| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910484680903321 |
|
|
Titolo |
Financial Cryptography and Data Security : 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers / / edited by Aggelos Kiayias |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIV, 650 p. 132 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 10322 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computers - Law and legislation |
Information technology - Law and legislation |
Computers and civilization |
Software engineering |
Computer networks |
Cryptology |
Legal Aspects of Computing |
Computers and Society |
Software Engineering |
Computer Communication Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Privacy and Identity Management -- Privacy and Data Processing -- Cryptographic Primitives and API's.-Vulnerabilities and Exploits -- Blockchain Technology -- Security of Internet Protocols -- Blind signatures.-Searching and Processing Private Data -- Secure Channel Protocols -- Privacy in Data Storage and Retrieval. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017. The 30 revised full papers and 5 short papers were carefully |
|
|
|
|
|
|
|
|
|
|
selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval. |
|
|
|
|
|
| |