Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
39
views
0
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,106
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Financial Cryptography and Data Security
other
Editor(s):
Angelos D. Keromytis
Publication date
(Print):
2012
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Author and book information
Book
ISBN (Print):
978-3-642-32945-6
ISBN (Electronic):
978-3-642-32946-3
Publication date (Print):
2012
DOI:
10.1007/978-3-642-32946-3
SO-VID:
b815acb7-75e0-4656-9e90-bb3b368c384b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 215
Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access
pp. 25
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs
pp. 41
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs
pp. 57
Deploying Secure Multi-Party Computation for Financial Data Analysis
pp. 114
Attacking the Washington, D.C. Internet Voting System
pp. 200
Privacy-Preserving Stream Aggregation with Fault Tolerance
pp. 285
UC-Secure Searchable Symmetric Encryption
pp. 314
A Cache Timing Attack on AES in Virtualization Environments
pp. 374
Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs
pp. 390
CommitCoin: Carbon Dating Commitments with Bitcoin
Similar content
4,106
Experimental quantum cryptography scheme based on orthogonal states
Authors:
Alessio Avella
,
Giorgio Brida
,
Ivo Pietro Degiovanni
…
Unambiguous state discrimination of coherent states with linear optics: Application to quantum cryptography
Authors:
S van Enk
Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process
Authors:
Dustin Moody
See all similar
Cited by
2
Effects of the internet on participation: Study of a public policy referendum in Brazil
Authors:
Paolo Spada
,
Jonathan Mellon
,
Tiago Peixoto
…
The Inherent Difficulties and Complexities of Voting Electronically
Authors:
Dimitrios Zissis
,
Dimitrios Lekkas
See all cited by