|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-45472-5 |
003 |
DE-He213 |
005 |
20220115092120.0 |
007 |
cr nn 008mamaa |
008 |
141108s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662454725
|9 978-3-662-45472-5
|
024 |
7 |
|
|a 10.1007/978-3-662-45472-5
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Financial Cryptography and Data Security
|h [electronic resource] :
|b 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers /
|c edited by Nicolas Christin, Reihaneh Safavi-Naini.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XI, 506 p. 92 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8437
|
505 |
0 |
|
|a Payment Systems -- Case Studies -- Cloud and Virtualization -- Elliptic Curve Cryptography -- Privacy-Preserving Systems -- Authentication and Visual Encryption -- Network Security -- Mobile System Security -- Incentives, Game Theory and Risk -- Bitcoin Anonymity.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Information technology-Management.
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
650 |
2 |
4 |
|a Computer Application in Administrative Data Processing.
|
700 |
1 |
|
|a Christin, Nicolas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Safavi-Naini, Reihaneh.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662454732
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662454718
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8437
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-45472-5
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|