000733939 000__ 02414cam\a2200553Ii\4500 000733939 001__ 733939 000733939 005__ 20230306141112.0 000733939 006__ m\\\\\o\\d\\\\\\\\ 000733939 007__ cr\cn\nnnunnun 000733939 008__ 150911s2015\\\\gw\a\\\\o\\\\\101\0\eng\d 000733939 020__ $$a9783662480519$$qelectronic book 000733939 020__ $$a3662480514$$qelectronic book 000733939 020__ $$z9783662480502 000733939 0247_ $$a10.1007/978-3-662-48051-9$$2doi 000733939 035__ $$aSP(OCoLC)ocn920877722 000733939 035__ $$aSP(OCoLC)920877722 000733939 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dOCLCF$$dOCLCO 000733939 049__ $$aISEA 000733939 050_4 $$aQA76.9.A25 000733939 08204 $$a005.8/2$$223 000733939 24500 $$aFinancial cryptography and data security$$h[electronic resource] :$$bFC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers /$$cedited by Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff. 000733939 2463_ $$aFC 2015 000733939 264_1 $$aHeidelberg :$$bSpringer,$$c2015. 000733939 300__ $$a1 online resource (xii, 309 pages) :$$billustrations. 000733939 336__ $$atext$$btxt$$2rdacontent 000733939 337__ $$acomputer$$bc$$2rdamedia 000733939 338__ $$aonline resource$$bcr$$2rdacarrier 000733939 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v8976 000733939 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000733939 500__ $$aIncludes author index. 000733939 506__ $$aAccess limited to authorized users. 000733939 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 11, 2015). 000733939 650_0 $$aData encryption (Computer science)$$vCongresses. 000733939 650_0 $$aComputer security$$vCongresses. 000733939 650_0 $$aUser-centered system design$$vCongresses. 000733939 7001_ $$aBrenner, Michael$$c(Computer scientist),$$eeditor. 000733939 7001_ $$aChristin, Nicolas,$$eeditor. 000733939 7001_ $$aJohnson, Benjamin,$$eeditor. 000733939 7001_ $$aRohloff, Kurt,$$eeditor. 000733939 7112_ $$aBITCOIN (Workshop)$$n(2nd :$$d2015 :$$cSan Juan, P.R.) 000733939 7112_ $$aWAHC (Workshop)$$n(3rd :$$d2015 :$$cSan Juan, P.R.) 000733939 7112_ $$aWearable (Workshop)$$n(1st :$$d2015 :$$cSan Juan, P.R.) 000733939 7112_ $$aFC (Conference)$$n(19th :$$d2015 :$$cSan Juan, P.R.) 000733939 830_0 $$aLecture notes in computer science ;$$v8976.$$x0302-9743 000733939 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000733939 852__ $$bebk 000733939 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-662-48051-9$$zOnline Access$$91397441.1 000733939 909CO $$ooai:library.usi.edu:733939$$pGLOBAL_SET 000733939 980__ $$aEBOOK 000733939 980__ $$aBIB 000733939 982__ $$aEbook 000733939 983__ $$aOnline 000733939 994__ $$a92$$bISE