|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-47854-7 |
003 |
DE-He213 |
005 |
20220114115759.0 |
007 |
cr nn 008mamaa |
008 |
150715s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662478547
|9 978-3-662-47854-7
|
024 |
7 |
|
|a 10.1007/978-3-662-47854-7
|2 doi
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.824
|2 23
|
245 |
1 |
0 |
|a Financial Cryptography and Data Security
|h [electronic resource] :
|b 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers /
|c edited by Rainer Böhme, Tatsuaki Okamoto.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XIV, 574 p. 119 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8975
|
505 |
0 |
|
|a Sidechannels -- Cryptography in the cloud -- Payment and fraud detection -- Authentication and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications and attacks -- Authenticated data structures.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Information technology-Management.
|
650 |
|
0 |
|a Computer networks .
|
650 |
1 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
650 |
2 |
4 |
|a Computer Application in Administrative Data Processing.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
700 |
1 |
|
|a Böhme, Rainer.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Okamoto, Tatsuaki.
|e editor.
|0 (orcid)0000-0002-8145-5474
|1 https://orcid.org/0000-0002-8145-5474
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662478554
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662478530
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8975
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-47854-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|