Muutke küpsiste eelistusi

E-raamat: Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 8438
  • Ilmumisaeg: 07-Oct-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662447741
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 8438
  • Ilmumisaeg: 07-Oct-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662447741

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues; Bitcoin security; improving digital currencies; posters, and WAHC papers.
Part I First Workshop on Bitcoin Research
Bitcoin Transactions, Policy and Legal Issues
How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?
3(13)
Dorit Ron
Adi Shamir
Towards Risk Scoring of Bitcoin Transactions
16(17)
Malte Moser
Rainer Bohme
Dominic Breuker
Challenges and Opportunities Associated -- With a Bitcoin-Based Transaction Rating System
33(10)
David Vandervort
Bitcoin: A First Legal Analysis With Reference to German and US-American Law
43(14)
Franziska Boehm
Paulina Pesch
Bitcoin Security
Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem
57(15)
Marie Vasek
Micah Thornton
Tyler Moore
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
72(15)
Benjamin Johnson
Aron Laszka
Jens Grossklags
Marie Vasek
Tyler Moore
The Bitcoin P2P Network
87(18)
Joan Antoni Donet Donet
Cristina Perez-Sola
Jordi Herrera-Joancomarti
Improving Digital Currencies
Fair Two-Party Computations via Bitcoin Deposits
105(17)
Marcin Andrychowicz
Stefan Dziembowski
Daniel Malinowski
Lukasz Mazurek
Increasing Anonymity in Bitcoin
122(18)
Amitabh Saxena
Janardan Misra
Aritra Dhar
Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity
140(19)
Christina Garman
Matthew Green
Ian Miers
Aviel D. Rubin
Bitcoin Poster Abstracts
On Offline Payments with Bitcoin (Poster Abstract)
159(2)
Alexandra Dmitrienko
David Noack
Ahmad-Reza Sadeghi
Moti Yung
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract)
161(2)
Ethan Heilman
From Bitcoin to the Brixton Pound: History and Prospects for Alternative Currencies (Poster Abstract)
163(6)
Garrick Hileman
Part II Applied Homomorphic Cryptography and Encrypted Computing
High-Speed Fully Homomorphic Encryption Over the Integers
169(12)
Xiaolin Cao
Ciara Moore
Maire O'Neill
Neil Hanley
Elizabeth O'Sullivan
Practical and Privacy-Preserving Policy Compliance for Outsourced Data
181(14)
Giovanni Di Crescenzo
Joan Feigenbaum
Debayan Gupta
Euthimios Panagos
Jason Perry
Rebecca N. Wright
Bandwidth Efficient PIR from NTRU
195(13)
Yarkin Doroz
Berk Sunar
Ghaith Hammouri
Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince
208(13)
Yarkin Doroz
Aria Shahverdi
Thomas Eisenbarth
Berk Sunar
A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU
221(14)
Kurt Rohloff
David Bruce Cousins
Restructuring the NSA Metadata Program
235(14)
Seny Kamara
Author Index 249