Handbook of Financial Cryptography and Security最新文献

筛选
英文 中文
Electronic Voting 电子投票
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c3
A. Kiayias
{"title":"Electronic Voting","authors":"A. Kiayias","doi":"10.1201/9781420059823-c3","DOIUrl":"https://doi.org/10.1201/9781420059823-c3","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity Management 身份管理
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c15
R. Wilton
{"title":"Identity Management","authors":"R. Wilton","doi":"10.1201/9781420059823-c15","DOIUrl":"https://doi.org/10.1201/9781420059823-c15","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129952472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Factors 人为因素
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c17
L. Coventry
{"title":"Human Factors","authors":"L. Coventry","doi":"10.1201/9781420059823-c17","DOIUrl":"https://doi.org/10.1201/9781420059823-c17","url":null,"abstract":"This 15 credit interdisciplinary certificate program is designed to prepare students with in-depth knowledge of the capabilities and limitations of people and the application of psychological concepts to the design and safety of products and services; including consumer goods, military products, interactive websites and games, and assistive technologies. This certificate requires that students take introductory psychology as well as the two human factors courses (9 credits). Students will also need to take one additional psychology course (3 credits), and one course (3 credits) outside of their major of study in order to foster the interdisciplinary nature of this certificate.","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 396
Public Key Infrastructure 公开密码匙基础设施
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c16
C. Ellison
{"title":"Public Key Infrastructure","authors":"C. Ellison","doi":"10.1201/9781420059823-c16","DOIUrl":"https://doi.org/10.1201/9781420059823-c16","url":null,"abstract":"Shared symmetric key but still need reliable way to associate public key with entity...","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Repudiation 不可抵赖性
Handbook of Financial Cryptography and Security Pub Date : 1900-01-01 DOI: 10.1201/9781420059823-c4
Jianying Zhou
{"title":"Non-Repudiation","authors":"Jianying Zhou","doi":"10.1201/9781420059823-c4","DOIUrl":"https://doi.org/10.1201/9781420059823-c4","url":null,"abstract":"","PeriodicalId":187321,"journal":{"name":"Handbook of Financial Cryptography and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信