Financial Cryptography Workshops最新文献

筛选
英文 中文
Empathy as a Response to Frustration in Password Choice 同理心是对密码选择受挫的反应
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_13
Kovila P. L. Coopamootoo
{"title":"Empathy as a Response to Frustration in Password Choice","authors":"Kovila P. L. Coopamootoo","doi":"10.1007/978-3-030-54455-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_13","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115300836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formally Verified Static Analysis Framework for Compositional Contracts 一个经过正式验证的组合契约静态分析框架
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_42
F. Henglein, Christian Larsen, Agata Murawska
{"title":"A Formally Verified Static Analysis Framework for Compositional Contracts","authors":"F. Henglein, Christian Larsen, Agata Murawska","doi":"10.1007/978-3-030-54455-3_42","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_42","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114852935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Understanding Perceptions of Smart Devices 理解智能设备的感知
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_8
Hilda Hadan, S. Patil
{"title":"Understanding Perceptions of Smart Devices","authors":"Hilda Hadan, S. Patil","doi":"10.1007/978-3-030-54455-3_8","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_8","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Improving the Efficacy of Code-Based Verification in Internet Voting 提高基于代码的网络投票验证的有效性
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_21
O. Kulyk, M. Volkamer, Monika Müller, K. Renaud
{"title":"Towards Improving the Efficacy of Code-Based Verification in Internet Voting","authors":"O. Kulyk, M. Volkamer, Monika Müller, K. Renaud","doi":"10.1007/978-3-030-54455-3_21","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_21","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114343793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Incorporating Psychology into Cyber Security Education: A Pedagogical Approach 将心理学融入网络安全教育:一种教学方法
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_15
Jacqui Taylor-Jackson, J. McAlaney, Jeffrey L. Foster, Abubakar Bello, A. Maurushat, J. Dale
{"title":"Incorporating Psychology into Cyber Security Education: A Pedagogical Approach","authors":"Jacqui Taylor-Jackson, J. McAlaney, Jeffrey L. Foster, Abubakar Bello, A. Maurushat, J. Dale","doi":"10.1007/978-3-030-54455-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_15","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network MAPPCN:多跳匿名和隐私保护支付通道网络
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_34
S. Tripathy, Susil Kumar Mohanty
{"title":"MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network","authors":"S. Tripathy, Susil Kumar Mohanty","doi":"10.1007/978-3-030-54455-3_34","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_34","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage 修复修复:评估SAST工具的密码存储安全解决方案
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_14
Harshal Tupsamudre, Monika Sahu, K. Vidhani, S. Lodha
{"title":"Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage","authors":"Harshal Tupsamudre, Monika Sahu, K. Vidhani, S. Lodha","doi":"10.1007/978-3-030-54455-3_14","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_14","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114344984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions & Method Preferences 在线反授权:对隐私共享感知和方法偏好的调查
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_6
Kovila P. L. Coopamootoo
{"title":"Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions & Method Preferences","authors":"Kovila P. L. Coopamootoo","doi":"10.1007/978-3-030-54455-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_6","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133584555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Origami Voting: A Non-cryptographic Approach to Transparent Ballot Verification 折纸投票:透明选票验证的非加密方法
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_20
Enka Blanchard, T. Selker
{"title":"Origami Voting: A Non-cryptographic Approach to Transparent Ballot Verification","authors":"Enka Blanchard, T. Selker","doi":"10.1007/978-3-030-54455-3_20","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_20","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"123 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131745508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-Preserving Cross-Chain Atomic Swaps 保护隐私的跨链原子交换
Financial Cryptography Workshops Pub Date : 2020-02-14 DOI: 10.1007/978-3-030-54455-3_38
Apoorvaa Deshpande, M. Herlihy
{"title":"Privacy-Preserving Cross-Chain Atomic Swaps","authors":"Apoorvaa Deshpande, M. Herlihy","doi":"10.1007/978-3-030-54455-3_38","DOIUrl":"https://doi.org/10.1007/978-3-030-54455-3_38","url":null,"abstract":"","PeriodicalId":257557,"journal":{"name":"Financial Cryptography Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123438857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信