Eintrag weiter verarbeiten

Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers

Gespeichert in:

Personen und Körperschaften: Blyth, Jim (VerfasserIn), Dietrich, Sven (Sonstige), Camp, L. Jean (Sonstige)
Titel: Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers/ edited by Jim Blyth, Sven Dietrich, L. Jean Camp
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer 2012
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7398
Schlagwörter:
Buchausg. u.d.T.: Financial cryptography and data security, Heidelberg [u.a.] : Springer, 2012, XI, 416 S.
Buchausg. u.d.T.: Financial cryptography and data security, Berlin : Springer, 2012, X, 140 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 08084cam a22015252 4500
001 0-1651888779
003 DE-627
005 20240122105007.0
007 cr uuu---uuuuu
008 121115s2012 gw |||||o 00| ||eng c
020 |a 9783642346385  |9 978-3-642-34638-5 
024 7 |a 10.1007/978-3-642-34638-5  |2 doi 
035 |a (DE-627)1651888779 
035 |a (DE-576)375374868 
035 |a (DE-599)BSZ375374868 
035 |a (OCoLC)820500516 
035 |a (ZBM)1253.94004 
035 |a (ZBM)1253.94004 
035 |a (DE-He213)978-3-642-34638-5 
035 |a (EBP)040545911 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
084 |a SS 4800  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *94-06  |2 msc 
084 |a 94A60  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.62  |2 bkl 
084 |a 54.38  |2 bkl 
084 |a 85.20  |2 bkl 
100 1 |a Blyth, Jim  |4 aut 
245 1 0 |a Financial Cryptography and Data Security  |b FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers  |c edited by Jim Blyth, Sven Dietrich, L. Jean Camp 
264 1 |a Berlin, Heidelberg  |b Springer  |c 2012 
300 |a Online-Ressource (X, 141 p. 22 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7398 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
505 8 0 |a Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index.. 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data encryption (Computer science) 
650 0 |a Information Systems 
650 0 |a Data encryption (Computer science) 
650 0 |a Electronic data processing 
650 0 |a Cryptography. 
650 0 |a Computer networks . 
650 0 |a Electronic commerce. 
650 0 |a Computers and civilization. 
650 0 |a Application software. 
653 4 |a Electronic funds transfers  |a Security measures  |a Congresses 
653 4 |a Data encryption (Computer science)  |a Congresses 
653 4 |a Electronic commerce  |a Security measures  |a Congresses 
653 4 |a Computer networks  |a Security measures  |a Congresses 
653 4 |a Internet banking  |a Security measures  |a Congresses 
655 7 |a Konferenzschrift  |y 2012  |z Kralendijk  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
655 7 |a Konferenzschrift  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4014359-4  |0 (DE-627)104603631  |0 (DE-576)208907467  |a Elektronischer Zahlungsverkehr  |2 gnd 
689 0 1 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 2 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 |5 DE-101 
700 1 |a Dietrich, Sven  |4 oth 
700 1 |a Camp, L. Jean  |0 (DE-627)1251269400  |0 (DE-576)181269406  |4 oth 
776 1 |z 9783642346378 
776 0 8 |i Buchausg. u.d.T.  |t Financial cryptography and data security  |d Heidelberg [u.a.] : Springer, 2012  |h XI, 416 S.  |w (DE-627)720966760  |w (DE-576)378452991  |z 3642329454  |z 9783642329456 
776 0 8 |i Buchausg. u.d.T.  |t Financial cryptography and data security  |d Berlin : Springer, 2012  |h X, 140 S.  |w (DE-627)727822101  |w (DE-576)382332075  |z 3642346375  |z 9783642346378 
830 0 |a Lecture notes in computer science  |v 7398  |9 7398  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-34638-5  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-34638-5  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz375374868cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20130404105334  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1253.94004  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
889 |w (DE-627)729064549 
912 |a ZDB-2-LNC  |b 2012 
912 |a ZDB-2-SCS  |b 2012 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2012 
912 |a ZDB-2-SEB  |b 2012 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.62  |j Datenstrukturen  |q SEPA  |0 (DE-627)106403265 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
936 b k |a 85.20  |j Betriebliche Information und Kommunikation  |q SEPA  |0 (DE-627)106414704 
951 |a BO 
900 |a Camp, L. J. 
950 |a Computergeld 
950 |a Belegloser Zahlungsverkehr 
950 |a Elektronisches Geld 
950 |a Bargeldloser Zahlungsverkehr 
950 |a Finanztechnologie 
950 |a Geheimcodetechnik 
950 |a Kryptografie 
950 |a Kryptographie 
950 |a Datenverschlüsselung 
950 |a Chiffrierung 
950 |a Steganographie 
950 |a Kryptologe 
950 |a 保密学 
950 |a 密码学 
950 |a 保密學 
950 |a 密碼學 
950 |a Криптология 
950 |a Datensicherheit 
950 |a Sicherheit 
950 |a Datenverarbeitung 
950 |a Informationssicherheit 
950 |a Computersicherheit 
950 |a Softwareschutz 
950 |a Надёжность сохранения данных 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-34638-5  |9 DE-14 
852 |a DE-14  |x epn:3354615079  |z 2012-11-15T15:09:14Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-34638-5  |9 DE-15 
852 |a DE-15  |x epn:3354615117  |z 2012-11-15T15:09:14Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-34638-5  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3354615141  |z 2012-11-15T15:09:14Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-34638-5  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3354615206  |z 2012-11-15T15:09:14Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-34638-5  |9 DE-520 
852 |a DE-520  |x epn:3354615249  |z 2012-11-15T15:09:14Z 
980 |a 1651888779  |b 0  |k 1651888779  |o 375374868 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Financial+Cryptography+and+Data+Security%3A+FC+2012+Workshops%2C+USEC+and+WECSR+2012%2C+Kralendijk%2C+Bonaire%2C+March+2%2C+2012%2C+Revised+Selected+Papers&rft.date=2012&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Financial+Cryptography+and+Data+Security%3A+FC+2012+Workshops%2C+USEC+and+WECSR+2012%2C+Kralendijk%2C+Bonaire%2C+March+2%2C+2012%2C+Revised+Selected+Papers&rft.series=Lecture+notes+in+computer+science%2C+7398&rft.au=Blyth%2C+Jim&rft.pub=Springer&rft.edition=&rft.isbn=3642346383
SOLR
_version_ 1792253819591065600
access_facet Electronic Resources
author Blyth, Jim
author2 Dietrich, Sven, Camp, L. Jean
author2_role oth, oth
author2_variant s d sd, l j c lj ljc
author_facet Blyth, Jim, Dietrich, Sven, Camp, L. Jean
author_role aut
author_sort Blyth, Jim
author_variant j b jb
callnumber-first T - Technology
callnumber-label TK5105
callnumber-raw TK5105.5-5105.9
callnumber-search TK5105.5-5105.9
callnumber-sort TK 45105.5 45105.9
callnumber-subject TK - Electrical and Nuclear Engineering
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index.., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions
ctrlnum (DE-627)1651888779, (DE-576)375374868, (DE-599)BSZ375374868, (OCoLC)820500516, (ZBM)1253.94004, (DE-He213)978-3-642-34638-5, (EBP)040545911
de15_date 2012-11-15T15:09:14Z
dech1_date 2012-11-15T15:09:14Z
doi_str_mv 10.1007/978-3-642-34638-5
era_facet 2012
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
facet_topic_nrw_music Electronic funds transfers, Security measures, Congresses, Data encryption (Computer science), Electronic commerce, Computer networks, Internet banking
finc_class_facet Informatik, Technik
fincclass_txtF_mv science-computerscience, economics
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2012 Kralendijk (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Kralendijk
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7398
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1651888779
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer, 2012
imprint_str_mv Berlin, Heidelberg: Springer, 2012
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1651888779
is_hierarchy_title Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
isbn 9783642346385
isbn_isn_mv 9783642346378, 3642329454, 9783642329456, 3642346375
issn_isn_mv 1611-3349
kxp_id_str 1651888779
language English
last_indexed 2024-02-29T17:07:15.128Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
marc024a_ct_mv 10.1007/978-3-642-34638-5
match_str blyth2012financialcryptographyanddatasecurityfc2012workshopsusecandwecsr2012kralendijkbonairemarch22012revisedselectedpapers
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7398
names_id_str_mv (DE-627)1251269400, (DE-576)181269406
oclc_num 820500516
physical Online-Ressource (X, 141 p. 22 illus, digital)
publishDate 2012
publishDateSort 2012
publishPlace Berlin, Heidelberg
publisher Springer
record_format marcfinc
record_id 375374868
recordtype marcfinc
rsn_id_str_mv (DE-15)3180074
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7398
series2 Lecture Notes in Computer Science ; 7398, SpringerLink ; Bücher
source_id 0
spelling Blyth, Jim aut, Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers edited by Jim Blyth, Sven Dietrich, L. Jean Camp, Berlin, Heidelberg Springer 2012, Online-Ressource (X, 141 p. 22 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7398, SpringerLink Bücher, Literaturangaben, Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index.., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions, Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Electronic funds transfers Security measures Congresses, Data encryption (Computer science) Congresses, Electronic commerce Security measures Congresses, Computer networks Security measures Congresses, Internet banking Security measures Congresses, Konferenzschrift 2012 Kralendijk (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4014359-4 (DE-627)104603631 (DE-576)208907467 Elektronischer Zahlungsverkehr gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, DE-101, Dietrich, Sven oth, Camp, L. Jean (DE-627)1251269400 (DE-576)181269406 oth, 9783642346378, Buchausg. u.d.T. Financial cryptography and data security Heidelberg [u.a.] : Springer, 2012 XI, 416 S. (DE-627)720966760 (DE-576)378452991 3642329454 9783642329456, Buchausg. u.d.T. Financial cryptography and data security Berlin : Springer, 2012 X, 140 S. (DE-627)727822101 (DE-576)382332075 3642346375 9783642346378, Lecture notes in computer science 7398 7398 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-34638-5 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-34638-5 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz375374868cov.jpg V:DE-576 X:springer image/jpeg 20130404105334 Cover, https://zbmath.org/?q=an:1253.94004 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)729064549, http://dx.doi.org/10.1007/978-3-642-34638-5 DE-14, DE-14 epn:3354615079 2012-11-15T15:09:14Z, http://dx.doi.org/10.1007/978-3-642-34638-5 DE-15, DE-15 epn:3354615117 2012-11-15T15:09:14Z, http://dx.doi.org/10.1007/978-3-642-34638-5 DE-Ch1, DE-Ch1 epn:3354615141 2012-11-15T15:09:14Z, http://dx.doi.org/10.1007/978-3-642-34638-5 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3354615206 2012-11-15T15:09:14Z, http://dx.doi.org/10.1007/978-3-642-34638-5 DE-520, DE-520 epn:3354615249 2012-11-15T15:09:14Z
spellingShingle Blyth, Jim, Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers, Lecture notes in computer science, 7398, Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index.., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions, Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Electronic funds transfers, Security measures, Congresses, Electronic commerce, Computer networks, Internet banking, Konferenzschrift 2012 Kralendijk, Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
swb_id_str 375374868
title Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
title_auth Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
title_full Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers edited by Jim Blyth, Sven Dietrich, L. Jean Camp
title_fullStr Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers edited by Jim Blyth, Sven Dietrich, L. Jean Camp
title_full_unstemmed Financial Cryptography and Data Security FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers edited by Jim Blyth, Sven Dietrich, L. Jean Camp
title_in_hierarchy 7398. Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers (2012)
title_short Financial Cryptography and Data Security
title_sort financial cryptography and data security fc 2012 workshops usec and wecsr 2012 kralendijk bonaire march 2 2012 revised selected papers
title_sub FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
title_unstemmed Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
topic Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Electronic funds transfers, Security measures, Congresses, Electronic commerce, Computer networks, Internet banking, Konferenzschrift 2012 Kralendijk, Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
topic_facet Computer science, Computer Communication Networks, Information Systems, Computer Science, Data encryption (Computer science), Electronic data processing, Cryptography., Computer networks ., Electronic commerce., Computers and civilization., Application software., Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung, Electronic funds transfers, Security measures, Congresses, Electronic commerce, Computer networks, Internet banking
url https://doi.org/10.1007/978-3-642-34638-5, http://dx.doi.org/10.1007/978-3-642-34638-5, https://swbplus.bsz-bw.de/bsz375374868cov.jpg, https://zbmath.org/?q=an:1253.94004