Atjaunināt sīkdatņu piekrišanu

Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 2226, 2016, Revised Selected Papers 1st ed. 2017 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 620 pages, height x width: 235x155 mm, weight: 9475 g, 135 Illustrations, black and white; XIV, 620 p. 135 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 9603
  • Izdošanas datums: 17-May-2017
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662549697
  • ISBN-13: 9783662549698
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 620 pages, height x width: 235x155 mm, weight: 9475 g, 135 Illustrations, black and white; XIV, 620 p. 135 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 9603
  • Izdošanas datums: 17-May-2017
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662549697
  • ISBN-13: 9783662549698
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016.

The 27 revised full papers and 9 short papers were carefully selected and reviewed from 137 full papers submissions. The papers are grouped in the following topical sections: fraud and deception; payments, auctions, and e-voting; multiparty computation; mobile malware; social interaction and policy; cryptanalysis; surveillance and anonymity; Web security and data privacy; Bitcoin mining; cryptographic protocols; payment use and abuse.

Fraud and deception.- Payments, auctions, and e-voting.- Multiparty computation.- Mobile malware.- Social interaction and policy.- Cryptanalysis.- Surveillance and anonymity.- Web security and data privacy.- Bitcoin mining.- Cryptographic protocols.- Payment use and abuse.