LEADER 01408cam a2200313Ia 4500 001 991001896789707536 008 120329s20112013fr aaa b 001 0 fre d 020 $a9782355180231 022 $a12783846 035 $ab1408840x-39ule_inst 040 $aDip.to Beni Culturali$bita 100 1 $aCaumont, Olivier$0477807 245 10$aDépôts votifs d'armes et d'équipements militaires dans le sanctuaire gaulois et gallo-romain des Flaviers à Mouzon (Ardennes) /$cOlivier Caumont ; préface de John Scheid 260 $aMontagnac :$bÉditions Monique Mergoil,$cc2011 300 $a479 p. :$bill. ;$c30 cm. 490 0 $aMonographies instrumentum,$x1278-3846 ;$v39 504 $aContiene bibliografia: pp. 389-403 650 4$aGalli$zFrancia$zMouzon$xAntichità 650 4$aRomani$zFrancia$zMouzon$xAntichità 650 4$aScavi archeologici$zFrancia$zMouzon 651 4$aMouzon (Francia)$xAntichità 700 1 $aScheid, John 830 $aMonographies instrumentum;$v39 907 $a.b1408840x$b02-04-14$c26-11-12 912 $a991001896789707536 945 $aLE001 AR V 324 4°$g1$i2001000179237$lle001$op$pE75.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i15530395$z09-09-13 996 $aDépôts votifs d'armes et d'équipements militaires dans le sanctuaire gaulois et gallo-romain des Flaviers à Mouzon (Ardennes$9241633 997 $aUNISALENTO 998 $ale001$b26-11-12$cm$da $e-$ffre$gfr $h0$i0 LEADER 04326nam 22006495 450 001 996547955403316 005 20230801010128.0 010 $a3-031-35535-0 024 7 $a10.1007/978-3-031-35535-6 035 $a(MiAaPQ)EBC30670612 035 $a(Au-PeEL)EBL30670612 035 $a(DE-He213)978-3-031-35535-6 035 $a(PPN)272274208 035 $a(EXLCZ)9927899950900041 100 $a20230801d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHomomorphic Encryption for Financial Cryptography$b[electronic resource] $eRecent Inventions and Challenges /$fedited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (302 pages) 311 08$aPrint version: Seethalakshmi, V. Homomorphic Encryption for Financial Cryptography Cham : Springer International Publishing AG,c2023 9783031355349 327 $aChapter 1 -- Introduction to Homomorphic Encryption for Financial Cryptography -- Chapter 2 -- Survey on Homomorphic Encryption for Financial Cryptography Workout -- Chapter 3 Improved login interface algorithm for Financial Transactions using Visual Cryptographic Authentication -- Chapter 4 Securing shared data based on Homomorphic encryption schemes -- Chapter 5 Challenges and Opportunities associated with Homomorphic Encryption for Financial Cryptography -- Chapter 6 Homomorphic Encryption based Cloud Privacy-Preserving in Remote Ecg Monitoring and Surveillance -- Chapter 7 Enhancing Encryption Security against Cypher Attacks -- Chapter 8 Biometric Based Key Generation Using AES Algorithm for Real Time Security Applications -- Chapter 9 Financial Cryptography and its application in Blockchain -- Chapter 10 Algorithmic Strategies for Solving Complex Problems in Financial Cryptography.,- Chapter 11 Various Attacks on the implementation of Cryptographic Algorithms -- Chapter 12 A Survey on Private Keyword Sorting and Searching using Homomorphic Encryption -- Chapter 13 Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme. . 330 $aThis book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection. Homomorphic encryption has the potential to be a game-changer for the industry and cloud industry. HE method in cloud computing is presented in this book as a solution to increase the security of the data. Moreover, this book provides details about the set of fundamentals of cryptography, classical HE systems, properties of HE schemes, challenges and opportunities in HE methods, key infrastructure, problem of key management, key sharing, current algorithmic strategies and its limitation in implementation for solving complex problems in financial cryptography, application in blockchain, multivariate cryptosystems based on quadratic equations to avoid the explosion of the coefficients. . 606 $aData protection 606 $aFinancial engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection?Law and legislation 606 $aData and Information Security 606 $aFinancial Technology and Innovation 606 $aCryptology 606 $aPrivacy 615 0$aData protection. 615 0$aFinancial engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection?Law and legislation. 615 14$aData and Information Security. 615 24$aFinancial Technology and Innovation. 615 24$aCryptology. 615 24$aPrivacy. 676 $a005.824 700 $aSeethalakshmi$b V$01380449 701 $aDhanaraj$b Rajesh Kumar$01380450 701 $aSuganyadevi$b S$01380451 701 $aOuaissa$b Mariya$01380452 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996547955403316 996 $aHomomorphic Encryption for Financial Cryptography$93421888 997 $aUNISA