Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Financial Cryptography and Data Secu...
~
Sala, Massimiliano.
Financial Cryptography and Data Security = FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Financial Cryptography and Data Security/ edited by Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala.
Reminder of title:
FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
other author:
Bracciali, Andrea.
Description:
XIV, 347 p. 216 illus., 29 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science). -
Online resource:
https://doi.org/10.1007/978-3-030-43725-1
ISBN:
9783030437251
Financial Cryptography and Data Security = FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
Financial Cryptography and Data Security
FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /[electronic resource] :edited by Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala. - 1st ed. 2020. - XIV, 347 p. 216 illus., 29 illus. in color.online resource. - Security and Cryptology ;11599. - Security and Cryptology ;9241.
Two-Party State Channels with State Assertions -- Secure Offline Payments in Bitcoin -- Proof-of-Work Sidechains -- You Sank my Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies -- Game-theoretic Analysis of an Incentivized Verifiable Computation System -- Sluggish Mining: Profiting from the Verier's Dilemma -- Deploying PayWord on Ethereum -- SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course -- Verification-Led Smart Contracts -- A Java Framework for Smart Contracts -- Is Solidity solid enough -- Building Executable Secure Design Models for Smart Contracts with Formal Methods -- SoK: Transparent Dishonesty: Front-running Attacks on Blockchain -- Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum -- Election Manipulation 100 -- A Manifest Improvement for Risk-Limiting Audits -- k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits -- How to Assess the Usability Metrics in E-Voting Schemes -- Improving the Performance of Cryptographic Voting Protocols (SoK) -- Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption -- Priv-Apollo - Secret Ballot E2E-V Internet Voting -- End-to-End Verifiable Quadratic Voting with Everlasting Privacy -- Lattice-Based Proof of a Shuffle.
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019. The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions. The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems. WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains. .
ISBN: 9783030437251
Standard No.: 10.1007/978-3-030-43725-1doiSubjects--Topical Terms:
1051084
Data encryption (Computer science).
LC Class. No.: QA76.9.D335
Dewey Class. No.: 005.82
Financial Cryptography and Data Security = FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
LDR
:03811nam a22004215i 4500
001
1023243
003
DE-He213
005
20200703145229.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030437251
$9
978-3-030-43725-1
024
7
$a
10.1007/978-3-030-43725-1
$2
doi
035
$a
978-3-030-43725-1
050
4
$a
QA76.9.D335
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
245
1 0
$a
Financial Cryptography and Data Security
$h
[electronic resource] :
$b
FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
$c
edited by Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XIV, 347 p. 216 illus., 29 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
11599
505
0
$a
Two-Party State Channels with State Assertions -- Secure Offline Payments in Bitcoin -- Proof-of-Work Sidechains -- You Sank my Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies -- Game-theoretic Analysis of an Incentivized Verifiable Computation System -- Sluggish Mining: Profiting from the Verier's Dilemma -- Deploying PayWord on Ethereum -- SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course -- Verification-Led Smart Contracts -- A Java Framework for Smart Contracts -- Is Solidity solid enough -- Building Executable Secure Design Models for Smart Contracts with Formal Methods -- SoK: Transparent Dishonesty: Front-running Attacks on Blockchain -- Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum -- Election Manipulation 100 -- A Manifest Improvement for Risk-Limiting Audits -- k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits -- How to Assess the Usability Metrics in E-Voting Schemes -- Improving the Performance of Cryptographic Voting Protocols (SoK) -- Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption -- Priv-Apollo - Secret Ballot E2E-V Internet Voting -- End-to-End Verifiable Quadratic Voting with Everlasting Privacy -- Lattice-Based Proof of a Shuffle.
520
$a
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019. The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions. The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems. WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains. .
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Application software.
$3
528147
650
0
$a
Architecture, Computer.
$3
1255731
650
0
$a
Database management.
$3
557799
650
0
$a
Computer communication systems.
$3
1115394
650
1 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Computer System Implementation.
$3
669803
650
2 4
$a
Database Management.
$3
669820
650
2 4
$a
Computer Communication Networks.
$3
669310
700
1
$a
Bracciali, Andrea.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1171790
700
1
$a
Clark, Jeremy.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1112426
700
1
$a
Pintore, Federico.
$e
editor.
$1
https://orcid.org/0000-0002-7985-3131
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1303672
700
1
$a
Rønne, Peter B.
$e
editor.
$1
https://orcid.org/0000-0002-2785-8301
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1317748
700
1
$a
Sala, Massimiliano.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
885171
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030437244
776
0 8
$i
Printed edition:
$z
9783030437268
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-43725-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login