|
|
|
|
LEADER |
03899nam a2200565 4500 |
001 |
978-3-030-00305-0 |
003 |
DE-He213 |
005 |
20191026143154.0 |
007 |
cr nn 008mamaa |
008 |
180906s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030003050
|9 978-3-030-00305-0
|
024 |
7 |
|
|a 10.1007/978-3-030-00305-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Data Privacy Management, Cryptocurrencies and Blockchain Technology
|h [electronic resource] :
|b ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings /
|c edited by Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XV, 442 p. 89 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11025
|
520 |
|
|
|a This book constitutes the refereed conference proceedings of the 2nd International Workshop on Cryprocurrencies and Blockchain Technology, CBT 2018, and the 13thInternational Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. From the CBT Workshop 7 full and 8 short papers out of 39 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing. The DPM Workshop received 36 submissions from which 11 full and 5 short papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Software Engineering/Programming and Operating Systems.
|0 http://scigraph.springernature.com/things/product-market-codes/I14002
|
650 |
2 |
4 |
|a Computers and Society.
|0 http://scigraph.springernature.com/things/product-market-codes/I24040
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|0 http://scigraph.springernature.com/things/product-market-codes/I18008
|
700 |
1 |
|
|a Garcia-Alfaro, Joaquin.
|e editor.
|0 (orcid)0000-0002-7453-4393
|1 https://orcid.org/0000-0002-7453-4393
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Herrera-Joancomartí, Jordi.
|e editor.
|0 (orcid)0000-0002-4935-4681
|1 https://orcid.org/0000-0002-4935-4681
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Livraga, Giovanni.
|e editor.
|0 (orcid)0000-0003-2661-8573
|1 https://orcid.org/0000-0003-2661-8573
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Rios, Ruben.
|e editor.
|0 (orcid)0000-0002-6251-4897
|1 https://orcid.org/0000-0002-6251-4897
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030003043
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030003067
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11025
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-00305-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|