LEADER 03495nam 22007335 450 001 996466055903316 005 20200707030114.0 010 $a3-642-32946-2 024 7 $a10.1007/978-3-642-32946-3 035 $a(CKB)3390000000030226 035 $a(SSID)ssj0000745954 035 $a(PQKBManifestationID)11418208 035 $a(PQKBTitleCode)TC0000745954 035 $a(PQKBWorkID)10861484 035 $a(PQKB)11291670 035 $a(DE-He213)978-3-642-32946-3 035 $a(MiAaPQ)EBC3070977 035 $a(PPN)168323141 035 $a(EXLCZ)993390000000030226 100 $a20120814d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFinancial Cryptography and Data Security$b[electronic resource] $e16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers /$fedited by Angelos D. Keromytis 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XI, 416 p. 78 illus.) 225 1 $aSecurity and Cryptology ;$v7397 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-32945-4 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27?March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce. 410 0$aSecurity and Cryptology ;$v7397 606 $aData encryption (Computer science) 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 608 $aConference papers and proceedings.$2fast 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aComputer Appl. in Administrative Data Processing. 676 $a005.82 702 $aKeromytis$b Angelos D$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466055903316 996 $aFinancial Cryptography and Data Security$9772196 997 $aUNISA LEADER 00885nam0-22003011i-450 001 990004335100403321 005 20250521155734.0 035 $a000433510 035 $aFED01000433510 035 $a(Aleph)000433510FED01 035 $a000433510 100 $a19990530d1982----km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a<>oeuvres$fde Pierre Chastellain et de Vaillant$epoetes du XV siecle$gedition critique par Robert Deschaux 210 $aGeneve$cDroz$d1982. 215 $a243 p.$d19 cm 225 1 $aTextes littéraires français$v300 700 1$aChastellain,$bPierre$0173010 702 1$aDeschaux,$bRobert 702 1$aVaillant 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004335100403321 952 $a840.8 TLF (300)$bIst.f.m.36054$fFLFBC 959 $aFLFBC 996 $aOeuvres$9486754 997 $aUNINA