Atnaujinkite slapukų nuostatas

El. knyga: Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curacao, March 4-8, 2024, Revised Selected Papers, Part II

Edited by , Edited by
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 14745
  • Išleidimo metai: 15-Feb-2025
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031786792
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 14745
  • Išleidimo metai: 15-Feb-2025
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031786792

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place in Willemstad, Curaēao, during March 48, 2024.





The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows: 





Part I: Consensus; AMMs; fees and rewards; hardware attacks; 





Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.
Feeling Optimistic.- Light Clients for Lazy Blockchains.- Short paper:
Naysayer proofs.- Randomness and Time.- GoAT: File Geolocation via Anchor
Timestamping.- Improved YOSO Randomness Generation with Worst-Case
Corruptions.- Short Paper: Breaking X-VRF, a Post-Quantum Verifiable Random
Function.- Truncator: Time-space Tradeoff of Cryptographic
Primitives.- Signatures.- Foundations of Anonymous Signatures: Formal
Definitions, Simplified Requirements, and a Construction Based on General
Assumptions.- Proactive Refresh for Accountable Threshold Signatures.- SoK:
Signatures With Randomizable Keys.- Subset-optimized BLS Multi-signature with
Key Aggregation.- Applied Cryptography.- SAVER: SNARK-compatible Verifiable
Encryption.- Owl: An Augmented Password-Authenticated Key Exchange Scheme.-
PETS.- Anonymous Reputation Systems with Revocation, Revisited.- Towards
Practical Doubly-Efficient Private Information Retrieval.- Short Paper: Onion
Messages on Leash.- A Transaction-Level Model for Blockchain Privacy.-
Designing for the Real World.- The Governance of Distributed Autonomous
Organizations: A Study of Contributors' Influence, Networks, and Shifts in
Voting Power.- Privacy-preserving Anti-Money Laundering using Secure
Multi-Party Computation.- Scan, Shuffle, Rescan: Two-Prover Election Audits
With Untrusted Scanners.- DeFi composability as MEV non-interference.