9783662478530-3662478536-Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (Security and Cryptology)

Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (Security and Cryptology)

ISBN-13: 9783662478530
ISBN-10: 3662478536
Edition: 1st ed. 2015
Author: Tatsuaki Okamoto, Rainer Böhme
Publication date: 2015
Publisher: Springer
Format: Paperback 588 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783662478530
ISBN-10: 3662478536
Edition: 1st ed. 2015
Author: Tatsuaki Okamoto, Rainer Böhme
Publication date: 2015
Publisher: Springer
Format: Paperback 588 pages

Summary

Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (Security and Cryptology) (ISBN-13: 9783662478530 and ISBN-10: 3662478536), written by authors Tatsuaki Okamoto, Rainer Böhme, was published by Springer in 2015. With an overall rating of 4.5 stars, it's a notable title among other books. You can easily purchase or rent Financial Cryptography and Data Security: 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers (Security and Cryptology) (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechannels; cryptography in the cloud; payment and fraud detection; authentication and access control; cryptographic primitives; mobile security; privacy and incentives; applications and attacks; authenticated data structures.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book