Financial Cryptography and Data Security

FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers

  • Jim Blyth
  • Sven Dietrich
  • L. Jean Camp
Conference proceedings FC 2012

DOI: 10.1007/978-3-642-34638-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7398)

Table of contents

  1. Front Matter
  2. The Workshop on Usable Security (USEC 12)

    1. Joseph Bonneau, Ekaterina Shutova
      Pages 1-12
    2. Marcelo Carlos, Geraint Price
      Pages 13-26
    3. Alexei Czeskis, Jacob Appelbaum
      Pages 27-43
    4. Alexei Czeskis, Dirk Balfanz
      Pages 44-52
    5. Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, David Wetherall
      Pages 68-79
    6. Fanny Lalonde Lévesque, Carlton R. Davis, José M. Fernandez, Sonia Chiasson, Anil Somayaji
      Pages 80-85
    7. Sameer Patil, Yann Le Gall, Adam J. Lee, Apu Kapadia
      Pages 86-97
  3. The Workshop on Ethics in Computer Security Research (WECSR 12)

    1. Andrew G. West, Pedram Hayati, Vidyasagar Potdar, Insup Lee
      Pages 98-111
    2. Michael Bailey, Erin Kenneally, David Dittrich
      Pages 112-123
    3. Serge Egelman, Joseph Bonneau, Sonia Chiasson, David Dittrich, Stuart Schechter
      Pages 124-132
    4. José M. Fernandez, Andrew S. Patrick, Lenore D. Zuck
      Pages 136-140
  4. Back Matter

Other volumes

  1. 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers
  2. Financial Cryptography and Data Security
    FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions.

Keywords

anti-malware testing human factors privacy smartphone usable security

Editors and affiliations

  • Jim Blyth
    • 1
  • Sven Dietrich
    • 2
  • L. Jean Camp
    • 3
  1. 1.USC Information Sciences InstituteMarina del ReyUSA
  2. 2.Department of Computer ScienceStevens Institute of TechnologyHobokenUSA
  3. 3.Indiana UniversityBloomingtonUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-34637-8
  • Online ISBN 978-3-642-34638-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349