Financial Cryptography and Data Security

FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-34637-8 (Print) 978-3-642-34638-5 (Online)

Table of contents (13 chapters)

  1. Front Matter

    Pages -

  2. The Workshop on Usable Security (USEC 12)

    1. No Access

      Book Chapter

      Pages 1-12

      Linguistic Properties of Multi-word Passphrases

    2. No Access

      Book Chapter

      Pages 13-26

      Understanding the Weaknesses of Human-Protocol Interaction

    3. No Access

      Book Chapter

      Pages 27-43

      High Stakes: Designing a Privacy Preserving Registry

    4. No Access

      Book Chapter

      Pages 44-52

      Protected Login

    5. No Access

      Book Chapter

      Pages 53-67

      Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks

    6. No Access

      Book Chapter

      Pages 68-79

      A Conundrum of Permissions: Installing Applications on an Android Smartphone

    7. No Access

      Book Chapter

      Pages 80-85

      Methodology for a Field Study of Anti-malware Software

    8. No Access

      Book Chapter

      Pages 86-97

      My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules

  3. The Workshop on Ethics in Computer Security Research (WECSR 12)

    1. No Access

      Book Chapter

      Pages 98-111

      Spamming for Science: Active Measurement in Web 2.0 Abuse Research

    2. No Access

      Book Chapter

      Pages 112-123

      A Refined Ethical Impact Assessment Tool and a Case Study of Its Application

    3. No Access

      Book Chapter

      Pages 124-132

      It’s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin

    4. No Access

      Book Chapter

      Pages 133-135

      Ethics Committees and IRBs: Boon, or Bane, or More Research Needed?

    5. No Access

      Book Chapter

      Pages 136-140

      Ethical and Secure Data Sharing across Borders

  4. Back Matter

    Pages -