Financial cryptography and data security: 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Cham, Switzerland
Springer
[2025]
|
Ausgabe: | 1st ed. 2025 |
Schriftenreihe: | Lecture notes in computer science
14745 |
Schlagworte: | |
Online-Zugang: | DE-522 DE-634 DE-Aug4 DE-1050 DE-573 DE-M347 DE-92 DE-898 DE-859 DE-861 DE-863 DE-862 DE-523 DE-91 DE-384 DE-473 DE-19 DE-355 DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 URL des Erstveröffentlichers |
Beschreibung: | 1 Online-Ressource (xvi, 391 Seiten) 71 Illustrationen, 38 in Farbe |
ISBN: | 9783031786792 |
ISSN: | 1611-3349 |
DOI: | 10.1007/978-3-031-78679-2 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV050193179 | ||
003 | DE-604 | ||
005 | 20250313 | ||
007 | cr|uuu---uuuuu | ||
008 | 250306s2025 xx a||| o|||| 10||| eng d | ||
020 | |a 9783031786792 |c Online |9 978-3-031-78679-2 | ||
024 | 7 | |a 10.1007/978-3-031-78679-2 |2 doi | |
035 | |a (ZDB-2-SCS)9783031786792 | ||
035 | |a (ZDB-2-LNC)9783031786792 | ||
035 | |a (DE-599)BVBBV050193179 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-Aug4 |a DE-522 |a DE-83 |a DE-29 |a DE-703 |a DE-898 |a DE-473 |a DE-M347 |a DE-19 |a DE-355 |a DE-91 |a DE-1050 |a DE-739 |a DE-634 |a DE-863 |a DE-573 |a DE-706 |a DE-523 |a DE-859 |a DE-20 |a DE-824 |a DE-861 |a DE-862 |a DE-92 | ||
082 | 0 | |a 005.824 |2 23 | |
084 | |a DAT 465 |2 stub | ||
084 | |a WIR 150 |2 stub | ||
111 | 2 | |a Financial Cryptography and Data Security (Veranstaltung) |n 28. |d 2024 |c Willemstad, Curaçao |j Verfasser |0 (DE-588)1355480019 |4 aut | |
245 | 1 | 0 | |a Financial cryptography and data security |b 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II |c Jeremy Clark, Elaine Shi, editors |
264 | 1 | |a Cham, Switzerland |b Springer |c [2025] | |
300 | |a 1 Online-Ressource (xvi, 391 Seiten) |b 71 Illustrationen, 38 in Farbe | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 14745 |x 1611-3349 | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a Operating Systems | |
650 | 4 | |a Computer and Information Systems Applications | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer networks | |
650 | 4 | |a Operating systems (Computers) | |
650 | 4 | |a Application software | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Zahlung |0 (DE-588)4190478-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationstheorie |0 (DE-588)4026927-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenstruktur |0 (DE-588)4011146-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Transaktion |0 (DE-588)4185865-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2024 |z Willemstad, Curaçao |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Transaktion |0 (DE-588)4185865-7 |D s |
689 | 0 | 3 | |a Zahlung |0 (DE-588)4190478-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 1 | |a Datenstruktur |0 (DE-588)4011146-5 |D s |
689 | 1 | 2 | |a Informationstheorie |0 (DE-588)4026927-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Clark, Jeremy |4 edt | |
700 | 1 | |a Shi, Elaine |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-78678-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-78680-8 |
830 | 0 | |a Lecture notes in computer science |v 14745 |w (DE-604)BV014880109 |9 14745 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-78679-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2025 | |
940 | 1 | |q ZDB-2-LNC_2025 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035528672 | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-522 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-634 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-Aug4 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-1050 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-573 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-M347 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-92 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-898 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-859 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-861 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-863 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-862 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-523 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-91 |p ZDB-2-LNC |q ZDB-2-LNC_2025 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-384 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-473 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-19 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-355 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-703 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-20 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-706 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-824 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-29 |p ZDB-2-LNC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-031-78679-2 |l DE-739 |p ZDB-2-LNC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1826536838102253569 |
---|---|
adam_text | |
any_adam_object | |
author2 | Clark, Jeremy Shi, Elaine |
author2_role | edt edt |
author2_variant | j c jc e s es |
author_corporate | Financial Cryptography and Data Security (Veranstaltung) Willemstad, Curaçao |
author_corporate_role | aut |
author_facet | Clark, Jeremy Shi, Elaine Financial Cryptography and Data Security (Veranstaltung) Willemstad, Curaçao |
author_sort | Financial Cryptography and Data Security (Veranstaltung) Willemstad, Curaçao |
building | Verbundindex |
bvnumber | BV050193179 |
classification_tum | DAT 465 WIR 150 |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (ZDB-2-SCS)9783031786792 (ZDB-2-LNC)9783031786792 (DE-599)BVBBV050193179 |
dewey-full | 005.824 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.824 |
dewey-search | 005.824 |
dewey-sort | 15.824 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.1007/978-3-031-78679-2 |
edition | 1st ed. 2025 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV050193179</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250313</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">250306s2025 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031786792</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-78679-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-78679-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783031786792</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783031786792</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050193179</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.824</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 150</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Financial Cryptography and Data Security (Veranstaltung)</subfield><subfield code="n">28.</subfield><subfield code="d">2024</subfield><subfield code="c">Willemstad, Curaçao</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1355480019</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Financial cryptography and data security</subfield><subfield code="b">28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II</subfield><subfield code="c">Jeremy Clark, Elaine Shi, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvi, 391 Seiten)</subfield><subfield code="b">71 Illustrationen, 38 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">14745</subfield><subfield code="x">1611-3349</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zahlung</subfield><subfield code="0">(DE-588)4190478-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Transaktion</subfield><subfield code="0">(DE-588)4185865-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2024</subfield><subfield code="z">Willemstad, Curaçao</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Transaktion</subfield><subfield code="0">(DE-588)4185865-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Zahlung</subfield><subfield code="0">(DE-588)4190478-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Informationstheorie</subfield><subfield code="0">(DE-588)4026927-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clark, Jeremy</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shi, Elaine</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-78678-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-78680-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">14745</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">14745</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2025</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2025</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035528672</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2025</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-78679-2</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2024 Willemstad, Curaçao gnd-content |
genre_facet | Konferenzschrift 2024 Willemstad, Curaçao |
id | DE-604.BV050193179 |
illustrated | Illustrated |
indexdate | 2025-03-14T04:01:10Z |
institution | BVB |
institution_GND | (DE-588)1355480019 |
isbn | 9783031786792 |
issn | 1611-3349 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035528672 |
open_access_boolean | |
owner | DE-384 DE-Aug4 DE-522 DE-83 DE-29 DE-703 DE-898 DE-BY-UBR DE-473 DE-BY-UBG DE-M347 DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-1050 DE-739 DE-634 DE-863 DE-BY-FWS DE-573 DE-706 DE-523 DE-859 DE-20 DE-824 DE-861 DE-862 DE-BY-FWS DE-92 |
owner_facet | DE-384 DE-Aug4 DE-522 DE-83 DE-29 DE-703 DE-898 DE-BY-UBR DE-473 DE-BY-UBG DE-M347 DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-91 DE-BY-TUM DE-1050 DE-739 DE-634 DE-863 DE-BY-FWS DE-573 DE-706 DE-523 DE-859 DE-20 DE-824 DE-861 DE-862 DE-BY-FWS DE-92 |
physical | 1 Online-Ressource (xvi, 391 Seiten) 71 Illustrationen, 38 in Farbe |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2025 ZDB-2-LNC_2025 ZDB-2-LNC ZDB-2-LNC_2025 |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spellingShingle | Financial cryptography and data security 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II Cryptology Computer Communication Networks Operating Systems Computer and Information Systems Applications Data and Information Security Cryptography Data encryption (Computer science) Computer networks Operating systems (Computers) Application software Data protection Zahlung (DE-588)4190478-3 gnd Informationstheorie (DE-588)4026927-9 gnd Datenstruktur (DE-588)4011146-5 gnd Transaktion (DE-588)4185865-7 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd Lecture notes in computer science |
subject_GND | (DE-588)4190478-3 (DE-588)4026927-9 (DE-588)4011146-5 (DE-588)4185865-7 (DE-588)4274324-2 (DE-588)4033329-2 (DE-588)1071861417 |
title | Financial cryptography and data security 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II |
title_auth | Financial cryptography and data security 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II |
title_exact_search | Financial cryptography and data security 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II |
title_full | Financial cryptography and data security 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II Jeremy Clark, Elaine Shi, editors |
title_fullStr | Financial cryptography and data security 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II Jeremy Clark, Elaine Shi, editors |
title_full_unstemmed | Financial cryptography and data security 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II Jeremy Clark, Elaine Shi, editors |
title_short | Financial cryptography and data security |
title_sort | financial cryptography and data security 28th international conference fc 2024 willemstad curacao march 4 8 2024 revised selected papers part ii |
title_sub | 28th international conference, FC 2024, Willemstad, Curaçao, March 4-8, 2024, revised selected papers, part II |
topic | Cryptology Computer Communication Networks Operating Systems Computer and Information Systems Applications Data and Information Security Cryptography Data encryption (Computer science) Computer networks Operating systems (Computers) Application software Data protection Zahlung (DE-588)4190478-3 gnd Informationstheorie (DE-588)4026927-9 gnd Datenstruktur (DE-588)4011146-5 gnd Transaktion (DE-588)4185865-7 gnd Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptology Computer Communication Networks Operating Systems Computer and Information Systems Applications Data and Information Security Cryptography Data encryption (Computer science) Computer networks Operating systems (Computers) Application software Data protection Zahlung Informationstheorie Datenstruktur Transaktion Computersicherheit Kryptologie Konferenzschrift 2024 Willemstad, Curaçao |
url | https://doi.org/10.1007/978-3-031-78679-2 |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT financialcryptographyanddatasecurityveranstaltungwillemstadcuracao financialcryptographyanddatasecurity28thinternationalconferencefc2024willemstadcuracaomarch482024revisedselectedpaperspartii AT clarkjeremy financialcryptographyanddatasecurity28thinternationalconferencefc2024willemstadcuracaomarch482024revisedselectedpaperspartii AT shielaine financialcryptographyanddatasecurity28thinternationalconferencefc2024willemstadcuracaomarch482024revisedselectedpaperspartii |