Financial Cryptography and Data Security

FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers

Editors:

ISBN: 978-3-642-41319-3 (Print) 978-3-642-41320-9 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages -

  2. The Workshop on Usable Security (USEC 13)

    1. No Access

      Book Chapter

      Pages 1-16

      I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves

    2. No Access

      Book Chapter

      Pages 17-33

      Usability and Security of Gaze-Based Graphical Grid Passwords

    3. No Access

      Book Chapter

      Pages 34-51

      The Impact of Length and Mathematical Operators on the Usability and Security of System-Assigned One-Time PINs

    4. No Access

      Book Chapter

      Pages 52-69

      QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks

    5. No Access

      Book Chapter

      Pages 70-82

      “Comply or Die” Is Dead: Long Live Security-Aware Principal Agents

    6. No Access

      Book Chapter

      Pages 83-93

      Information Security as a Credence Good

    7. No Access

      Book Chapter

      Pages 94-111

      Sorry, I Don’t Get It: An Analysis of Warning Message Texts

    8. No Access

      Book Chapter

      Pages 112-130

      Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference

    9. No Access

      Book Chapter

      Pages 131-148

      Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help

    10. No Access

      Book Chapter

      Pages 149-163

      Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles

  3. The Workshop on Applied Homomorphic Cryptography (WAHC 13)

    1. No Access

      Book Chapter

      Pages 164-176

      SHADE: Secure HAmming DistancE Computation from Oblivious Transfer

    2. No Access

      Book Chapter

      Pages 177-188

      Garbled Circuits via Structured Encryption

    3. No Access

      Book Chapter

      Pages 189-200

      On the Minimal Number of Bootstrappings in Homomorphic Circuits

    4. No Access

      Book Chapter

      Pages 201-212

      Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems

    5. No Access

      Book Chapter

      Pages 213-225

      Parallel Homomorphic Encryption

    6. No Access

      Book Chapter

      Pages 226-237

      Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE

  4. Back Matter

    Pages -