Financial Cryptography and Data Security [E-Book]: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers / edited by Jim Blyth, Sven Dietrich, L. Jean Camp.
Blyth, Jim.
Dietrich, Sven. / Camp, L. Jean.
Berlin, Heidelberg : Springer Berlin Heidelberg : 2012
Imprint: Springer,
X, 141 p. 22 illus. digital.
Lecture notes in computer science ; 7398
Full Text
Table of Contents:
  • Linguistic Properties of Multi-word Passphrases
  • Understanding the Weaknesses of Human-Protocol Interaction
  • High Stakes: Designing a Privacy Preserving Registry
  • Protected Login
  • Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks
  • A Conundrum of Permissions: Installing Applications on an Android Smartphone
  • Methodology for a Field Study of Anti-malware Software
  • My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules
  • A Refined Ethical Impact Assessment Tool and a Case Study of Its Application
  • Ethics Committees and IRBs: Boon, or Bane, or More Research Needed
  • Ethical and Secure Data Sharing across Borders
  • Author Index..