Financial Cryptography and Data Security : 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers / edited by Rainer Böhme, Tatsuaki Okamoto
Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: SpringerLink Bücher | Lecture notes in computer science ; 8975Publisher: Berlin, Heidelberg : Springer, 2015Description: Online-Ressource (XIV, 574 p. 119 illus, online resource)ISBN:- 9783662478547
- Elektronischer Zahlungsverkehr
- Kryptologie
- Datensicherung
- Computer Science
- Computer security
- E-commerce
- Application software
- Computer communication systems
- Computer science
- Computer Communication Networks
- Information systems
- Cryptography
- Electronic commerce
- Information technology
- Computer networks
- Data protection
- Data encryption (Computer science)
- 005.82
- 005.824 23
- 004
- QA76.9.A25
Contents:
Summary: Sidechannels -- Cryptography in the cloud -- Payment and fraud detection -- Authentication and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications and attacks -- Authenticated data structures.Summary: This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.PPN: PPN: 1657539636Package identifier: Produktsigel: ZDB-2-SXCS | ZDB-2-LNC | ZDB-2-SCS | ZDB-2-SEB
SidechannelsCryptography in the cloud -- Payment and fraud detection -- Authentication and access control -- Cryptographic primitives -- Mobile security; privacy and incentives -- Applications and attacks -- Authenticated data structures.
No physical items for this record