Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, F...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Blyth Jim (Directeur de publication), Dietrich Sven (Directeur de publication), Camp L. Jean (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Financial Cryptography and Data Security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers / edited by Jim Blyth, Sven Dietrich, L. Jean Camp.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2012
Cham : Springer Nature
Collection : Security and Cryptology ; 7398
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Sujets :
Documents associés : Autre format: Financial Cryptography and Data Security
Autre format: Financial Cryptography and Data Security
LEADER 04205clm a2200685 4500
001 PPN168327317
003 http://www.sudoc.fr/168327317
005 20241001155200.0
010 |a 978-3-642-34638-5 
017 7 0 |a 10.1007/978-3-642-34638-5  |2 DOI 
035 |a (OCoLC)818324375 
035 |a Springer978-3-642-34638-5 
035 |a Springer-11645-978-3-642-34638-5 
100 |a 20130325d2012 k y0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
105 |a y z 100yy 
106 |a s 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Financial Cryptography and Data Security  |e FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers  |f edited by Jim Blyth, Sven Dietrich, L. Jean Camp. 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d 2012 
225 0 |a Security and Cryptology  |x 2946-1863  |v 7398 
330 |a This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions. 
359 1 |a Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index. 
371 0 |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition 
410 | |t Security and Cryptology  |x 2946-1863  |v 7398 
452 | |t Financial Cryptography and Data Security  |y 9783642346378 
452 | |t Financial Cryptography and Data Security  |b Texte imprimé  |y 9783642346392 
608 |3 PPN02886431X  |a Actes de congrès  |2 rameau 
610 1 |a Computer Science 
610 2 |a Data Encryption 
610 2 |a Management of Computing and Information Systems 
610 2 |a e-Commerce  |a e-business 
610 2 |a Information Systems Applications (incl. Internet) 
610 2 |a Computer Communication Networks 
610 2 |a Computers and Society 
610 2 |a Cryptology. 
610 2 |a e-Commerce and e-Business 
610 2 |a IT Operations 
610 2 |a Computer and Information Systems Applications 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 004.6  |v 23 
680 |a TK5105.5-5105.9 
700 1 |a Blyth  |b Jim  |4 651 
701 1 |a Dietrich  |b Sven  |4 651 
701 1 |a Camp  |b L. Jean  |4 651 
801 3 |a FR  |b Abes  |c 20231204  |g AFNOR 
801 1 |a DE  |b Springer  |c 20231204  |g AACR2 
856 4 |5 441099901:830856048  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-34638-5 
915 |5 441099901:830856048  |b SPRING13-00641 
930 |5 441099901:830856048  |b 441099901  |j g 
991 |5 441099901:830856048  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:13 
997 |a NUM  |b SPRING13-00641  |d NUMpivo  |e EM  |s d 
998 |a 978473