MARC details
000 -LEADER |
fixed length control field |
02219nam a2200373Ia 4500 |
000 - LEADER |
fixed length control field |
03921nam a22004095i 4500 |
001 - CONTROL NUMBER |
control field |
978-3-031-35535-6 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240319120858.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230801s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783031355356 |
-- |
978-3-031-35535-6 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
5.8 |
245 ## - TITLE STATEMENT |
Title |
Homomorphic Encryption for Financial Cryptography |
Statement of responsibility, etc. |
edited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa. |
Medium |
[electronic resource] : |
250 ## - EDITION STATEMENT |
Edition statement |
1st ed. 2023. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cham |
Name of publisher, distributor, etc. |
Springer International Publishing |
Date of publication, distribution, etc. |
2023 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
VIII, 302 p. 102 illus., 80 illus. in color. |
Other physical details |
online resource. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection. Homomorphic encryption has the potential to be a game-changer for the industry and cloud industry. HE method in cloud computing is presented in this book as a solution to increase the security of the data. Moreover, this book provides details about the set of fundamentals of cryptography, classical HE systems, properties of HE schemes, challenges and opportunities in HE methods, key infrastructure, problem of key management, key sharing, current algorithmic strategies and its limitation in implementation for solving complex problems in financial cryptography, application in blockchain, multivariate cryptosystems based on quadratic equations to avoid the explosion of the coefficients. . |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography. |
9 (RLIN) |
31402 |
|
Topical term or geographic name entry element |
Cryptology. |
9 (RLIN) |
31403 |
|
Topical term or geographic name entry element |
Data and Information Security. |
9 (RLIN) |
31404 |
|
Topical term or geographic name entry element |
Data encryption (Computer science). |
9 (RLIN) |
31405 |
|
Topical term or geographic name entry element |
Data protection |
9 (RLIN) |
31406 |
|
Topical term or geographic name entry element |
Data protection. |
9 (RLIN) |
31406 |
|
Topical term or geographic name entry element |
Financial engineering. |
9 (RLIN) |
31407 |
|
Topical term or geographic name entry element |
Financial Technology and Innovation. |
9 (RLIN) |
31408 |
|
Topical term or geographic name entry element |
Privacy. |
9 (RLIN) |
31409 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Dhanaraj, Rajesh Kumar. |
9 (RLIN) |
31410 |
|
Personal name |
Ouaissa, Mariya. |
9 (RLIN) |
31411 |
|
Personal name |
Seethalakshmi, V. |
9 (RLIN) |
31412 |
|
Personal name |
Suganyadevi, S. |
9 (RLIN) |
31413 |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-3-031-35535-6">https://doi.org/10.1007/978-3-031-35535-6</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
e-Book |
Source of classification or shelving scheme |
Dewey Decimal Classification |