• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Financial Cryptography and Data Security :

پدید آورنده
edited by Jim Blyth, Sven Dietrich, L. Jean Camp.

موضوع
Computer Communication Networks.,Computer science.,Data encryption (Computer science)

رده

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3642346375
(Number (ISBN
3642346383
(Number (ISBN
9783642346378
(Number (ISBN
9783642346385

NATIONAL BIBLIOGRAPHY NUMBER

Number
b567635

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Financial Cryptography and Data Security :
General Material Designation
[Book]
Other Title Information
FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers
First Statement of Responsibility
edited by Jim Blyth, Sven Dietrich, L. Jean Camp.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Berlin, Heidelberg
Name of Publisher, Distributor, etc.
Springer
Date of Publication, Distribution, etc.
2012

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
(x, 141 Seiten 22 Illustrationen, digital)

SERIES

Series Title
Lecture notes in computer science, 7398.

CONTENTS NOTE

Text of Note
Linguistic Properties of Multi-word Passphrases.- Understanding the Weaknesses of Human-Protocol Interaction.- High Stakes: Designing a Privacy Preserving Registry.- Protected Login.- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks.- A Conundrum of Permissions: Installing Applications on an Android Smartphone.- Methodology for a Field Study of Anti-malware Software.- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules.- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application.- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed.- Ethical and Secure Data Sharing across Borders.- Author Index.

SUMMARY OR ABSTRACT

Text of Note
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions.

TOPICAL NAME USED AS SUBJECT

Computer Communication Networks.
Computer science.
Data encryption (Computer science)

PERSONAL NAME - PRIMARY RESPONSIBILITY

edited by Jim Blyth, Sven Dietrich, L. Jean Camp.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Jim Blyth
L Jean Camp
Sven Dietrich

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival