000 | 03557nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-00305-0 | ||
003 | DE-He213 | ||
005 | 20240730171656.0 | ||
007 | cr nn 008mamaa | ||
008 | 180906s2018 sz | s |||| 0|eng d | ||
020 |
_a9783030003050 _9978-3-030-00305-0 |
||
024 | 7 |
_a10.1007/978-3-030-00305-0 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData Privacy Management, Cryptocurrencies and Blockchain Technology _h[electronic resource] : _bESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings / _cedited by Joaquin Garcia-Alfaro, Jordi Herrera-JoancomartĂ, Giovanni Livraga, Ruben Rios. |
250 | _a1st ed. 2018. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2018. |
|
300 |
_aXV, 442 p. 89 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11025 |
|
520 | _aThis book constitutes the refereed conference proceedings of the 2nd International Workshop on Cryprocurrencies and Blockchain Technology, CBT 2018, and the 13thInternational Workshop on Data Privacy Management, DPM 2018, on conjunction with the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. From the CBT Workshop 7 full and 8 short papers out of 39 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing. The DPM Workshop received 36 submissions from which 11 full and 5 short papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aComputer Communication Networks. _999808 |
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _999809 |
|
700 | 1 |
_aHerrera-JoancomartĂ, Jordi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _999810 |
|
700 | 1 |
_aLivraga, Giovanni. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _999811 |
|
700 | 1 |
_aRios, Ruben. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _999813 |
|
710 | 2 |
_aSpringerLink (Online service) _999815 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030003043 |
776 | 0 | 8 |
_iPrinted edition: _z9783030003067 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11025 _999817 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-00305-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c87734 _d87734 |