Financial Cryptography and Data Security (Record no. 103790)

000 -LEADER
fixed length control field 03614nam a22005535i 4500
001 - CONTROL NUMBER
control field 978-3-642-34638-5
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220083330.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 121026s2012 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642346385
-- 978-3-642-34638-5
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-34638-5
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.5-5105.9
072 #7 - SUBJECT CATEGORY CODE
Subject category code UKN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM075000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Blyth, Jim.
Relator term editor.
245 10 - TITLE STATEMENT
Title Financial Cryptography and Data Security
Medium [electronic resource] :
Remainder of title FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers /
Statement of responsibility, etc edited by Jim Blyth, Sven Dietrich, L. Jean Camp.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2012.
300 ## - PHYSICAL DESCRIPTION
Extent X, 141 p. 22 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 7398
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management of Computing and Information Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element e-Commerce/e-business.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers and Society.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Systems Applications (incl. Internet).
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Dietrich, Sven.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Camp, L. Jean.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642346378
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 0302-9743 ;
Volume number/sequential designation 7398
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-34638-5
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-LNC

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue