libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

clark jeremy (curatore); shi elaine (curatore) - financial cryptography and data security
Zoom

Financial Cryptography and Data Security 28th International Conference, FC 2024, Willemstad, Curaçao, March 4–8, 2024, Revised Selected Papers, Part II

;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
71,98 €
NICEPRICE
68,38 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 02/2025





Trama

The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curaçao, during March 4–8, 2024.

The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows: 

Part I: Consensus; AMMs; fees and rewards; hardware attacks; 

Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.





Sommario

Feeling Optimistic.- Light Clients for Lazy Blockchains.- Short paper: Naysayer proofs.- Randomness and Time.- GoAT: File Geolocation via Anchor Timestamping.- Improved YOSO Randomness Generation with Worst-Case Corruptions.- Short Paper: Breaking X-VRF, a Post-Quantum Verifiable Random Function.- Truncator: Time-space Tradeoff of Cryptographic Primitives.- Signatures.- Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.- Proactive Refresh for Accountable Threshold Signatures.- SoK: Signatures With Randomizable Keys.- Subset-optimized BLS Multi-signature with Key Aggregation.- Applied Cryptography.- SAVER: SNARK-compatible Verifiable Encryption.- Owl: An Augmented Password-Authenticated Key Exchange Scheme.- PETS.- Anonymous Reputation Systems with Revocation, Revisited.- Towards Practical Doubly-Efficient Private Information Retrieval.- Short Paper: Onion Messages on Leash.- A Transaction-Level Model for Blockchain Privacy.- Designing for the Real World.- The Governance of Distributed Autonomous Organizations: A Study of Contributors' Influence, Networks, and Shifts in Voting Power.- Privacy-preserving Anti-Money Laundering using Secure Multi-Party Computation.- Scan, Shuffle, Rescan: Two-Prover Election Audits With Untrusted Scanners.- DeFi composability as MEV non-interference.











Altre Informazioni

ISBN:

9783031786785

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XVI, 391 p. 71 illus., 38 illus. in color.
Pagine Arabe: 391
Pagine Romane: xvi


Dicono di noi