Atjaunināt sīkdatņu piekrišanu

E-grāmata: Financial Cryptography and Data Security: 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers

Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 13411
  • Izdošanas datums: 21-Oct-2022
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031182839
  • Formāts - PDF+DRM
  • Cena: 118,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 13411
  • Izdošanas datums: 21-Oct-2022
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031182839

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.

The 32 full papers and 4 short papers included in this book were carefully reviewed and
selected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
Tokenomics.- Maximizing Extractable Value from Automated Market
Makers.- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using
Buckets.- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage
Risks.- MPC (mostly).- Explainable Arguments.- MPCCache: Privacy-Preserving
Multi-Party Cooperative Cache Sharing at the Edge.- Multi-party Updatable
Delegated Private Set Intersection.- Privacy.- The Effect of False Positives:
Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?.- Differential
Privacy in Constant Function Market Makers.- Anonymous Tokens with Public
Metadata and Applications to Private Contact Tracing.- ZKP.- SnarkPack:
Practical SNARK Aggregation.- On Interactive Oracle Proofs for Boolean R1CS
Statements.- Zero Knowledge Proofs towards Verifiable Decentralized
AI.- Old-School Consensus.- Be Aware of Your Leaders.- Jolteon and Ditto:
Network-Adaptive Efficient Consensus with Asynchronous Fallback.- Quick Order
Fairness.- Mostly Payment Networks.- Analysis and Probing of Parallel
Channels in the Lightning Network.- Hide & Seek: Privacy-Preserving
Rebalancing on Payment Channel Networks.- Short Paper: A Centrality Analysis
of the Lightning Network.- Resurrecting Address Clustering in
Bitcoin.- Incentives.- ABSNFT: Securitization and Repurchase Scheme for
Non-Fungible Tokens Based on Game Theoretical Analysis.- Decentralization
Conscious Players And System Reliability.- Towards Overcoming the
Undercutting Problem.- Arbitrage attack: Miners of the world, unite!.- Suborn
Channels: Incentives Against Timelock Bribes.- Sliding Window Challenge
Process for Congestion Detection.- Short Paper: On Game-Theoretically-Fair
Leader Election.- Not Proof of Work.- The Availability-Accountability Dilemma
and its Resolution via Accountability Gadgets.- Three Attacks on
Proof-of-Stake Ethereum.- Permissionless Consensus in the Resource
Model.- Performance.- Plumo: An Ultralight Blockchain Client.- SoK:
Blockchain Light Clients.- Achieving Almost All Blockchain Functionalities
with Polylogarithmic Storage.- Measurements.- Short Paper: On the Claims of
Weak Block Synchronization in Bitcoin.- India's "Aadhaar" Biometric ID:
Structure, Security, and Vulnerabilities.- Short Paper: What Peer
Announcements Tell Us About the Size of the Bitcoin P2P Network.- An
empirical study of two Bitcoin artifacts through deep learning.