000 | 03196nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-642-29889-9 | ||
003 | DE-He213 | ||
005 | 20240423125638.0 | ||
007 | cr nn 008mamaa | ||
008 | 120509s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642298899 _9978-3-642-29889-9 |
||
024 | 7 |
_a10.1007/978-3-642-29889-9 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aFinancial Cryptography and Data Security _h[electronic resource] : _bFC 2011 Workshops, RLCPS and WECSR, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers / _cedited by George Danezis, Sven Dietrich, Kazue Sako. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXII, 185 p. 15 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7126 |
|
520 | _aThis book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Research, WECSR 2011, held in conjunction with the 15th International Conference on Financial Cryptography and Data Security, FC 2010, in Rodney Bay, St. Lucia, in February/March 2011. The 16 revised papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics ranging from anonymity and privacy, authentication and identification, biometrics, commercial cryptographic, digital cash and payment systems, infrastructure design, management and operations, to security economics and trust management. | ||
650 | 0 | _aComputer networks . | |
650 | 0 | _aElectronic commerce. | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aApplication software. | |
650 | 1 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _ae-Commerce and e-Business. |
650 | 2 | 4 | _aIT Operations. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
700 | 1 |
_aDanezis, George. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDietrich, Sven. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSako, Kazue. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642298882 |
776 | 0 | 8 |
_iPrinted edition: _z9783642298905 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7126 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-29889-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c180206 _d180206 |