Financial Cryptography and Data Security

18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Financial Cryptography and Data Security by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662454725
Publisher: Springer Berlin Heidelberg Publication: November 8, 2014
Imprint: Springer Language: English
Author:
ISBN: 9783662454725
Publisher: Springer Berlin Heidelberg
Publication: November 8, 2014
Imprint: Springer
Language: English

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014.

The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, in March 2014.

The 19 revised full papers and 12 short papers were carefully selected and reviewed from 165 abstract registrations and 138 full papers submissions. The papers are grouped in the following topical sections: payment systems, case studies, cloud and virtualization, elliptic curve cryptography, privacy-preserving systems, authentication and visual encryption, network security, mobile system security, incentives, game theory and risk, and bitcoin anonymity.

More books from Springer Berlin Heidelberg

Cover of the book Nichtlineare Regelungssysteme by
Cover of the book IT-Governance in der Praxis by
Cover of the book Polycondensation by
Cover of the book European Economics and Politics in the Midst of the Crisis by
Cover of the book Basement Correlation Across the North Atlantic by
Cover of the book The Real and Virtual Worlds of Spatial Planning by
Cover of the book Gastrointestinal Operations and Technical Variations by
Cover of the book Cardiovascular MRI in Congenital Heart Disease by
Cover of the book Applied Anatomy of the Back by
Cover of the book A Guide to Continuous Improvement Transformation by
Cover of the book Tailored Light 1 by
Cover of the book JIMD Reports - Case and Research Reports, 2011/2 by
Cover of the book Computed Tomography of the Brain by
Cover of the book Software Quality Approaches: Testing, Verification, and Validation by
Cover of the book Strömungsgeräusche by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy