</url></info>
<url>URL#5442620</url>
</hit>
<hit score="1" id="5442621">
<info><authors><author pid="38/9378">Sascha Fahl</author><author pid="49/7449">Marian Harbach</author><author pid="133/2390">Marten Oltrogge</author><author pid="73/11206">Thomas Muders</author><author pid="88/5808-1">Matthew Smith 0001</author></authors><title>Hey, You, Get Off of My Clipboard - On How Usability Trumps Security in Android Password Managers.</title><venue>Financial Cryptography</venue><pages>144-161</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/FahlHOMS13</key><doi>10.1007/978-3-642-39884-1_12</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_12</ee><url>https://dblp.org/rec/conf/fc/FahlHOMS13</url></info>
<url>URL#5442621</url>
</hit>
<hit score="1" id="5442622">
<info><authors><author pid="f/MKFranklin">Matthew K. Franklin</author><author pid="22/1887">Haibin Zhang</author></authors><title>Unique Ring Signatures: A Practical Construction.</title><venue>Financial Cryptography</venue><pages>162-170</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/FranklinZ13</key><doi>10.1007/978-3-642-39884-1_13</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_13</ee><url>https://dblp.org/rec/conf/fc/FranklinZ13</url></info>
<url>URL#5442622</url>
</hit>
<hit score="1" id="5442623">
<info><authors><author pid="133/2415">Haruhiko Fujii</author><author pid="58/1088">Yukio Tsuruoka</author></authors><title>Three-Factor User Authentication Method Using Biometrics Challenge Response.</title><venue>Financial Cryptography</venue><pages>395-396</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/FujiiT13</key><doi>10.1007/978-3-642-39884-1_34</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_34</ee><url>https://dblp.org/rec/conf/fc/FujiiT13</url></info>
<url>URL#5442623</url>
</hit>
<hit score="1" id="5442624">
<info><authors><author pid="117/8249">Chrystel Gaber</author><author pid="81/1375">Baptiste Hemery</author><author pid="29/2809">Mohammed Achemlal</author><author pid="19/5089">Marc Pasquet</author><author pid="66/4100">Pascal Urien</author></authors><title>Synthetic Logs Generator for Fraud Detection in Mobile Transfer Services.</title><venue>Financial Cryptography</venue><pages>397-398</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/GaberHAPU13</key><doi>10.1007/978-3-642-39884-1_35</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_35</ee><url>https://dblp.org/rec/conf/fc/GaberHAPU13</url></info>
<url>URL#5442624</url>
</hit>
<hit score="1" id="5442625">
<info><authors><author pid="48/8147">Alexander Gallego</author><author pid="25/1169">Nitesh Saxena</author><author pid="04/389">Jonathan Voris</author></authors><title>Exploring Extrinsic Motivation for Better Security: A Usability Study of Scoring-Enhanced Device Pairing.</title><venue>Financial Cryptography</venue><pages>60-68</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/GallegoSV13</key><doi>10.1007/978-3-642-39884-1_6</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_6</ee><url>https://dblp.org/rec/conf/fc/GallegoSV13</url></info>
<url>URL#5442625</url>
</hit>
<hit score="1" id="5442628">
<info><authors><author pid="22/4404">Mahabir Prasad Jhanwar</author><author pid="s/ReihanehSafaviNaini">Reihaneh Safavi-Naini</author></authors><title>Unconditionally-Secure Robust Secret Sharing with Minimum Share Size.</title><venue>Financial Cryptography</venue><pages>96-110</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/JhanwarS13</key><doi>10.1007/978-3-642-39884-1_9</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_9</ee><url>https://dblp.org/rec/conf/fc/JhanwarS13</url></info>
<url>URL#5442628</url>
</hit>
<hit score="1" id="5442629">
<info><authors><author pid="24/3059-1">Aaron Johnson 0001</author><author pid="14/7561">Rob Jansen</author><author pid="81/5221">Paul F. Syverson</author></authors><title>Onions for Sale: Putting Privacy on the Market.</title><venue>Financial Cryptography</venue><pages>399-400</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/JohnsonJS13</key><doi>10.1007/978-3-642-39884-1_36</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_36</ee><url>https://dblp.org/rec/conf/fc/JohnsonJS13</url></info>
<url>URL#5442629</url>
</hit>
<hit score="1" id="5442630">
<info><authors><author pid="j/MarcJoye">Marc Joye</author><author pid="62/1759">Benoît Libert</author></authors><title>A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data.</title><venue>Financial Cryptography</venue><pages>111-125</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/JoyeL13</key><doi>10.1007/978-3-642-39884-1_10</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_10</ee><url>https://dblp.org/rec/conf/fc/JoyeL13</url></info>
<url>URL#5442630</url>
</hit>
<hit score="1" id="5442632">
<info><authors><author pid="66/664">Seny Kamara</author><author pid="p/CharalamposPapamanthou">Charalampos Papamanthou</author></authors><title>Parallel and Dynamic Searchable Symmetric Encryption.</title><venue>Financial Cryptography</venue><pages>258-274</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/KamaraP13</key><doi>10.1007/978-3-642-39884-1_22</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_22</ee><url>https://dblp.org/rec/conf/fc/KamaraP13</url></info>
<url>URL#5442632</url>
</hit>
<hit score="1" id="5442634">
<info><authors><author pid="133/2427">James Kasten</author><author pid="60/8733">Eric Wustrow</author><author pid="h/JAlexHalderman">J. Alex Halderman</author></authors><title>CAge: Taming Certificate Authorities by Inferring Restricted Scopes.</title><venue>Financial Cryptography</venue><pages>329-337</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/KastenWH13</key><doi>10.1007/978-3-642-39884-1_28</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_28</ee><url>https://dblp.org/rec/conf/fc/KastenWH13</url></info>
<url>URL#5442634</url>
</hit>
<hit score="1" id="5442638">
<info><authors><author pid="47/9491">Tiffany Hyun-Jin Kim</author><author pid="22/3273-1">Akira Yamada 0001</author><author pid="20/2659">Virgil D. Gligor</author><author pid="h/JasonIHong">Jason I. Hong</author><author pid="16/6873">Adrian Perrig</author></authors><title>RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.</title><venue>Financial Cryptography</venue><pages>69-77</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/KimYGHP13</key><doi>10.1007/978-3-642-39884-1_7</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_7</ee><url>https://dblp.org/rec/conf/fc/KimYGHP13</url></info>
<url>URL#5442638</url>
</hit>
<hit score="1" id="5442640">
<info><authors><author pid="33/6549">Kwangsu Lee</author><author pid="l/DongHoonLee">Dong Hoon Lee 0001</author><author pid="y/MotiYung">Moti Yung</author></authors><title>Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency.</title><venue>Financial Cryptography</venue><pages>171-188</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/LeeLY13</key><doi>10.1007/978-3-642-39884-1_14</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_14</ee><url>https://dblp.org/rec/conf/fc/LeeLY13</url></info>
<url>URL#5442640</url>
</hit>
<hit score="1" id="5442642">
<info><authors><author pid="15/2105">Jonas Maebe</author><author pid="133/2401">Ronald De Keulenaer</author><author pid="80/5111">Bjorn De Sutter</author><author pid="b/KoenraadDeBosschere">Koen De Bosschere</author></authors><title>Mitigating Smart Card Fault Injection with Link-Time Code Rewriting: A Feasibility Study.</title><venue>Financial Cryptography</venue><pages>221-229</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/MaebeKSB13</key><doi>10.1007/978-3-642-39884-1_19</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_19</ee><url>https://dblp.org/rec/conf/fc/MaebeKSB13</url></info>
<url>URL#5442642</url>
</hit>
<hit score="1" id="5442643">
<info><authors><author pid="74/8292">Travis Mayberry</author><author pid="14/2769">Erik-Oliver Blass</author><author pid="69/1539">Agnes Hui Chan</author></authors><title>PIRMAP: Efficient Private Information Retrieval for MapReduce.</title><venue>Financial Cryptography</venue><pages>371-385</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/MayberryBC13</key><doi>10.1007/978-3-642-39884-1_32</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_32</ee><url>https://dblp.org/rec/conf/fc/MayberryBC13</url></info>
<url>URL#5442643</url>
</hit>
<hit score="1" id="5442644">
<info><authors><author pid="77/11487">Tarik Moataz</author><author pid="24/4245">Abdullatif Shikfa</author></authors><title>Searchable Encryption Supporting General Boolean Expression Queries.</title><venue>Financial Cryptography</venue><pages>401</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/MoatazS13</key><doi>10.1007/978-3-642-39884-1_37</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_37</ee><url>https://dblp.org/rec/conf/fc/MoatazS13</url></info>
<url>URL#5442644</url>
</hit>
<hit score="1" id="5442645">
<info><authors><author pid="01/5331">Tyler Moore 0001</author><author pid="c/NicolasChristin">Nicolas Christin</author></authors><title>Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk.</title><venue>Financial Cryptography</venue><pages>25-33</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/MooreC13</key><doi>10.1007/978-3-642-39884-1_3</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_3</ee><url>https://dblp.org/rec/conf/fc/MooreC13</url></info>
<url>URL#5442645</url>
</hit>
<hit score="1" id="5442647">
<info><authors><author pid="08/7968">Tilo Müller</author><author pid="133/2365">Hans Spath</author><author pid="133/2417">Richard Mäckl</author><author pid="f/FCFreiling">Felix C. Freiling</author></authors><title>Stark - Tamperproof Authentication to Resist Keylogging.</title><venue>Financial Cryptography</venue><pages>295-312</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/MullerSMF13</key><doi>10.1007/978-3-642-39884-1_25</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_25</ee><url>https://dblp.org/rec/conf/fc/MullerSMF13</url></info>
<url>URL#5442647</url>
</hit>
<hit score="1" id="5442649">
<info><authors><author pid="37/10289">Aude Plateaux</author><author pid="133/2410">Vincent Coquet</author><author pid="117/9702">Sylvain Vernois</author><author pid="46/3206">Patrick Lacharme</author><author pid="133/2431">Kumar Murty</author><author pid="r/ChristopheRosenberger">Christophe Rosenberger</author></authors><title>A Privacy Preserving E-Payment Architecture.</title><venue>Financial Cryptography</venue><pages>402</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/PlateauxCVLMR13</key><doi>10.1007/978-3-642-39884-1_38</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_38</ee><url>https://dblp.org/rec/conf/fc/PlateauxCVLMR13</url></info>
<url>URL#5442649</url>
</hit>
<hit score="1" id="5442650">
<info><authors><author pid="55/6408">Dorit Ron</author><author pid="s/AdiShamir">Adi Shamir</author></authors><title>Quantitative Analysis of the Full Bitcoin Transaction Graph.</title><venue>Financial Cryptography</venue><pages>6-24</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/RonS13</key><doi>10.1007/978-3-642-39884-1_2</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_2</ee><url>https://dblp.org/rec/conf/fc/RonS13</url></info>
<url>URL#5442650</url>
</hit>
<hit score="1" id="5442651">
<info><authors><author pid="23/1185-2">Volker Roth 0002</author><author pid="84/8930">Benjamin Güldenring</author><author pid="65/1345">Eleanor Gilbert Rieffel</author><author pid="13/1169">Sven Dietrich</author><author pid="125/2004">Lars Ries</author></authors><title>A Secure Submission System for Online Whistleblowing Platforms.</title><venue>Financial Cryptography</venue><pages>354-361</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/RothGRDR13</key><doi>10.1007/978-3-642-39884-1_30</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_30</ee><url>https://dblp.org/rec/conf/fc/RothGRDR13</url></info>
<url>URL#5442651</url>
</hit>
<hit score="1" id="5442652">
<info><authors><author pid="68/2219">Andy Rupp</author><author pid="125/0390">Gesine Hinterwälder</author><author pid="46/7643">Foteini Baldimtsi</author><author pid="p/ChristofPaar">Christof Paar</author></authors><title>P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems.</title><venue>Financial Cryptography</venue><pages>205-212</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/RuppHBP13</key><doi>10.1007/978-3-642-39884-1_17</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_17</ee><url>https://dblp.org/rec/conf/fc/RuppHBP13</url></info>
<url>URL#5442652</url>
</hit>
<hit score="1" id="5442653">
<info><authors><author pid="133/2418">William H. Saito</author></authors><title>Can Nature Help Us Solve Risk Management Issues?</title><venue>Financial Cryptography</venue><pages>1-5</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/Saito13</key><doi>10.1007/978-3-642-39884-1_1</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_1</ee><url>https://dblp.org/rec/conf/fc/Saito13</url></info>
<url>URL#5442653</url>
</hit>
<hit score="1" id="5442654">
<info><authors><author pid="46/2899">Yu Sasaki 0001</author><author pid="37/4190-1">Yang Li 0001</author><author pid="03/10476">Hikaru Sakamoto</author><author pid="04/4429">Kazuo Sakiyama</author></authors><title>Coupon Collector&apos;s Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections.</title><venue>Financial Cryptography</venue><pages>213-220</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/SasakiLSS13</key><doi>10.1007/978-3-642-39884-1_18</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_18</ee><url>https://dblp.org/rec/conf/fc/SasakiLSS13</url></info>
<url>URL#5442654</url>
</hit>
<hit score="1" id="5442655">
<info><authors><author pid="06/3872-3">Thomas Schneider 0003</author><author pid="73/11043">Michael Zohner</author></authors><title>GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits.</title><venue>Financial Cryptography</venue><pages>275-292</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/SchneiderZ13</key><doi>10.1007/978-3-642-39884-1_23</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_23</ee><url>https://dblp.org/rec/conf/fc/SchneiderZ13</url></info>
<url>URL#5442655</url>
</hit>
<hit score="1" id="5442657">
<info><authors><author pid="20/8902">Gerard Vidal</author><author pid="23/8853">Mikel Hernaez</author></authors><title>Communication Services Empowered with a Classical Chaos Based Cryptosystem.</title><venue>Financial Cryptography</venue><pages>403</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/VidalH13</key><doi>10.1007/978-3-642-39884-1_39</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_39</ee><url>https://dblp.org/rec/conf/fc/VidalH13</url></info>
<url>URL#5442657</url>
</hit>
<hit score="1" id="5442659">
<info><authors><author pid="65/7564">Bingsheng Zhang</author><author pid="l/HelgerLipmaa">Helger Lipmaa</author><author pid="18/2771-1">Cong Wang 0001</author><author pid="20/6179-1">Kui Ren 0001</author></authors><title>Practical Fully Simulatable Oblivious Transfer with Sublinear Communication.</title><venue>Financial Cryptography</venue><pages>78-95</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/ZhangLWR13</key><doi>10.1007/978-3-642-39884-1_8</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_8</ee><url>https://dblp.org/rec/conf/fc/ZhangLWR13</url></info>
<url>URL#5442659</url>
</hit>
<hit score="1" id="5442660">
<info><authors><author pid="99/2747-6">Yuanyuan Zhou 0006</author><author pid="33/0-1">Yu Yu 0001</author><author pid="38/2138">François-Xavier Standaert</author><author pid="q/JJQuisquater">Jean-Jacques Quisquater</author></authors><title>On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards.</title><venue>Financial Cryptography</venue><pages>230-238</pages><year>2013</year><type>Conference and Workshop Papers</type><access>closed</access><key>conf/fc/ZhouYSQ13</key><doi>10.1007/978-3-642-39884-1_20</doi><ee>https://doi.org/10.1007/978-3-642-39884-1_20</ee><url>https://dblp.org/rec/conf/fc/ZhouYSQ13</url></info>
<url>URL#5442660</url>
</hit>
<hit score="1" id="5551417">
<info><authors><author pid="s/AhmadRezaSadeghi">Ahmad-Reza Sadeghi</author></authors><title>Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers</title><venue>Financial Cryptography</venue><venue>Lecture Notes in Computer Science</venue><volume>7859</volume><publisher>Springer</publisher><year>2013</year><type>Editorship</type><key>conf/fc/2013</key><doi>10.1007/978-3-642-39884-1</doi><ee>https://doi.org/10.1007/978-3-642-39884-1</ee><url>https://dblp.org/rec/conf/fc/2013</url></info>
<url>URL#5551417</url>
</hit>
</hits>
</result>
