|
|
|
|
LEADER |
03509nam a22005895i 4500 |
001 |
978-3-662-47854-7 |
003 |
DE-He213 |
005 |
20210624230526.0 |
007 |
cr nn 008mamaa |
008 |
150715s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662478547
|9 978-3-662-47854-7
|
024 |
7 |
|
|a 10.1007/978-3-662-47854-7
|2 doi
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Financial Cryptography and Data Security
|h [electronic resource] :
|b 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers /
|c edited by Rainer Böhme, Tatsuaki Okamoto.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XIV, 574 p. 119 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 8975
|
505 |
0 |
|
|a Sidechannels -- Cryptography in the cloud -- Payment and fraud detection -- Authentication and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications and attacks -- Authenticated data structures.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a E-commerce.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
1 |
4 |
|a Cryptology.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060
|
650 |
2 |
4 |
|a e-Commerce/e-business.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I26000
|
650 |
2 |
4 |
|a Computer Appl. in Administrative Data Processing.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I2301X
|
650 |
2 |
4 |
|a Computer Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022
|
700 |
1 |
|
|a Böhme, Rainer.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Okamoto, Tatsuaki.
|e editor.
|0 (orcid)0000-0002-8145-5474
|1 https://orcid.org/0000-0002-8145-5474
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662478554
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662478530
|
830 |
|
0 |
|a Security and Cryptology ;
|v 8975
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-662-47854-7
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|