Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers / [electronic resource] :
edited by Nicolas Christin, Reihaneh Safavi-Naini.
- 1st ed. 2014.
- XI, 506 p. 92 illus. online resource.
- Security and Cryptology, 8437 2946-1863 ; .
- Security and Cryptology, 8437 .
Payment Systems -- Case Studies -- Cloud and Virtualization -- Elliptic Curve Cryptography -- Privacy-Preserving Systems -- Authentication and Visual Encryption -- Network Security -- Mobile System Security -- Incentives, Game Theory and Risk -- Bitcoin Anonymity.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.
9783662454725
10.1007/978-3-662-45472-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic commerce.
Information technology--Management.
Cryptology.
Data and Information Security.
e-Commerce and e-Business.
Computer Application in Administrative Data Processing.
QA268
005.824
Payment Systems -- Case Studies -- Cloud and Virtualization -- Elliptic Curve Cryptography -- Privacy-Preserving Systems -- Authentication and Visual Encryption -- Network Security -- Mobile System Security -- Incentives, Game Theory and Risk -- Bitcoin Anonymity.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.
9783662454725
10.1007/978-3-662-45472-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Electronic commerce.
Information technology--Management.
Cryptology.
Data and Information Security.
e-Commerce and e-Business.
Computer Application in Administrative Data Processing.
QA268
005.824