語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Financial Cryptography and Data Security = 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Financial Cryptography and Data Security/ edited by Ittay Eyal, Juan Garay.
其他題名:
26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers /
其他作者:
Eyal, Ittay.
面頁冊數:
XIV, 726 p. 154 illus., 106 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Cryptography. -
電子資源:
https://doi.org/10.1007/978-3-031-18283-9
ISBN:
9783031182839
Financial Cryptography and Data Security = 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers /
Financial Cryptography and Data Security
26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers /[electronic resource] :edited by Ittay Eyal, Juan Garay. - 1st ed. 2022. - XIV, 726 p. 154 illus., 106 illus. in color.online resource. - Lecture Notes in Computer Science,134111611-3349 ;. - Lecture Notes in Computer Science,9324.
Tokenomics -- Maximizing Extractable Value from Automated Market Makers -- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets -- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks -- MPC (mostly) -- Explainable Arguments -- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge -- Multi-party Updatable Delegated Private Set Intersection -- Privacy -- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? -- Differential Privacy in Constant Function Market Makers -- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing -- ZKP -- SnarkPack: Practical SNARK Aggregation -- On Interactive Oracle Proofs for Boolean R1CS Statements -- Zero Knowledge Proofs towards Verifiable Decentralized AI -- Old-School Consensus -- Be Aware of Your Leaders -- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback -- Quick Order Fairness -- Mostly Payment Networks -- Analysis and Probing of Parallel Channels in the Lightning Network -- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks -- Short Paper: A Centrality Analysis of the Lightning Network -- Resurrecting Address Clustering in Bitcoin -- Incentives -- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis -- Decentralization Conscious Players And System Reliability -- Towards Overcoming the Undercutting Problem -- Arbitrage attack: Miners of the world, unite! -- Suborn Channels: Incentives Against Timelock Bribes -- Sliding Window Challenge Process for Congestion Detection -- Short Paper: On Game-Theoretically-Fair Leader Election -- Not Proof of Work -- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets -- Three Attacks on Proof-of-Stake Ethereum -- Permissionless Consensus in the Resource Model -- Performance -- Plumo: An Ultralight Blockchain Client -- SoK: Blockchain Light Clients -- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage -- Measurements -- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin -- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities -- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network -- An empirical study of two Bitcoin artifacts through deep learning.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed and selected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
ISBN: 9783031182839
Standard No.: 10.1007/978-3-031-18283-9doiSubjects--Topical Terms:
567927
Cryptography.
LC Class. No.: QA268
Dewey Class. No.: 005.824
Financial Cryptography and Data Security = 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers /
LDR
:04466nam a22004335i 4500
001
1084602
003
DE-He213
005
20221021215048.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783031182839
$9
978-3-031-18283-9
024
7
$a
10.1007/978-3-031-18283-9
$2
doi
035
$a
978-3-031-18283-9
050
4
$a
QA268
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
245
1 0
$a
Financial Cryptography and Data Security
$h
[electronic resource] :
$b
26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers /
$c
edited by Ittay Eyal, Juan Garay.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XIV, 726 p. 154 illus., 106 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes in Computer Science,
$x
1611-3349 ;
$v
13411
505
0
$a
Tokenomics -- Maximizing Extractable Value from Automated Market Makers -- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets -- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks -- MPC (mostly) -- Explainable Arguments -- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge -- Multi-party Updatable Delegated Private Set Intersection -- Privacy -- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? -- Differential Privacy in Constant Function Market Makers -- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing -- ZKP -- SnarkPack: Practical SNARK Aggregation -- On Interactive Oracle Proofs for Boolean R1CS Statements -- Zero Knowledge Proofs towards Verifiable Decentralized AI -- Old-School Consensus -- Be Aware of Your Leaders -- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback -- Quick Order Fairness -- Mostly Payment Networks -- Analysis and Probing of Parallel Channels in the Lightning Network -- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks -- Short Paper: A Centrality Analysis of the Lightning Network -- Resurrecting Address Clustering in Bitcoin -- Incentives -- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis -- Decentralization Conscious Players And System Reliability -- Towards Overcoming the Undercutting Problem -- Arbitrage attack: Miners of the world, unite! -- Suborn Channels: Incentives Against Timelock Bribes -- Sliding Window Challenge Process for Congestion Detection -- Short Paper: On Game-Theoretically-Fair Leader Election -- Not Proof of Work -- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets -- Three Attacks on Proof-of-Stake Ethereum -- Permissionless Consensus in the Resource Model -- Performance -- Plumo: An Ultralight Blockchain Client -- SoK: Blockchain Light Clients -- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage -- Measurements -- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin -- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities -- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network -- An empirical study of two Bitcoin artifacts through deep learning.
520
$a
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed and selected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
650
0
$a
Cryptography.
$3
567927
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Computer networks .
$3
1365720
650
0
$2
lc
$a
Operating systems (Computers).
$3
868175
650
0
$a
Application software.
$3
528147
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Operating Systems.
$3
669804
650
2 4
$a
Computer and Information Systems Applications.
$3
1365732
650
2 4
$a
Data and Information Security.
$3
1365785
700
1
$a
Eyal, Ittay.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1303671
700
1
$a
Garay, Juan.
$e
editor.
$1
https://orcid.org/0000-0003-0366-7110
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1390956
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783031182822
776
0 8
$i
Printed edition:
$z
9783031182846
830
0
$a
Lecture Notes in Computer Science,
$x
0302-9743 ;
$v
9324
$3
1258960
856
4 0
$u
https://doi.org/10.1007/978-3-031-18283-9
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入