Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Financial cryptography and data secu...
~
FC (Conference) (2022 :)
Linked to FindBook
Google Book
Amazon
博客來
Financial cryptography and data security = 26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Financial cryptography and data security/ edited by Ittay Eyal, Juan Garay.
Reminder of title:
26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
remainder title:
FC 2022
other author:
Eyal, Ittay.
corporate name:
FC (Conference)
Published:
Cham :Springer International Publishing : : 2022.,
Description:
xiv, 726 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Tokenomics -- Maximizing Extractable Value from Automated Market Makers -- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets -- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks -- MPC (mostly) -- Explainable Arguments -- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge -- Multi-party Updatable Delegated Private Set Intersection -- Privacy -- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? -- Differential Privacy in Constant Function Market Makers -- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing -- ZKP -- SnarkPack: Practical SNARK Aggregation -- On Interactive Oracle Proofs for Boolean R1CS Statements -- Zero Knowledge Proofs towards Verifiable Decentralized AI -- Old-School Consensus -- Be Aware of Your Leaders -- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback -- Quick Order Fairness -- Mostly Payment Networks -- Analysis and Probing of Parallel Channels in the Lightning Network -- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks -- Short Paper: A Centrality Analysis of the Lightning Network -- Resurrecting Address Clustering in Bitcoin -- Incentives -- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis -- Decentralization Conscious Players And System Reliability -- Towards Overcoming the Undercutting Problem -- Arbitrage attack: Miners of the world, unite! -- Suborn Channels: Incentives Against Timelock Bribes -- Sliding Window Challenge Process for Congestion Detection -- Short Paper: On Game-Theoretically-Fair Leader Election -- Not Proof of Work -- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets -- Three Attacks on Proof-of-Stake Ethereum -- Permissionless Consensus in the Resource Model -- Performance -- Plumo: An Ultralight Blockchain Client -- SoK: Blockchain Light Clients -- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage -- Measurements -- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin -- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities -- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network -- An empirical study of two Bitcoin artifacts through deep learning.
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science) - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-18283-9
ISBN:
9783031182839
Financial cryptography and data security = 26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
Financial cryptography and data security
26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /[electronic resource] :FC 2022edited by Ittay Eyal, Juan Garay. - Cham :Springer International Publishing :2022. - xiv, 726 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,134110302-9743 ;. - Lecture notes in computer science ;13411..
Tokenomics -- Maximizing Extractable Value from Automated Market Makers -- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets -- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks -- MPC (mostly) -- Explainable Arguments -- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge -- Multi-party Updatable Delegated Private Set Intersection -- Privacy -- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? -- Differential Privacy in Constant Function Market Makers -- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing -- ZKP -- SnarkPack: Practical SNARK Aggregation -- On Interactive Oracle Proofs for Boolean R1CS Statements -- Zero Knowledge Proofs towards Verifiable Decentralized AI -- Old-School Consensus -- Be Aware of Your Leaders -- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback -- Quick Order Fairness -- Mostly Payment Networks -- Analysis and Probing of Parallel Channels in the Lightning Network -- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks -- Short Paper: A Centrality Analysis of the Lightning Network -- Resurrecting Address Clustering in Bitcoin -- Incentives -- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis -- Decentralization Conscious Players And System Reliability -- Towards Overcoming the Undercutting Problem -- Arbitrage attack: Miners of the world, unite! -- Suborn Channels: Incentives Against Timelock Bribes -- Sliding Window Challenge Process for Congestion Detection -- Short Paper: On Game-Theoretically-Fair Leader Election -- Not Proof of Work -- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets -- Three Attacks on Proof-of-Stake Ethereum -- Permissionless Consensus in the Resource Model -- Performance -- Plumo: An Ultralight Blockchain Client -- SoK: Blockchain Light Clients -- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage -- Measurements -- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin -- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities -- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network -- An empirical study of two Bitcoin artifacts through deep learning.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed and selected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
ISBN: 9783031182839
Standard No.: 10.1007/978-3-031-18283-9doiSubjects--Topical Terms:
844473
Data encryption (Computer science)
--Congresses.
LC Class. No.: QA76.9.A25 / F3 2022
Dewey Class. No.: 005.824
Financial cryptography and data security = 26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
LDR
:04158nmm a2200373 a 4500
001
2304766
003
DE-He213
005
20221021215048.0
006
m d
007
cr nn 008maaau
008
230409s2022 sz s 0 eng d
020
$a
9783031182839
$q
(electronic bk.)
020
$a
9783031182822
$q
(paper)
024
7
$a
10.1007/978-3-031-18283-9
$2
doi
035
$a
978-3-031-18283-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
F3 2022
072
7
$a
GPJ
$2
bicssc
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
F287 2022
111
2
$a
FC (Conference)
$n
(26th :
$d
2022 :
$c
Grenada)
$3
3607261
245
1 0
$a
Financial cryptography and data security
$h
[electronic resource] :
$b
26th International Conference, FC 2022, Grenada, May 2-6, 2022 : revised selected papers /
$c
edited by Ittay Eyal, Juan Garay.
246
3
$a
FC 2022
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xiv, 726 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13411
505
0
$a
Tokenomics -- Maximizing Extractable Value from Automated Market Makers -- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets -- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks -- MPC (mostly) -- Explainable Arguments -- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge -- Multi-party Updatable Delegated Private Set Intersection -- Privacy -- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees? -- Differential Privacy in Constant Function Market Makers -- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing -- ZKP -- SnarkPack: Practical SNARK Aggregation -- On Interactive Oracle Proofs for Boolean R1CS Statements -- Zero Knowledge Proofs towards Verifiable Decentralized AI -- Old-School Consensus -- Be Aware of Your Leaders -- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback -- Quick Order Fairness -- Mostly Payment Networks -- Analysis and Probing of Parallel Channels in the Lightning Network -- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks -- Short Paper: A Centrality Analysis of the Lightning Network -- Resurrecting Address Clustering in Bitcoin -- Incentives -- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis -- Decentralization Conscious Players And System Reliability -- Towards Overcoming the Undercutting Problem -- Arbitrage attack: Miners of the world, unite! -- Suborn Channels: Incentives Against Timelock Bribes -- Sliding Window Challenge Process for Congestion Detection -- Short Paper: On Game-Theoretically-Fair Leader Election -- Not Proof of Work -- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets -- Three Attacks on Proof-of-Stake Ethereum -- Permissionless Consensus in the Resource Model -- Performance -- Plumo: An Ultralight Blockchain Client -- SoK: Blockchain Light Clients -- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage -- Measurements -- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin -- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities -- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network -- An empirical study of two Bitcoin artifacts through deep learning.
520
$a
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed and selected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Electronic funds transfers
$x
Security measures
$v
Congresses.
$3
844595
650
0
$a
Electronic commerce
$v
Congresses.
$3
736131
650
1 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Operating Systems.
$3
892491
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Data and Information Security.
$3
3538510
700
1
$a
Eyal, Ittay.
$3
3607262
700
1
$a
Garay, Juan.
$3
3607263
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13411.
$3
3607264
856
4 0
$u
https://doi.org/10.1007/978-3-031-18283-9
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9446315
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 F3 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login