Atjaunināt sīkdatņu piekrišanu

Financial Cryptography and Data Security: 27th International Conference, FC 2023, Bol, Bra, Croatia, May 15, 2023, Revised Selected Papers, Part II 1st ed. 2024 [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 365 pages, height x width: 235x155 mm, weight: 587 g, 67 Illustrations, color; 38 Illustrations, black and white; XV, 365 p. 105 illus., 67 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13951
  • Izdošanas datums: 01-Dec-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031477502
  • ISBN-13: 9783031477508
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 100,46 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 118,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 365 pages, height x width: 235x155 mm, weight: 587 g, 67 Illustrations, color; 38 Illustrations, black and white; XV, 365 p. 105 illus., 67 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 13951
  • Izdošanas datums: 01-Dec-2023
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3031477502
  • ISBN-13: 9783031477508
Citas grāmatas par šo tēmu:
The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which was held from May 1-5, 2023, in Bol, Croatia. 
The 39 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 182 submissions. They were organized in topical sections as follows:
Part I: Consensus; cryptographic protocols; decentralized finance; 
Part II: Proof of X; Layer 2; attack techniques, defenses, and attack case studies; empirical studies and more decentralized finance; game theory and protocols.

Proof of X.- Layer 2.- attack techniques, defenses, and attack case studies.- empirical studies and more decentralized finance.- game theory and protocols.