LEADER 04848nam 22008295 450 001 996466459803316 005 20200702075732.0 010 $a3-319-70278-5 024 7 $a10.1007/978-3-319-70278-0 035 $a(CKB)4340000000223529 035 $a(DE-He213)978-3-319-70278-0 035 $a(MiAaPQ)EBC6296734 035 $a(MiAaPQ)EBC5590901 035 $a(Au-PeEL)EBL5590901 035 $a(OCoLC)1013464786 035 $a(PPN)221251529 035 $a(EXLCZ)994340000000223529 100 $a20171118d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aFinancial Cryptography and Data Security$b[electronic resource] $eFC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers /$fedited by Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XXII, 636 p. 97 illus.) 225 1 $aSecurity and Cryptology ;$v10323 311 $a3-319-70277-7 327 $aEncrypted Computing and Applied Homomorphic Cryptography -- Bitcoin and Blockchain Research -- Secure Voting Systems -- Trusted Smart Contracts -- Targeted Attacks. 330 $aThis book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017. The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017. The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks. 410 0$aSecurity and Cryptology ;$v10323 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputers 606 $aComputer organization 606 $aArtificial intelligence 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems and Communication Service$3https://scigraph.springernature.com/ontologies/product-market-codes/I18008 606 $aComputing Milieux$3https://scigraph.springernature.com/ontologies/product-market-codes/I24008 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputers. 615 0$aComputer organization. 615 0$aArtificial intelligence. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aInformation Systems and Communication Service. 615 24$aComputing Milieux. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aArtificial Intelligence. 676 $a005.82 702 $aBrenner$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRohloff$b Kurt$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBonneau$b Joseph$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMiller$b Andrew$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRyan$b Peter Y.A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTeague$b Vanessa$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBracciali$b Andrea$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSala$b Massimiliano$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPintore$b Federico$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJakobsson$b Markus$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466459803316 996 $aFinancial Cryptography and Data Security$92568624 997 $aUNISA