Eintrag weiter verarbeiten

Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers

Gespeichert in:

Personen und Körperschaften: Adams, Andrew A. (Sonstige)
Titel: Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers/ edited by Andrew A. Adams, Michael Brenner, Matthew Smith
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer 2013
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7862
Schlagwörter:
Druckausg.: Financial cryptography and data security, Heidelberg [u.a.] : Springer, 2013, XII, 237 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 08117cam a22013932 4500
001 0-1653049219
003 DE-627
005 20240122104841.0
007 cr uuu---uuuuu
008 131106s2013 gw |||||o 00| ||eng c
020 |a 9783642413209  |9 978-3-642-41320-9 
024 7 |a 10.1007/978-3-642-41320-9  |2 doi 
035 |a (DE-627)1653049219 
035 |a (DE-576)395819288 
035 |a (DE-599)BSZ395819288 
035 |a (OCoLC)865039925 
035 |a (ZBM)1293.94004 
035 |a (ZBM)1293.94004 
035 |a (DE-He213)978-3-642-41320-9 
035 |a (EBP)040551679 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *94-06  |2 msc 
084 |a 94A60  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.62  |2 bkl 
084 |a 54.38  |2 bkl 
084 |a 85.20  |2 bkl 
245 1 0 |a Financial Cryptography and Data Security  |b FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers  |c edited by Andrew A. Adams, Michael Brenner, Matthew Smith 
264 1 |a Berlin, Heidelberg  |b Springer  |c 2013 
300 |a Online-Ressource (XII, 239 p. 64 illus, online resource) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7862 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
505 8 0 |a The Workshop on Usable Security (USEC 13)I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves -- Usability and Security of Gaze-Based Graphical Grid Passwords -- The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs -- QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks -- “Comply or Die" Is Dead: Long live security-aware principal agents -- Information Security as a Credence Good -- Sorry, I Don't Get It: An Analysis of Warning Message Texts -- Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference -- Awareness about photos on the Web and how privacy-privacy-tradeoffs could help -- Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles -- The Workshop on Applied Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer -- Garbled Circuits via Structured Encryption -- On the Minimal Number of Bootstrappings in Homomorphic Circuits -- Privacy Preserving Data Processing with Collaboration of Homomorphic -- Parallel Homomorphic Encryption -- Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE. 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography 
650 0 |a Computer science 
650 0 |a Information systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Information systems 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 0 |a Electronic commerce. 
650 0 |a Information technology 
655 7 |a Konferenzschrift  |y 2013  |z Okinawa  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
655 7 |a Konferenzschrift  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4014359-4  |0 (DE-627)104603631  |0 (DE-576)208907467  |a Elektronischer Zahlungsverkehr  |2 gnd 
689 0 1 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 2 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 |5 DE-101 
700 1 |a Adams, Andrew A.  |d 1969-  |0 (DE-588)104433150X  |0 (DE-627)771776713  |0 (DE-576)26518326X  |4 oth 
776 1 |z 9783642413193 
776 0 8 |i Druckausg.  |t Financial cryptography and data security  |d Heidelberg [u.a.] : Springer, 2013  |h XII, 237 S.  |w (DE-627)768100526  |w (DE-576)408115696  |z 3642413196  |z 9783642413193 
830 0 |a Lecture notes in computer science  |v 7862  |9 7862  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-41320-9  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-41320-9  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz395819288cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20150316113321  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1293.94004  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
889 |w (DE-627)772151326 
912 |a ZDB-2-LNC  |b 2013 
912 |a ZDB-2-SCS  |b 2013 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2013 
912 |a ZDB-2-SEB  |b 2013 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.62  |j Datenstrukturen  |q SEPA  |0 (DE-627)106403265 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
936 b k |a 85.20  |j Betriebliche Information und Kommunikation  |q SEPA  |0 (DE-627)106414704 
951 |a BO 
950 |a Computergeld 
950 |a Belegloser Zahlungsverkehr 
950 |a Elektronisches Geld 
950 |a Bargeldloser Zahlungsverkehr 
950 |a Finanztechnologie 
950 |a Geheimcodetechnik 
950 |a Kryptografie 
950 |a Kryptographie 
950 |a Datenverschlüsselung 
950 |a Chiffrierung 
950 |a Steganographie 
950 |a Kryptologe 
950 |a 保密学 
950 |a 密码学 
950 |a 保密學 
950 |a 密碼學 
950 |a Криптология 
950 |a Datensicherheit 
950 |a Sicherheit 
950 |a Datenverarbeitung 
950 |a Informationssicherheit 
950 |a Computersicherheit 
950 |a Softwareschutz 
950 |a Надёжность сохранения данных 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-41320-9  |9 DE-14 
852 |a DE-14  |x epn:3362451438  |z 2013-11-06T08:22:49Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-41320-9  |9 DE-15 
852 |a DE-15  |x epn:3362451462  |z 2013-11-06T08:22:49Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-41320-9  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3362451500  |z 2013-11-06T08:22:49Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-41320-9  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3362451535  |z 2013-11-06T08:22:49Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-41320-9  |9 DE-520 
852 |a DE-520  |x epn:336245156X  |z 2013-11-06T08:22:49Z 
980 |a 1653049219  |b 0  |k 1653049219  |o 395819288 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Financial+Cryptography+and+Data+Security%3A+FC+2013+Workshops%2C+USEC+and+WAHC+2013%2C+Okinawa%2C+Japan%2C+April+1%2C+2013%2C+Revised+Selected+Papers&rft.date=2013&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Financial+Cryptography+and+Data+Security%3A+FC+2013+Workshops%2C+USEC+and+WAHC+2013%2C+Okinawa%2C+Japan%2C+April+1%2C+2013%2C+Revised+Selected+Papers&rft.series=Lecture+notes+in+computer+science%2C+7862&rft.au=&rft.pub=Springer&rft.edition=&rft.isbn=364241320X
SOLR
_version_ 1792258633936928768
access_facet Electronic Resources
author2 Adams, Andrew A.
author2_role oth
author2_variant a a a aa aaa
author_facet Adams, Andrew A.
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents The Workshop on Usable Security (USEC 13)I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves -- Usability and Security of Gaze-Based Graphical Grid Passwords -- The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs -- QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks -- “Comply or Die" Is Dead: Long live security-aware principal agents -- Information Security as a Credence Good -- Sorry, I Don't Get It: An Analysis of Warning Message Texts -- Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference -- Awareness about photos on the Web and how privacy-privacy-tradeoffs could help -- Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles -- The Workshop on Applied Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer -- Garbled Circuits via Structured Encryption -- On the Minimal Number of Bootstrappings in Homomorphic Circuits -- Privacy Preserving Data Processing with Collaboration of Homomorphic -- Parallel Homomorphic Encryption -- Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography
ctrlnum (DE-627)1653049219, (DE-576)395819288, (DE-599)BSZ395819288, (OCoLC)865039925, (ZBM)1293.94004, (DE-He213)978-3-642-41320-9, (EBP)040551679
de15_date 2013-11-06T08:22:49Z
dech1_date 2013-11-06T08:22:49Z
doi_str_mv 10.1007/978-3-642-41320-9
era_facet 2013
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
finc_class_facet Informatik, Mathematik
fincclass_txtF_mv science-computerscience, economics
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2013 Okinawa (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Okinawa
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7862
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1653049219
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer, 2013
imprint_str_mv Berlin, Heidelberg: Springer, 2013
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1653049219
is_hierarchy_title Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
isbn 9783642413209
isbn_isn_mv 9783642413193, 3642413196
issn_isn_mv 1611-3349
kxp_id_str 1653049219
language English
last_indexed 2024-02-29T18:23:46.119Z
local_heading_facet_dezwi2 Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic commerce., Information technology, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
marc024a_ct_mv 10.1007/978-3-642-41320-9
match_str adams2013financialcryptographyanddatasecurityfc2013workshopsusecandwahc2013okinawajapanapril12013revisedselectedpapers
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7862
names_id_str_mv (DE-588)104433150X, (DE-627)771776713, (DE-576)26518326X
oclc_num 865039925
physical Online-Ressource (XII, 239 p. 64 illus, online resource)
publishDate 2013
publishDateSort 2013
publishPlace Berlin, Heidelberg
publisher Springer
record_format marcfinc
record_id 395819288
recordtype marcfinc
rsn_id_str_mv (DE-15)3262984
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7862
series2 Lecture Notes in Computer Science ; 7862, SpringerLink ; Bücher
source_id 0
spelling Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers edited by Andrew A. Adams, Michael Brenner, Matthew Smith, Berlin, Heidelberg Springer 2013, Online-Ressource (XII, 239 p. 64 illus, online resource), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7862, SpringerLink Bücher, Literaturangaben, The Workshop on Usable Security (USEC 13)I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves -- Usability and Security of Gaze-Based Graphical Grid Passwords -- The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs -- QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks -- “Comply or Die" Is Dead: Long live security-aware principal agents -- Information Security as a Credence Good -- Sorry, I Don't Get It: An Analysis of Warning Message Texts -- Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference -- Awareness about photos on the Web and how privacy-privacy-tradeoffs could help -- Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles -- The Workshop on Applied Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer -- Garbled Circuits via Structured Encryption -- On the Minimal Number of Bootstrappings in Homomorphic Circuits -- Privacy Preserving Data Processing with Collaboration of Homomorphic -- Parallel Homomorphic Encryption -- Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography, Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic commerce., Information technology, Konferenzschrift 2013 Okinawa (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4014359-4 (DE-627)104603631 (DE-576)208907467 Elektronischer Zahlungsverkehr gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, DE-101, Adams, Andrew A. 1969- (DE-588)104433150X (DE-627)771776713 (DE-576)26518326X oth, 9783642413193, Druckausg. Financial cryptography and data security Heidelberg [u.a.] : Springer, 2013 XII, 237 S. (DE-627)768100526 (DE-576)408115696 3642413196 9783642413193, Lecture notes in computer science 7862 7862 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-41320-9 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-41320-9 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz395819288cov.jpg V:DE-576 X:springer image/jpeg 20150316113321 Cover, https://zbmath.org/?q=an:1293.94004 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, (DE-627)772151326, http://dx.doi.org/10.1007/978-3-642-41320-9 DE-14, DE-14 epn:3362451438 2013-11-06T08:22:49Z, http://dx.doi.org/10.1007/978-3-642-41320-9 DE-15, DE-15 epn:3362451462 2013-11-06T08:22:49Z, http://dx.doi.org/10.1007/978-3-642-41320-9 DE-Ch1, DE-Ch1 epn:3362451500 2013-11-06T08:22:49Z, http://dx.doi.org/10.1007/978-3-642-41320-9 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3362451535 2013-11-06T08:22:49Z, http://dx.doi.org/10.1007/978-3-642-41320-9 DE-520, DE-520 epn:336245156X 2013-11-06T08:22:49Z
spellingShingle Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers, Lecture notes in computer science, 7862, The Workshop on Usable Security (USEC 13)I Think, Therefore I Am: Usability and Security of Authentication Using Brainwaves -- Usability and Security of Gaze-Based Graphical Grid Passwords -- The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs -- QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks -- “Comply or Die" Is Dead: Long live security-aware principal agents -- Information Security as a Credence Good -- Sorry, I Don't Get It: An Analysis of Warning Message Texts -- Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference -- Awareness about photos on the Web and how privacy-privacy-tradeoffs could help -- Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles -- The Workshop on Applied Homomorphic Cryptography (WAHC 13) -- SHADE: Secure Hamming Distance computation from oblivious transfer -- Garbled Circuits via Structured Encryption -- On the Minimal Number of Bootstrappings in Homomorphic Circuits -- Privacy Preserving Data Processing with Collaboration of Homomorphic -- Parallel Homomorphic Encryption -- Targeting FPGA DSP Slices for a Large Integer Multiplier for Integer Based FHE., This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2013, and the third Workshop on Applied Homomorphic Cryptography, WAHC 2013, held in conjunction with the 17th International Conference on Financial Cryptology and Data Security, FC 2013, in Okinawa, Japan. The 16 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WAHC workshop was to bring together professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, secure function evaluation, private information retrieval or searchable encryption to present, discuss, and share the latest findings in the field, and to exchange ideas that address real-world problems with practical solutions using homomorphic cryptography, Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic commerce., Information technology, Konferenzschrift 2013 Okinawa, Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
swb_id_str 395819288
title Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
title_auth Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
title_full Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers edited by Andrew A. Adams, Michael Brenner, Matthew Smith
title_fullStr Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers edited by Andrew A. Adams, Michael Brenner, Matthew Smith
title_full_unstemmed Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers edited by Andrew A. Adams, Michael Brenner, Matthew Smith
title_in_hierarchy 7862. Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers (2013)
title_short Financial Cryptography and Data Security
title_sort financial cryptography and data security fc 2013 workshops usec and wahc 2013 okinawa japan april 1 2013 revised selected papers
title_sub FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
title_unstemmed Financial Cryptography and Data Security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers
topic Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic commerce., Information technology, Konferenzschrift 2013 Okinawa, Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
topic_facet Computer science, Information systems, Computer Science, Data protection, Data encryption (Computer science), Cryptography., Electronic commerce., Information technology, Konferenzschrift, Elektronischer Zahlungsverkehr, Kryptologie, Datensicherung
url https://doi.org/10.1007/978-3-642-41320-9, http://dx.doi.org/10.1007/978-3-642-41320-9, https://swbplus.bsz-bw.de/bsz395819288cov.jpg, https://zbmath.org/?q=an:1293.94004