Atjaunināt sīkdatņu piekrišanu

E-grāmata: Blockchain, Metaverse and Trustworthy Systems: 6th International Conference, BlockSys 2024, Hangzhou, China, July 12-14, 2024, Revised Selected Papers, Part II

Edited by , Edited by , Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 71,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This two-volume set CCIS 2264 and CCIS 2265 constitutes the refereed proceedings of the 6th International Conference on Blockchain and Trustworthy Systems, BlockSys 2024, held in Hangzhou, China, during July 1214, 2024.





The 34 full papers  presented in these two volumes were carefully reviewed and selected from 74 submissions. The papers are organized in the following topical sections:





Part I: Blockchain and Data Mining; Data Security and Anomaly Detection; Blockchain Performance Optimization.





Part II: Frontier Technology Integration; Trustworthy System and Cryptocurrencies; Blockchain Applications.

.- Frontier Technology Integration.

.- Blockchain-Enabled Large Language Models for Prognostics and Health Management Framework in Industrial Internet of Things.

.- Protecting Shepherded Parallel Permissioned Blockchain System from Congestion-related Attack.

.- Cross-Chain Overview:Development, Mechanisms, Protocols, Security, and Challenges.

.- VMeta: A QoS Dataset for Metaverse Services.

.- OptimalFix:An Automated Framework for Fixing Vulnerabilities in Smart Contracts Effectively.

.- Visionary Security Framework for Blockchain Integrated Metaverse Platform.

.- Trustworthy System and Cryptocurrencies.

.- Analysis of Cryptocurrencies Mixing Services and Its Regulatory Mechansim.

.- A Cross-chain Model Based on Credit Hierarchical Notary Group for IoT Roaming Settlement.

.- GDCTSA: A Grouped Data Collection Scheme for Trustworthy Systems Assessment.

.- Privacy Vulnerability Analysis of Bitcoin Network.

.- Deduplication Cloud Storage Integrity Auditing with Unpredictable Challenge Messages.

.- Blockchain Applications.

.- Drug traceability and health monitoring system with Hyperledger Fabric.

.- BCPA-OC Blockchain-Based Conditional Privacy-Preserving Authentication with Out-of-Band Communication for VANETs.

.- BBDAS: Blockchain-assisted Blinded Data Auditing Scheme for Cloud-Edge Systems.

.- A Blockchain-Based Tamper-Resistant Broadcast Encryption Scheme.

.- Joint Optimization of Task Offloading and Resource Allocation in Blockchain-Enabled Vehicular Fog Computing Networks.