000 | 02892nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-662-45472-5 | ||
003 | DE-He213 | ||
005 | 20200421111649.0 | ||
007 | cr nn 008mamaa | ||
008 | 141108s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662454725 _9978-3-662-45472-5 |
||
024 | 7 |
_a10.1007/978-3-662-45472-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
245 | 1 | 0 |
_aFinancial Cryptography and Data Security _h[electronic resource] : _b18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers / _cedited by Nicolas Christin, Reihaneh Safavi-Naini. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
|
300 |
_aXI, 506 p. 92 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8437 |
|
505 | 0 | _aPayment Systems -- Case Studies -- Cloud and Virtualization -- Elliptic Curve Cryptography -- Privacy-Preserving Systems -- Authentication and Visual Encryption -- Network Security -- Mobile System Security -- Incentives, Game Theory and Risk -- Bitcoin Anonymity. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014. The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aApplication software. | |
650 | 0 | _aE-commerce. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _ae-Commerce/e-business. |
650 | 2 | 4 | _aComputer Appl. in Administrative Data Processing. |
700 | 1 |
_aChristin, Nicolas. _eeditor. |
|
700 | 1 |
_aSafavi-Naini, Reihaneh. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783662454718 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8437 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-662-45472-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c54287 _d54287 |