Financial Cryptography and Data Security

21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Financial Cryptography and Data Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319709727
Publisher: Springer International Publishing Publication: December 22, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319709727
Publisher: Springer International Publishing
Publication: December 22, 2017
Imprint: Springer
Language: English

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017.

The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Conference on Financial Cryptography and Data Security, FC 2017, held in Sliema, Malta, in April 2017.

The 30 revised full papers and 5 short papers were carefully selected and reviewed from 132 submissions. The papers are grouped in the following topical sections: Privacy and Identity Management; Privacy and Data Processing; Cryptographic Primitives and API's; Vulnerabilities and Exploits; Blockchain Technology; Security of Internet Protocols; Blind signatures; Searching and Processing Private Data; Secure Channel Protocols; and Privacy in Data Storage and Retrieval.

More books from Springer International Publishing

Cover of the book Applying Test Equating Methods by
Cover of the book Robust Digital Processing of Speech Signals by
Cover of the book Clinical Cases in Integrative Dermatology by
Cover of the book Advances in Affective and Pleasurable Design by
Cover of the book Prototyping of Concurrent Control Systems Implemented in FPGA Devices by
Cover of the book Chemistry and Technology of Honey Production by
Cover of the book Women in Sustainable Agriculture and Food Biotechnology by
Cover of the book Risk Management in Public Administration by
Cover of the book Phenomenology and the Primacy of the Political by
Cover of the book Software Engineering by
Cover of the book Thermal Processing of Packaged Foods by
Cover of the book Infections of the Ears, Nose, Throat, and Sinuses by
Cover of the book Multidimensional Queueing Models in Telecommunication Networks by
Cover of the book Polymyalgia Rheumatica and Giant Cell Arteritis by
Cover of the book Environmental Resource Management and the Nexus Approach by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy