Muutke küpsiste eelistusi

E-raamat: Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curacao, March 4-8, 2024, Revised Selected Papers, Part II

Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curaçao, during March 48, 2024.





The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows: 





Part I: Consensus; AMMs; fees and rewards; hardware attacks; 





Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.
Feeling Optimistic.- Light Clients for Lazy Blockchains.- Short paper:
Naysayer proofs.- Randomness and Time.- GoAT: File Geolocation via Anchor
Timestamping.- Improved YOSO Randomness Generation with Worst-Case
Corruptions.- Short Paper: Breaking X-VRF, a Post-Quantum Verifiable Random
Function.- Truncator: Time-space Tradeoff of Cryptographic
Primitives.- Signatures.- Foundations of Anonymous Signatures: Formal
Definitions, Simplified Requirements, and a Construction Based on General
Assumptions.- Proactive Refresh for Accountable Threshold Signatures.- SoK:
Signatures With Randomizable Keys.- Subset-optimized BLS Multi-signature with
Key Aggregation.- Applied Cryptography.- SAVER: SNARK-compatible Verifiable
Encryption.- Owl: An Augmented Password-Authenticated Key Exchange Scheme.-
PETS.- Anonymous Reputation Systems with Revocation, Revisited.- Towards
Practical Doubly-Efficient Private Information Retrieval.- Short Paper: Onion
Messages on Leash.- A Transaction-Level Model for Blockchain Privacy.-
Designing for the Real World.- The Governance of Distributed Autonomous
Organizations: A Study of Contributors' Influence, Networks, and Shifts in
Voting Power.- Privacy-preserving Anti-Money Laundering using Secure
Multi-Party Computation.- Scan, Shuffle, Rescan: Two-Prover Election Audits
With Untrusted Scanners.- DeFi composability as MEV non-interference.