Financial cryptography and data secu...
FC (Conference) (2022 :)

FindBook      Google Book      Amazon      博客來     
  • Financial cryptography and data security = 26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Financial cryptography and data security/ edited by Ittay Eyal, Juan Garay.
    其他題名: 26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
    其他題名: FC 2022
    其他作者: Eyal, Ittay.
    團體作者: FC (Conference)
    出版者: Cham :Springer International Publishing : : 2022.,
    面頁冊數: xiv, 726 p. :ill. (some col.), digital ;24 cm.
    內容註: Tokenomics -- Maximizing Extractable Value from Automated Market Makers -- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets -- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks -- MPC (mostly) -- Explainable Arguments -- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge -- Multi-party Updatable Delegated Private Set Intersection -- Privacy -- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? -- Differential Privacy in Constant Function Market Makers -- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing -- ZKP -- SnarkPack: Practical SNARK Aggregation -- On Interactive Oracle Proofs for Boolean R1CS Statements -- Zero Knowledge Proofs towards Verifiable Decentralized AI -- Old-School Consensus -- Be Aware of Your Leaders -- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback -- Quick Order Fairness -- Mostly Payment Networks -- Analysis and Probing of Parallel Channels in the Lightning Network -- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks -- Short Paper: A Centrality Analysis of the Lightning Network -- Resurrecting Address Clustering in Bitcoin -- Incentives -- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis -- Decentralization Conscious Players And System Reliability -- Towards Overcoming the Undercutting Problem -- Arbitrage attack: Miners of the world, unite! -- Suborn Channels: Incentives Against Timelock Bribes -- Sliding Window Challenge Process for Congestion Detection -- Short Paper: On Game-Theoretically-Fair Leader Election -- Not Proof of Work -- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets -- Three Attacks on Proof-of-Stake Ethereum -- Permissionless Consensus in the Resource Model -- Performance -- Plumo: An Ultralight Blockchain Client -- SoK: Blockchain Light Clients -- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage -- Measurements -- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin -- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities -- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network -- An empirical study of two Bitcoin artifacts through deep learning.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-18283-9
    ISBN: 9783031182839
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9446315 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 F3 2022 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入