語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Financial Cryptography and Data Secu...
~
Sala, Massimiliano.
Financial Cryptography and Data Security = FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Financial Cryptography and Data Security/ edited by Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala.
其他題名:
FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
其他作者:
Sala, Massimiliano.
面頁冊數:
XIV, 347 p. 216 illus., 29 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer Communication Networks. -
電子資源:
https://doi.org/10.1007/978-3-030-43725-1
ISBN:
9783030437251
Financial Cryptography and Data Security = FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
Financial Cryptography and Data Security
FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /[electronic resource] :edited by Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala. - 1st ed. 2020. - XIV, 347 p. 216 illus., 29 illus. in color.online resource. - Security and Cryptology ;11599. - Security and Cryptology ;9241.
Two-Party State Channels with State Assertions -- Secure Offline Payments in Bitcoin -- Proof-of-Work Sidechains -- You Sank my Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies -- Game-theoretic Analysis of an Incentivized Verifiable Computation System -- Sluggish Mining: Profiting from the Verier's Dilemma -- Deploying PayWord on Ethereum -- SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course -- Verification-Led Smart Contracts -- A Java Framework for Smart Contracts -- Is Solidity solid enough -- Building Executable Secure Design Models for Smart Contracts with Formal Methods -- SoK: Transparent Dishonesty: Front-running Attacks on Blockchain -- Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum -- Election Manipulation 100 -- A Manifest Improvement for Risk-Limiting Audits -- k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits -- How to Assess the Usability Metrics in E-Voting Schemes -- Improving the Performance of Cryptographic Voting Protocols (SoK) -- Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption -- Priv-Apollo - Secret Ballot E2E-V Internet Voting -- End-to-End Verifiable Quadratic Voting with Everlasting Privacy -- Lattice-Based Proof of a Shuffle.
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019. The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions. The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems. WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains. .
ISBN: 9783030437251
Standard No.: 10.1007/978-3-030-43725-1doiSubjects--Topical Terms:
669310
Computer Communication Networks.
LC Class. No.: QA76.9.D335
Dewey Class. No.: 005.82
Financial Cryptography and Data Security = FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
LDR
:03811nam a22004215i 4500
001
1023243
003
DE-He213
005
20200703145229.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030437251
$9
978-3-030-43725-1
024
7
$a
10.1007/978-3-030-43725-1
$2
doi
035
$a
978-3-030-43725-1
050
4
$a
QA76.9.D335
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
245
1 0
$a
Financial Cryptography and Data Security
$h
[electronic resource] :
$b
FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers /
$c
edited by Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XIV, 347 p. 216 illus., 29 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
11599
505
0
$a
Two-Party State Channels with State Assertions -- Secure Offline Payments in Bitcoin -- Proof-of-Work Sidechains -- You Sank my Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies -- Game-theoretic Analysis of an Incentivized Verifiable Computation System -- Sluggish Mining: Profiting from the Verier's Dilemma -- Deploying PayWord on Ethereum -- SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course -- Verification-Led Smart Contracts -- A Java Framework for Smart Contracts -- Is Solidity solid enough -- Building Executable Secure Design Models for Smart Contracts with Formal Methods -- SoK: Transparent Dishonesty: Front-running Attacks on Blockchain -- Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum -- Election Manipulation 100 -- A Manifest Improvement for Risk-Limiting Audits -- k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits -- How to Assess the Usability Metrics in E-Voting Schemes -- Improving the Performance of Cryptographic Voting Protocols (SoK) -- Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption -- Priv-Apollo - Secret Ballot E2E-V Internet Voting -- End-to-End Verifiable Quadratic Voting with Everlasting Privacy -- Lattice-Based Proof of a Shuffle.
520
$a
This book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019. The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions. The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems. WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains. .
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Database Management.
$3
669820
650
2 4
$a
Computer System Implementation.
$3
669803
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
1 4
$a
Cryptology.
$3
1211076
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Database management.
$3
557799
650
0
$a
Architecture, Computer.
$3
1255731
650
0
$a
Application software.
$3
528147
650
0
$a
Data encryption (Computer science).
$3
1051084
700
1
$a
Sala, Massimiliano.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
885171
700
1
$a
Rønne, Peter B.
$e
editor.
$1
https://orcid.org/0000-0002-2785-8301
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1317748
700
1
$a
Pintore, Federico.
$e
editor.
$1
https://orcid.org/0000-0002-7985-3131
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1303672
700
1
$a
Clark, Jeremy.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1112426
700
1
$a
Bracciali, Andrea.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1171790
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030437244
776
0 8
$i
Printed edition:
$z
9783030437268
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-43725-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入