|
|
|
|
LEADER |
02771nam a22005895i 4500 |
001 |
978-3-662-48051-9 |
003 |
DE-He213 |
005 |
20151103131856.0 |
007 |
cr nn 008mamaa |
008 |
150904s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662480519
|9 978-3-662-48051-9
|
024 |
7 |
|
|a 10.1007/978-3-662-48051-9
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Financial Cryptography and Data Security
|h [electronic resource] :
|b FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers /
|c edited by Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff.
|
250 |
|
|
|a 1st ed. 2015.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XII, 309 p. 59 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8976
|
520 |
|
|
|a This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015. The 22 full papers presented were carefully reviewed and selected from 39 submissions. They feature the outcome of the Second Workshop on Bitcoin Research, BITCOIN 2015, the Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2015, and the First Workshop on Wearable Security and Privacy, Wearable 2015.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
0 |
|a E-commerce.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a e-Commerce/e-business.
|
650 |
2 |
4 |
|a Computer Appl. in Administrative Data Processing.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
700 |
1 |
|
|a Brenner, Michael.
|e editor.
|
700 |
1 |
|
|a Christin, Nicolas.
|e editor.
|
700 |
1 |
|
|a Johnson, Benjamin.
|e editor.
|
700 |
1 |
|
|a Rohloff, Kurt.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662480502
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8976
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-662-48051-9
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|