|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-48051-9 |
003 |
DE-He213 |
005 |
20220115034520.0 |
007 |
cr nn 008mamaa |
008 |
150904s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662480519
|9 978-3-662-48051-9
|
024 |
7 |
|
|a 10.1007/978-3-662-48051-9
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Financial Cryptography and Data Security
|h [electronic resource] :
|b FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers /
|c edited by Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XII, 309 p. 59 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8976
|
520 |
|
|
|a This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015. The 22 full papers presented were carefully reviewed and selected from 39 submissions. They feature the outcome of the Second Workshop on Bitcoin Research, BITCOIN 2015, the Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2015, and the First Workshop on Wearable Security and Privacy, Wearable 2015.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Information technology-Management.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a e-Commerce and e-Business.
|
650 |
2 |
4 |
|a Computer Application in Administrative Data Processing.
|
650 |
2 |
4 |
|a IT Operations.
|
700 |
1 |
|
|a Brenner, Michael.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Christin, Nicolas.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Johnson, Benjamin.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Rohloff, Kurt.
|e editor.
|0 (orcid)0000-0003-0389-5092
|1 https://orcid.org/0000-0003-0389-5092
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662480502
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662480526
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8976
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-48051-9
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|