|
|
|
|
LEADER |
08084cam a22015252 4500 |
001 |
0-1651888779 |
003 |
DE-627 |
005 |
20240122105007.0 |
007 |
cr uuu---uuuuu |
008 |
121115s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642346385
|9 978-3-642-34638-5
|
024 |
7 |
|
|a 10.1007/978-3-642-34638-5
|2 doi
|
035 |
|
|
|a (DE-627)1651888779
|
035 |
|
|
|a (DE-576)375374868
|
035 |
|
|
|a (DE-599)BSZ375374868
|
035 |
|
|
|a (OCoLC)820500516
|
035 |
|
|
|a (ZBM)1253.94004
|
035 |
|
|
|a (ZBM)1253.94004
|
035 |
|
|
|a (DE-He213)978-3-642-34638-5
|
035 |
|
|
|a (EBP)040545911
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *94-06
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.62
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
084 |
|
|
|a 85.20
|2 bkl
|
100 |
1 |
|
|a Blyth, Jim
|4 aut
|
245 |
1 |
0 |
|a Financial Cryptography and Data Security
|b FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
|c edited by Jim Blyth, Sven Dietrich, L. Jean Camp
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2012
|
300 |
|
|
|a Online-Ressource (X, 141 p. 22 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7398
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
505 |
8 |
0 |
|a Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index..
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
653 |
|
4 |
|a Electronic funds transfers
|a Security measures
|a Congresses
|
653 |
|
4 |
|a Data encryption (Computer science)
|a Congresses
|
653 |
|
4 |
|a Electronic commerce
|a Security measures
|a Congresses
|
653 |
|
4 |
|a Computer networks
|a Security measures
|a Congresses
|
653 |
|
4 |
|a Internet banking
|a Security measures
|a Congresses
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Kralendijk
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4014359-4
|0 (DE-627)104603631
|0 (DE-576)208907467
|a Elektronischer Zahlungsverkehr
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Dietrich, Sven
|4 oth
|
700 |
1 |
|
|a Camp, L. Jean
|0 (DE-627)1251269400
|0 (DE-576)181269406
|4 oth
|
776 |
1 |
|
|z 9783642346378
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Financial cryptography and data security
|d Heidelberg [u.a.] : Springer, 2012
|h XI, 416 S.
|w (DE-627)720966760
|w (DE-576)378452991
|z 3642329454
|z 9783642329456
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Financial cryptography and data security
|d Berlin : Springer, 2012
|h X, 140 S.
|w (DE-627)727822101
|w (DE-576)382332075
|z 3642346375
|z 9783642346378
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7398
|9 7398
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-34638-5
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-34638-5
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz375374868cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20130404105334
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1253.94004
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
889 |
|
|
|w (DE-627)729064549
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.62
|j Datenstrukturen
|q SEPA
|0 (DE-627)106403265
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
936 |
b |
k |
|a 85.20
|j Betriebliche Information und Kommunikation
|q SEPA
|0 (DE-627)106414704
|
951 |
|
|
|a BO
|
900 |
|
|
|a Camp, L. J.
|
950 |
|
|
|a Computergeld
|
950 |
|
|
|a Belegloser Zahlungsverkehr
|
950 |
|
|
|a Elektronisches Geld
|
950 |
|
|
|a Bargeldloser Zahlungsverkehr
|
950 |
|
|
|a Finanztechnologie
|
950 |
|
|
|a Geheimcodetechnik
|
950 |
|
|
|a Kryptografie
|
950 |
|
|
|a Kryptographie
|
950 |
|
|
|a Datenverschlüsselung
|
950 |
|
|
|a Chiffrierung
|
950 |
|
|
|a Steganographie
|
950 |
|
|
|a Kryptologe
|
950 |
|
|
|a 保密学
|
950 |
|
|
|a 密码学
|
950 |
|
|
|a 保密學
|
950 |
|
|
|a 密碼學
|
950 |
|
|
|a Криптология
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Надёжность сохранения данных
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-34638-5
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3354615079
|z 2012-11-15T15:09:14Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-34638-5
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3354615117
|z 2012-11-15T15:09:14Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-34638-5
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3354615141
|z 2012-11-15T15:09:14Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-34638-5
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3354615206
|z 2012-11-15T15:09:14Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-34638-5
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3354615249
|z 2012-11-15T15:09:14Z
|
980 |
|
|
|a 1651888779
|b 0
|k 1651888779
|o 375374868
|
SOLR
_version_ |
1792253819591065600 |
access_facet |
Electronic Resources |
author |
Blyth, Jim |
author2 |
Dietrich, Sven, Camp, L. Jean |
author2_role |
oth, oth |
author2_variant |
s d sd, l j c lj ljc |
author_facet |
Blyth, Jim, Dietrich, Sven, Camp, L. Jean |
author_role |
aut |
author_sort |
Blyth, Jim |
author_variant |
j b jb |
callnumber-first |
T - Technology |
callnumber-label |
TK5105 |
callnumber-raw |
TK5105.5-5105.9 |
callnumber-search |
TK5105.5-5105.9 |
callnumber-sort |
TK 45105.5 45105.9 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index.., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions |
ctrlnum |
(DE-627)1651888779, (DE-576)375374868, (DE-599)BSZ375374868, (OCoLC)820500516, (ZBM)1253.94004, (DE-He213)978-3-642-34638-5, (EBP)040545911 |
de15_date |
2012-11-15T15:09:14Z |
dech1_date |
2012-11-15T15:09:14Z |
doi_str_mv |
10.1007/978-3-642-34638-5 |
era_facet |
2012 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung |
facet_topic_nrw_music |
Electronic funds transfers, Security measures, Congresses, Data encryption (Computer science), Electronic commerce, Computer networks, Internet banking |
finc_class_facet |
Informatik, Technik |
fincclass_txtF_mv |
science-computerscience, economics |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2012 Kralendijk (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Kralendijk |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7398 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1651888779 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2012 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1651888779 |
is_hierarchy_title |
Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers |
isbn |
9783642346385 |
isbn_isn_mv |
9783642346378, 3642329454, 9783642329456, 3642346375 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1651888779 |
language |
English |
last_indexed |
2024-02-29T17:07:15.128Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung |
marc024a_ct_mv |
10.1007/978-3-642-34638-5 |
match_str |
blyth2012financialcryptographyanddatasecurityfc2012workshopsusecandwecsr2012kralendijkbonairemarch22012revisedselectedpapers |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7398 |
names_id_str_mv |
(DE-627)1251269400, (DE-576)181269406 |
oclc_num |
820500516 |
physical |
Online-Ressource (X, 141 p. 22 illus, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
375374868 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3180074 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7398 |
series2 |
Lecture Notes in Computer Science ; 7398, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Blyth, Jim aut, Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers edited by Jim Blyth, Sven Dietrich, L. Jean Camp, Berlin, Heidelberg Springer 2012, Online-Ressource (X, 141 p. 22 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7398, SpringerLink Bücher, Literaturangaben, Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index.., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions, Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Electronic funds transfers Security measures Congresses, Data encryption (Computer science) Congresses, Electronic commerce Security measures Congresses, Computer networks Security measures Congresses, Internet banking Security measures Congresses, Konferenzschrift 2012 Kralendijk (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4014359-4 (DE-627)104603631 (DE-576)208907467 Elektronischer Zahlungsverkehr gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, DE-101, Dietrich, Sven oth, Camp, L. Jean (DE-627)1251269400 (DE-576)181269406 oth, 9783642346378, Buchausg. u.d.T. Financial cryptography and data security Heidelberg [u.a.] : Springer, 2012 XI, 416 S. (DE-627)720966760 (DE-576)378452991 3642329454 9783642329456, Buchausg. u.d.T. Financial cryptography and data security Berlin : Springer, 2012 X, 140 S. (DE-627)727822101 (DE-576)382332075 3642346375 9783642346378, Lecture notes in computer science 7398 7398 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-34638-5 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-34638-5 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz375374868cov.jpg V:DE-576 X:springer image/jpeg 20130404105334 Cover, https://zbmath.org/?q=an:1253.94004 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)729064549, http://dx.doi.org/10.1007/978-3-642-34638-5 DE-14, DE-14 epn:3354615079 2012-11-15T15:09:14Z, http://dx.doi.org/10.1007/978-3-642-34638-5 DE-15, DE-15 epn:3354615117 2012-11-15T15:09:14Z, http://dx.doi.org/10.1007/978-3-642-34638-5 DE-Ch1, DE-Ch1 epn:3354615141 2012-11-15T15:09:14Z, http://dx.doi.org/10.1007/978-3-642-34638-5 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3354615206 2012-11-15T15:09:14Z, http://dx.doi.org/10.1007/978-3-642-34638-5 DE-520, DE-520 epn:3354615249 2012-11-15T15:09:14Z |
spellingShingle |
Blyth, Jim, Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers, Lecture notes in computer science, 7398, Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index.., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions, Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Electronic funds transfers, Security measures, Congresses, Electronic commerce, Computer networks, Internet banking, Konferenzschrift 2012 Kralendijk, Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung |
swb_id_str |
375374868 |
title |
Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers |
title_auth |
Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers |
title_full |
Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers edited by Jim Blyth, Sven Dietrich, L. Jean Camp |
title_fullStr |
Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers edited by Jim Blyth, Sven Dietrich, L. Jean Camp |
title_full_unstemmed |
Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers edited by Jim Blyth, Sven Dietrich, L. Jean Camp |
title_in_hierarchy |
7398. Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers (2012) |
title_short |
Financial Cryptography and Data Security |
title_sort |
financial cryptography and data security fc 2012 workshops usec and wecsr 2012 kralendijk bonaire march 2 2012 revised selected papers |
title_sub |
FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers |
title_unstemmed |
Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers |
topic |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Electronic funds transfers, Security measures, Congresses, Electronic commerce, Computer networks, Internet banking, Konferenzschrift 2012 Kralendijk, Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung |
topic_facet |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung, Electronic funds transfers, Security measures, Congresses, Electronic commerce, Computer networks, Internet banking |
url |
https://doi.org/10.1007/978-3-642-34638-5, http://dx.doi.org/10.1007/978-3-642-34638-5, https://swbplus.bsz-bw.de/bsz375374868cov.jpg, https://zbmath.org/?q=an:1253.94004 |