Financial cryptography and data secu...
FC (Conference) (2022 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Financial cryptography and data security = 26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Financial cryptography and data security/ edited by Ittay Eyal, Juan Garay.
    Reminder of title: 26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
    remainder title: FC 2022
    other author: Eyal, Ittay.
    corporate name: FC (Conference)
    Published: Cham :Springer International Publishing : : 2022.,
    Description: xiv, 726 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Tokenomics -- Maximizing Extractable Value from Automated Market Makers -- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets -- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks -- MPC (mostly) -- Explainable Arguments -- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge -- Multi-party Updatable Delegated Private Set Intersection -- Privacy -- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? -- Differential Privacy in Constant Function Market Makers -- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing -- ZKP -- SnarkPack: Practical SNARK Aggregation -- On Interactive Oracle Proofs for Boolean R1CS Statements -- Zero Knowledge Proofs towards Verifiable Decentralized AI -- Old-School Consensus -- Be Aware of Your Leaders -- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback -- Quick Order Fairness -- Mostly Payment Networks -- Analysis and Probing of Parallel Channels in the Lightning Network -- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks -- Short Paper: A Centrality Analysis of the Lightning Network -- Resurrecting Address Clustering in Bitcoin -- Incentives -- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis -- Decentralization Conscious Players And System Reliability -- Towards Overcoming the Undercutting Problem -- Arbitrage attack: Miners of the world, unite! -- Suborn Channels: Incentives Against Timelock Bribes -- Sliding Window Challenge Process for Congestion Detection -- Short Paper: On Game-Theoretically-Fair Leader Election -- Not Proof of Work -- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets -- Three Attacks on Proof-of-Stake Ethereum -- Permissionless Consensus in the Resource Model -- Performance -- Plumo: An Ultralight Blockchain Client -- SoK: Blockchain Light Clients -- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage -- Measurements -- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin -- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities -- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network -- An empirical study of two Bitcoin artifacts through deep learning.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-18283-9
    ISBN: 9783031182839
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9446315 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 F3 2022 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login