feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV046878218
    Format: 1 Online-Ressource , Illustrationen, Diagramme
    ISBN: 9783030544553
    Series Statement: Lecture notes in computer science 12063
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-54454-6
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-54456-0
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Datenstruktur ; Informationstheorie ; Computersicherheit ; Kryptologie ; Transaktion ; Zahlung ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    Boston [u.a.] : Kluwer Academic Publishers
    UID:
    b3kat_BV019764392
    Format: XV, 293 S. , graph. Darst.
    ISBN: 1402080891
    Series Statement: Advances in information security 12
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Kosten-Nutzen-Analyse ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV039980652
    Format: XI, 166 S. , Ill., graph. Darst.
    ISBN: 9781461419174 , 9781461419181
    Note: Lizenzpflichtig
    Language: English
    Subjects: Engineering
    RVK:
    Keywords: Funknetz ; Funktechnik ; Anwendung ; Netzwerktopologie ; Ad-hoc-Netz ; Drahtloses Sensorsystem ; Kommunikationsprotokoll ; Dienstgüte ; Computersicherheit ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Cambridge, Mass. [u.a.] : MIT Pr.
    UID:
    b3kat_BV013245381
    Format: XIII, 279 S. , Ill.
    ISBN: 0262032716
    Language: English
    Subjects: Economics
    RVK:
    RVK:
    RVK:
    Keywords: Computersicherheit ; Internet
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1728472113
    Format: 1 Online-Ressource(XXIV, 622 p. 838 illus., 81 illus. in color.)
    Edition: 1st ed. 2020.
    ISBN: 9783030544553
    Series Statement: Security and Cryptology 12063
    Content: Tale of Two Browsers: Understanding Users' Web Browser Choices in South Korea -- User-Centered Risk Communication for Safer Browsing -- The Effects of Cue Utilization and Cognitive Load in the Detection of Phishing Emails -- Cue Utilization, Phishing Feature and Phishing Email Detection -- Dis-Empowerment Online- An Investigation of Privacy & Sharing Perceptions & Method Preferences -- Security and Privacy Awareness in Smart Environments – A Cross-Country Investigation -- Understanding Perceptions of Smart Devices -- In Our Employer We Trust: Mental Models of Office Worker’s Privacy Perceptions -- Behaviour of Outsourced Employees as Sources of Information System Security Threats -- Exploring Effects of Auditory Stimuli on CAPTCHA Performance -- PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records -- Empathy as a Response to Frustration in Password Choice -- Fixing the Fixes: Assessing the Solutions of SAST Tools for Securing Password Storage -- Incorporating Psychology into Cyber Security Education: A Pedagogical Approach -- Effectiveness of multi-stakeholder discussions for decentralized finance: a conference report of CoDeFi 2020 -- Multistakeholder Governance for the Internet -- Future of Finance: From G20 to practical implementation of multi-stakeholder governance on blockchain based finance -- Securing Cryptocurrency Exchange: Building up Standard from Huge Failures -- Origami voting: a non-cryptographic approach to transparent ballot verification -- Towards Improving the Efficacy of Code-Based Verification in Internet Voting -- Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme -- Sets of Half-Average Nulls Generate Risk-Limiting Audits: SHANGRLA -- A Note on Risk-Limiting Bayesian Polling Audits for Two-Candidate Elections -- Vote selling resistant voting -- An Update on Marked Mix-Nets: An Attack, A Fix and PQ Possibilities -- Performance of Shuffling: Taking it to the Limits -- Characterizing Types of Smart Contracts in the Ethereum Landscape -- Smart Contract Development from the Perspective of Developers: Topics and Issues Discussed on Social Media -- Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts -- Scalable Open-Vote Network on Ethereum -- How to Dynamically Incentivize Sufficient Level of IoT Securitx -- Confidential and auditable payments -- MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network -- Marlowe: implementing and analysing financial contracts on blockchain -- Load Balancing for Sharded Blockchains -- The Extended UTXO Model -- Privacy-Preserving Cross-Chain Atomic Swaps -- A Blockchain Based Approach to Resource Sharing in Smart Neighbourhoods -- Enforcing Determinism of Java Smart Contracts -- Albert, an intermediate smart-contract language for the Tezos blockchain -- A Formally Verified Static Analysis Framework for Compositional Contracts.
    Content: This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography and Data Security, FC 2020, in Kota Kinabalu, Malaysia, in February 2020. The 39 full papers and 3 short papers presented in this book were carefully reviewed and selected from 73 submissions. The papers feature four Workshops: The 1st Asian Workshop on Usable Security, AsiaUSEC 2020, the 1st Workshop on Coordination of Decentralized Finance, CoDeFi 2020, the 5th Workshop on Advances in Secure Electronic Voting, VOTING 2020, and the 4th Workshop on Trusted Smart Contracts, WTSC 2020. The AsiaUSEC Workshop contributes an increase of the scientific quality of research in human factors in security and privacy. In terms of improving efficacy of secure systems, the research included an extension of graphical password authentication. Further a comparative study of SpotBugs, SonarQube, Cryptoguard and CogniCrypt identified strengths in each and refined the need for improvements in security testing tools. The CoDeFi Workshop discuss multi-disciplinary issues regarding technologies and operations of decentralized finance based on permissionless blockchain. The workshop consists of two parts; presentations by all stakeholders, and unconference style discussions. The VOTING Workshop cover topics like new methods for risk-limited audits, new ethods to increase the efficiency of mixnets, verification of security of voting schemes election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems, and new way of preventing voteselling by de-incentivising this via smart contracts. The WTSC Workshop focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of specialized blockchains.
    Additional Edition: ISBN 9783030544546
    Additional Edition: ISBN 9783030544560
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030544546
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783030544560
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV042503587
    Format: XI, 166 S. , Ill., graph. Darst.
    ISBN: 9781461419174 , 9781461419181
    Additional Edition: Erscheint auch als Online-Ausgabe 10.1007/978-1-4614-1918-1
    Language: English
    Subjects: Computer Science , Engineering
    RVK:
    RVK:
    Keywords: Funknetz ; Funktechnik ; Anwendung ; Netzwerktopologie ; Ad-hoc-Netz ; Drahtloses Sensorsystem ; Kommunikationsprotokoll ; Dienstgüte ; Computersicherheit ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1651888779
    Format: Online-Ressource (X, 141 p. 22 illus, digital)
    ISBN: 9783642346385
    Series Statement: Lecture Notes in Computer Science 7398
    Content: This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC 2012, and the third Workshop on Ethics in Computer Security Research, WECSR 2012, held in conjunction with the 16th International Conference on Financial Cryptology and Data Security, FC 2012, in Kralendijk, Bonaire. The 13 revised full papers presented were carefully selected from numerous submissions and cover all aspects of data security. The goal of the USEC workshop was to engage on all aspects of human factors and usability in the context of security. The goal of the WECSR workshop was to continue searching for a new path in computer security that is Institutional review boards at academic institutions, as well as compatible with ethical guidelines for societies at government institutions
    Note: Literaturangaben , Linguistic Properties of Multi-word Passphrases -- Understanding the Weaknesses of Human-Protocol Interaction -- High Stakes: Designing a Privacy Preserving Registry -- Protected Login -- Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks -- A Conundrum of Permissions: Installing Applications on an Android Smartphone -- Methodology for a Field Study of Anti-malware Software -- My Privacy Policy: Exploring End-user Specification of Free-form Location Access Rules -- A Refined Ethical Impact Assessment Tool and a Case Study of Its Application -- Ethics Committees and IRBs: Boon, or Bane, or More Research Needed -- Ethical and Secure Data Sharing across Borders -- Author Index..
    Additional Edition: ISBN 9783642346378
    Additional Edition: Buchausg. u.d.T. Financial cryptography and data security Heidelberg [u.a.] : Springer, 2012 ISBN 3642329454
    Additional Edition: ISBN 9783642329456
    Additional Edition: Buchausg. u.d.T. Financial cryptography and data security Berlin : Springer, 2012 ISBN 3642346375
    Additional Edition: ISBN 9783642346378
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Elektronischer Zahlungsverkehr ; Kryptologie ; Datensicherung ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    New York, NY : Imprint: Springer | New York, NY : Springer US
    UID:
    gbv_1773875310
    Format: 1 Online-Ressource(XV, 295 p.)
    Edition: 1st ed. 2004.
    ISBN: 9781402080906
    Series Statement: Advances in Information Security 12
    Content: System Reliability and Free Riding -- Pricing Security -- Cryptography and Competition Policy - Issues with ‘Trusted Computing’ -- How Much is Stronger DRM Worth? -- Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment -- Economics of IT Security Management -- Evaluating Damages Caused by Information Systems Security Incidents -- The Economic Consequences of Sharing Security Information -- The Economics of Information Security Investment -- What Price Privacy? -- Why We Can’t Be Bothered to Read Privacy Policies -- Improving Information Flow in the Information Security Market -- Privacy Attitudes and Privacy Behavior -- Privacy and Security of Personal Information -- Privacy, Economics, and Price Discrimination on the Internet -- We Want Security but We Hate It -- Security and Lock-In -- How and Why More Secure Technologies Succeed in Legacy Markets -- Cognitive Hacking -- Evaluating Security Systems: A Five-Step Process.
    Content: Economics of Information Security applies economics not to generate breakthroughs in theoretical economics, but rather breakthroughs in understanding the problems of security. Security, privacy and trusted computing are examined distinctly, using the tools of economics, and as elements of a larger dynamic system. Economics of Information Security is designed for managers struggling to understand the risks in organizations dependent on secure networks, as well as researchers. This book is also suitable for students in computer science, policy and management.
    Note: Includes bibliographical references and index
    Additional Edition: ISBN 9781441954732
    Additional Edition: ISBN 9781402080890
    Additional Edition: ISBN 9781475779790
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781441954732
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781402080890
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781475779790
    Language: English
    Keywords: Electronic Commerce ; Computersicherheit ; Kosten-Nutzen-Analyse ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages