000 | 03116nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-662-48051-9 | ||
003 | DE-He213 | ||
005 | 20240423125935.0 | ||
007 | cr nn 008mamaa | ||
008 | 150904s2015 gw | s |||| 0|eng d | ||
020 |
_a9783662480519 _9978-3-662-48051-9 |
||
024 | 7 |
_a10.1007/978-3-662-48051-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aFinancial Cryptography and Data Security _h[electronic resource] : _bFC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers / _cedited by Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2015. |
|
300 |
_aXII, 309 p. 59 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v8976 |
|
520 | _aThis book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015. The 22 full papers presented were carefully reviewed and selected from 39 submissions. They feature the outcome of the Second Workshop on Bitcoin Research, BITCOIN 2015, the Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2015, and the First Workshop on Wearable Security and Privacy, Wearable 2015. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aElectronic commerce. | |
650 | 0 |
_aInformation technology _xManagement. |
|
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _ae-Commerce and e-Business. |
650 | 2 | 4 | _aComputer Application in Administrative Data Processing. |
650 | 2 | 4 | _aIT Operations. |
700 | 1 |
_aBrenner, Michael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aChristin, Nicolas. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aJohnson, Benjamin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aRohloff, Kurt. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783662480502 |
776 | 0 | 8 |
_iPrinted edition: _z9783662480526 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v8976 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-662-48051-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c183333 _d183333 |