Financial cryptography and data security: FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7862 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XII, 237 S.) graph. Darst. |
ISBN: | 3642413196 9783642413209 |
DOI: | 10.1007/978-3-642-41320-9 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV041588237 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 140124s2013 gw d||| o|||| 10||| eng d | ||
020 | |a 3642413196 |9 3-642-41319-6 | ||
020 | |a 9783642413209 |c eISBN |9 978-3-642-41320-9 | ||
024 | 7 | |a 10.1007/978-3-642-41320-9 |2 doi | |
024 | 3 | |a 9783642413193 | |
028 | 5 | 2 | |a Best.-Nr.: 86326703 |
035 | |a (OCoLC)865039925 | ||
035 | |a (DE-599)BVBBV041588237 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Financial cryptography and data security |b FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XII, 237 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7862 | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Elektronischer Zahlungsverkehr |0 (DE-588)4014359-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Okinawa |2 gnd-content | |
689 | 0 | 0 | |a Elektronischer Zahlungsverkehr |0 (DE-588)4014359-4 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Adams, Andrew A. |d 1969- |e Sonstige |0 (DE-588)104433150X |4 oth | |
710 | 2 | |a USEC |e Sonstige |4 oth | |
711 | 2 | |a FC |n 17 |d 2013 |c Okinawa |j Sonstige |0 (DE-588)1041270542 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-642-41319-3 |
830 | 0 | |a Lecture notes in computer science |v 7862 |w (DE-604)BV014880109 |9 7862 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-41320-9 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033372&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027033372 |
Datensatz im Suchindex
_version_ | 1820875555647520768 |
---|---|
adam_text |
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
THE WORKSHOP ON USABLE SECURITY (USEC 13)
I THINK, THEREFORE I AM: USABILITY AND SECURITY OF AUTHENTICATION USING
BRAINWAVES
USABILITY AND SECURITY OF GAZE-BASED GRAPHICAL GRID PASSWORDS
THE IMPACT OF LENGTH AND MATHEMATICAL OPERATORS ON THE USABILITY AND
SECURITY OF SYSTEM-ASSIGNED ONE-TIME PINS
QRISHING: THE SUSCEPTIBILITY OF SMARTPHONE USERS TO QR CODE PHISHING
ATTACKS
“COMPLY OR DIE" IS DEAD: LONG LIVE SECURITY-AWARE PRINCIPAL AGENTS
INFORMATION SECURITY AS A CREDENCE GOOD
SORRY, I DON'T GET IT: AN ANALYSIS OF WARNING MESSAGE TEXTS
SOULMATE OR ACQUAINTANCE? VISUALIZING TIE STRENGTH FOR TRUST INFERENCE
AWARENESS ABOUT PHOTOS ON THE WEB AND HOW PRIVACY-PRIVACY-TRADEOFFS
COULD HELP
BOOTSTRAPPING TRUST IN ONLINE DATING: SOCIAL VERIFICATION OF ONLINE
DATING PROFILES
THE WORKSHOP ON APPLIED HOMOMORPHIC CRYPTOGRAPHY (WAHC 13)
SHADE: SECURE HAMMING DISTANCE COMPUTATION FROM OBLIVIOUS TRANSFER
GARBLED CIRCUITS VIA STRUCTURED ENCRYPTION
ON THE MINIMAL NUMBER OF BOOTSTRAPPINGS IN HOMOMORPHIC CIRCUITS
PRIVACY PRESERVING DATA PROCESSING WITH COLLABORATION OF HOMOMORPHIC
PARALLEL HOMOMORPHIC ENCRYPTION
TARGETING FPGA DSP SLICES FOR A LARGE INTEGER MULTIPLIER FOR INTEGER
BASED FHE.
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE WORKSHOP ON USABLE SECURITY, USEC 2013, AND THE THIRD
WORKSHOP ON APPLIED HOMOMORPHIC CRYPTOGRAPHY, WAHC 2013, HELD IN
CONJUNCTION WITH THE 17TH INTERNATIONAL CONFERENCE ON FINANCIAL
CRYPTOLOGY AND DATA SECURITY, FC 2013, IN OKINAWA, JAPAN. THE 16 REVISED
FULL PAPERS PRESENTED WERE CAREFULLY SELECTED FROM NUMEROUS SUBMISSIONS
AND COVER ALL ASPECTS OF DATA SECURITY. THE GOAL OF THE USEC WORKSHOP
WAS TO ENGAGE ON ALL ASPECTS OF HUMAN FACTORS AND USABILITY IN THE
CONTEXT OF SECURITY. THE GOAL OF THE WAHC WORKSHOP WAS TO BRING TOGETHER
PROFESSIONALS, RESEARCHERS AND PRACTITIONERS IN THE AREA OF COMPUTER
SECURITY AND APPLIED CRYPTOGRAPHY WITH AN INTEREST IN PRACTICAL
APPLICATIONS OF HOMOMORPHIC ENCRYPTION, SECURE FUNCTION EVALUATION,
PRIVATE INFORMATION RETRIEVAL OR SEARCHABLE ENCRYPTION TO PRESENT,
DISCUSS, AND SHARE THE LATEST FINDINGS IN THE FIELD, AND TO EXCHANGE
IDEAS THAT ADDRESS REAL-WORLD PROBLEMS WITH PRACTICAL SOLUTIONS USING
HOMOMORPHIC CRYPTOGRAPHY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)104433150X |
building | Verbundindex |
bvnumber | BV041588237 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)865039925 (DE-599)BVBBV041588237 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-41320-9 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV041588237</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140124s2013 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642413196</subfield><subfield code="9">3-642-41319-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642413209</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-41320-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-41320-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642413193</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86326703</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)865039925</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041588237</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Financial cryptography and data security</subfield><subfield code="b">FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XII, 237 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7862</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elektronischer Zahlungsverkehr</subfield><subfield code="0">(DE-588)4014359-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Okinawa</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Elektronischer Zahlungsverkehr</subfield><subfield code="0">(DE-588)4014359-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Adams, Andrew A.</subfield><subfield code="d">1969-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)104433150X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">USEC</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">FC</subfield><subfield code="n">17</subfield><subfield code="d">2013</subfield><subfield code="c">Okinawa</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1041270542</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-642-41319-3</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7862</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7862</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-41320-9</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033372&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027033372</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Okinawa gnd-content |
genre_facet | Konferenzschrift 2013 Okinawa |
id | DE-604.BV041588237 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:17:29Z |
institution | BVB |
institution_GND | (DE-588)1041270542 |
isbn | 3642413196 9783642413209 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027033372 |
oclc_num | 865039925 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XII, 237 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Financial cryptography and data security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers Berlin [u.a.] Springer 2013 1 Online-Ressource (XII, 237 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7862 Datensicherung (DE-588)4011144-1 gnd rswk-swf Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Okinawa gnd-content Elektronischer Zahlungsverkehr (DE-588)4014359-4 s Kryptologie (DE-588)4033329-2 s Datensicherung (DE-588)4011144-1 s DE-604 Adams, Andrew A. 1969- Sonstige (DE-588)104433150X oth USEC Sonstige oth FC 17 2013 Okinawa Sonstige (DE-588)1041270542 oth Erscheint auch als Druck-Ausgabe, Paperback 978-3-642-41319-3 Lecture notes in computer science 7862 (DE-604)BV014880109 7862 https://doi.org/10.1007/978-3-642-41320-9 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033372&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Financial cryptography and data security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers Lecture notes in computer science Datensicherung (DE-588)4011144-1 gnd Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4014359-4 (DE-588)4033329-2 (DE-588)1071861417 |
title | Financial cryptography and data security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers |
title_auth | Financial cryptography and data security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers |
title_exact_search | Financial cryptography and data security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers |
title_full | Financial cryptography and data security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers |
title_fullStr | Financial cryptography and data security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers |
title_full_unstemmed | Financial cryptography and data security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers |
title_short | Financial cryptography and data security |
title_sort | financial cryptography and data security fc 2013 workshops usec and wahc 2013 okinawa japan april 1 2013 revised selected papers |
title_sub | FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013 ; revised selected papers |
topic | Datensicherung (DE-588)4011144-1 gnd Elektronischer Zahlungsverkehr (DE-588)4014359-4 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Datensicherung Elektronischer Zahlungsverkehr Kryptologie Konferenzschrift 2013 Okinawa |
url | https://doi.org/10.1007/978-3-642-41320-9 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033372&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027033372&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT adamsandrewa financialcryptographyanddatasecurityfc2013workshopsusecandwahc2013okinawajapanapril12013revisedselectedpapers AT usec financialcryptographyanddatasecurityfc2013workshopsusecandwahc2013okinawajapanapril12013revisedselectedpapers AT fcokinawa financialcryptographyanddatasecurityfc2013workshopsusecandwahc2013okinawajapanapril12013revisedselectedpapers |