Muutke küpsiste eelistusi

Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curaçao, March 48, 2024, Revised Selected Papers, Part II [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 391 pages, kõrgus x laius: 235x155 mm, 38 Illustrations, color; 33 Illustrations, black and white; XVI, 391 p. 71 illus., 38 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 14745
  • Ilmumisaeg: 16-Feb-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031786785
  • ISBN-13: 9783031786785
  • Pehme köide
  • Hind: 63,52 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 74,73 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 391 pages, kõrgus x laius: 235x155 mm, 38 Illustrations, color; 33 Illustrations, black and white; XVI, 391 p. 71 illus., 38 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 14745
  • Ilmumisaeg: 16-Feb-2025
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3031786785
  • ISBN-13: 9783031786785
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curaçao, during March 48, 2024.





The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows: 





Part I: Consensus; AMMs; fees and rewards; hardware attacks; 





Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.
Feeling Optimistic.- Light Clients for Lazy Blockchains.- Short paper:
Naysayer proofs.- Randomness and Time.- GoAT: File Geolocation via Anchor
Timestamping.- Improved YOSO Randomness Generation with Worst-Case
Corruptions.- Short Paper: Breaking X-VRF, a Post-Quantum Verifiable Random
Function.- Truncator: Time-space Tradeoff of Cryptographic
Primitives.- Signatures.- Foundations of Anonymous Signatures: Formal
Definitions, Simplified Requirements, and a Construction Based on General
Assumptions.- Proactive Refresh for Accountable Threshold Signatures.- SoK:
Signatures With Randomizable Keys.- Subset-optimized BLS Multi-signature with
Key Aggregation.- Applied Cryptography.- SAVER: SNARK-compatible Verifiable
Encryption.- Owl: An Augmented Password-Authenticated Key Exchange Scheme.-
PETS.- Anonymous Reputation Systems with Revocation, Revisited.- Towards
Practical Doubly-Efficient Private Information Retrieval.- Short Paper: Onion
Messages on Leash.- A Transaction-Level Model for Blockchain Privacy.-
Designing for the Real World.- The Governance of Distributed Autonomous
Organizations: A Study of Contributors' Influence, Networks, and Shifts in
Voting Power.- Privacy-preserving Anti-Money Laundering using Secure
Multi-Party Computation.- Scan, Shuffle, Rescan: Two-Prover Election Audits
With Untrusted Scanners.- DeFi composability as MEV non-interference.