<?xml version="1.0" encoding="UTF-8"?>
<item xmlns="http://omeka.org/schemas/omeka-xml/v5" itemId="18365" public="1" featured="0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://omeka.org/schemas/omeka-xml/v5 http://omeka.org/schemas/omeka-xml/v5/omeka-xml-5-0.xsd" uri="https://archives.christuniversity.in/items/show/18365?output=omeka-xml" accessDate="2026-05-06T16:46:46+00:00">
  <collection collectionId="15">
    <elementSetContainer>
      <elementSet elementSetId="1">
        <name>Dublin Core</name>
        <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
        <elementContainer>
          <element elementId="50">
            <name>Title</name>
            <description>A name given to the resource</description>
            <elementTextContainer>
              <elementText elementTextId="44496">
                <text>Book Chapter</text>
              </elementText>
            </elementTextContainer>
          </element>
        </elementContainer>
      </elementSet>
    </elementSetContainer>
  </collection>
  <itemType itemTypeId="27">
    <name>Book Chapter</name>
    <description>Faculty Publications- Book Chapter</description>
  </itemType>
  <elementSetContainer>
    <elementSet elementSetId="1">
      <name>Dublin Core</name>
      <description>The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.</description>
      <elementContainer>
        <element elementId="50">
          <name>Title</name>
          <description>A name given to the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152965">
              <text>Algorithmic Strategies for Solving Complex Problems in Financial Cryptography</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="49">
          <name>Subject</name>
          <description>The topic of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152966">
              <text>Complex functions; Financial cryptography; Polynomial functions; Private key; Public key; Recursive functions</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="41">
          <name>Description</name>
          <description>An account of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152967">
              <text>Cryptography is used in applications where subversion of the communication system could lead to financial loss, which is known as financial cryptography. In contrast to classical encryption, which has mostly been utilized for military and diplomatic purposes throughout recorded history, financial cryptography focuses on privacy and security. The techniques and algorithms required for the security of financial transfers as well as the development of new money types are included in financial cryptography. Financial cryptography includes proof of work and several auction mechanisms. Spam is being restricted by using hashcash. The applications of financial cryptography have been observed to be highly diverse. Financial cryptography is incredibly difficult and calls for knowledge from many different, incompatible, or at the very least, hostile disciplines. The higher risk factor that efforts to build financial cryptography systems will reduce or eliminate crucial strategies that they are trapped among financial application and cryptography, or between accountants and programmers. Digital finance is playing a big role in how financial services are organized globally. Digitalization, data analysis, and increased processing power enable a wide range of new financial services and transactions. The importance of economic development has attracted a lot of attention to this economic development enabled by digital financial technology (Fintech). Cryptography has begun to expand swiftly in the Fintech sector, and both investors and financial bankers are becoming more favorable toward digital assets. The observed market factors are directly related to how people behave when they engage in financial activity. The result analysis in this behavioral strategies of financial cryptography from a specific market analysis is still limited, despite the abundance of research and theories on the underlying motives of peoples behavior in financial frameworks.  The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="39">
          <name>Creator</name>
          <description>An entity primarily responsible for making the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152968">
              <text>Rajasekar V.; Venu K.; Sharma V.; Saracevic M.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="48">
          <name>Source</name>
          <description>A related resource from which the described resource is derived</description>
          <elementTextContainer>
            <elementText elementTextId="152969">
              <text>Homomorphic Encryption for Financial Cryptography: Recent Inventions and Challenges, pp. 207-219.</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="45">
          <name>Publisher</name>
          <description>An entity responsible for making the resource available</description>
          <elementTextContainer>
            <elementText elementTextId="152970">
              <text>Springer International Publishing</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="40">
          <name>Date</name>
          <description>A point or period of time associated with an event in the lifecycle of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152971">
              <text>2023-01-01</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="43">
          <name>Identifier</name>
          <description>An unambiguous reference to the resource within a given context</description>
          <elementTextContainer>
            <elementText elementTextId="152972">
              <text>&lt;a href="https://doi.org/10.1007/978-3-031-35535-6_10" target="_blank" rel="noreferrer noopener"&gt;https://doi.org/10.1007/978-3-031-35535-6_10&lt;/a&gt;
&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.scopus.com/inward/record.uri?eid=2-s2.0-85194749631&amp;amp;doi=10.1007%2F978-3-031-35535-6_10&amp;amp;partnerID=40&amp;amp;md5=6777c7d5c70a1fb2ad5c4c3d73e4e313" target="_blank" rel="noreferrer noopener"&gt;https://www.scopus.com/inward/record.uri?eid=2-s2.0-85194749631&amp;amp;doi=10.1007%2f978-3-031-35535-6_10&amp;amp;partnerID=40&amp;amp;md5=6777c7d5c70a1fb2ad5c4c3d73e4e313&lt;/a&gt;</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="47">
          <name>Rights</name>
          <description>Information about rights held in and over the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152973">
              <text>Restricted Access</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="46">
          <name>Relation</name>
          <description>A related resource</description>
          <elementTextContainer>
            <elementText elementTextId="152974">
              <text>ISBN: 978-303135535-6; 978-303135534-9</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="42">
          <name>Format</name>
          <description>The file format, physical medium, or dimensions of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152975">
              <text>Online</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="44">
          <name>Language</name>
          <description>A language of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152976">
              <text>English</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="51">
          <name>Type</name>
          <description>The nature or genre of the resource</description>
          <elementTextContainer>
            <elementText elementTextId="152977">
              <text>Book chapter</text>
            </elementText>
          </elementTextContainer>
        </element>
        <element elementId="38">
          <name>Coverage</name>
          <description>The spatial or temporal topic of the resource, the spatial applicability of the resource, or the jurisdiction under which the resource is relevant</description>
          <elementTextContainer>
            <elementText elementTextId="152978">
              <text>Rajasekar V., Department of CSE, Kongu Engineering College, Perundurai, India; Venu K., Department of CSE, Kongu Engineering College, Perundurai, India; Sharma V., CHRIST (Deemed to be University), Delhi-NCR, India; Saracevic M., Department of Computer Sciences, University of Novi Pazar, Novi Pazar, Serbia</text>
            </elementText>
          </elementTextContainer>
        </element>
      </elementContainer>
    </elementSet>
  </elementSetContainer>
</item>
