Financial Cryptography and Data Security: Lecture Notes in Computer Science
Editat de Ittay Eyal, Juan Garayen Limba Engleză Paperback – 23 oct 2022
The 32 full papers and 4 short papers included in this book were carefully reviewed and
selected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 400.77 lei - 20%
Preț: 754.11 lei - 20%
Preț: 324.19 lei - 20%
Preț: 373.80 lei - 20%
Preț: 342.61 lei - 20%
Preț: 403.00 lei - 20%
Preț: 573.45 lei -
Preț: 395.25 lei - 20%
Preț: 487.46 lei - 20%
Preț: 355.27 lei - 20%
Preț: 731.97 lei - 20%
Preț: 293.24 lei - 20%
Preț: 669.21 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 336.86 lei - 20%
Preț: 330.54 lei - 20%
Preț: 313.87 lei - 20%
Preț: 679.09 lei - 20%
Preț: 373.16 lei - 20%
Preț: 782.57 lei - 20%
Preț: 434.17 lei - 20%
Preț: 489.11 lei - 20%
Preț: 904.16 lei - 20%
Preț: 375.72 lei - 20%
Preț: 400.17 lei - 20%
Preț: 432.78 lei - 20%
Preț: 631.96 lei - 20%
Preț: 432.11 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 556.96 lei - 20%
Preț: 488.90 lei - 20%
Preț: 560.93 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 328.94 lei - 20%
Preț: 629.71 lei - 20%
Preț: 568.70 lei - 20%
Preț: 447.31 lei - 20%
Preț: 733.68 lei - 20%
Preț: 315.26 lei - 20%
Preț: 315.62 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 850.42 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 519.32 lei
Preț: 699.10 lei
Preț vechi: 873.88 lei
-20%
Puncte Express: 1049
Preț estimativ în valută:
123.75€ • 143.74$ • 107.21£
123.75€ • 143.74$ • 107.21£
Carte tipărită la comandă
Livrare economică 02-16 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031182822
ISBN-10: 3031182820
Pagini: 740
Ilustrații: XIV, 726 p. 154 illus., 106 illus. in color.
Dimensiuni: 155 x 235 x 40 mm
Greutate: 1.1 kg
Ediția:1st edition 2022
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031182820
Pagini: 740
Ilustrații: XIV, 726 p. 154 illus., 106 illus. in color.
Dimensiuni: 155 x 235 x 40 mm
Greutate: 1.1 kg
Ediția:1st edition 2022
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Tokenomics.- Maximizing Extractable Value from Automated Market Makers.- Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets.- Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks.- MPC (mostly).- Explainable Arguments.- MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge.- Multi-party Updatable Delegated Private Set Intersection.- Privacy.- The Effect of False Positives: Why Fuzzy Message Detection Leads to Fuzzy Privacy Guarantees?.- Differential Privacy in Constant Function Market Makers.- Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing.- ZKP.- SnarkPack: Practical SNARK Aggregation.- On Interactive Oracle Proofs for Boolean R1CS Statements.- Zero Knowledge Proofs towards Verifiable Decentralized AI.- Old-School Consensus.- Be Aware of Your Leaders.- Jolteon and Ditto: Network-Adaptive Efficient Consensus with Asynchronous Fallback.- Quick Order Fairness.- Mostly Payment Networks.- Analysis and Probing of Parallel Channels in the Lightning Network.- Hide & Seek: Privacy-Preserving Rebalancing on Payment Channel Networks.- Short Paper: A Centrality Analysis of the Lightning Network.- Resurrecting Address Clustering in Bitcoin.- Incentives.- ABSNFT: Securitization and Repurchase Scheme for Non-Fungible Tokens Based on Game Theoretical Analysis.- Decentralization Conscious Players And System Reliability.- Towards Overcoming the Undercutting Problem.- Arbitrage attack: Miners of the world, unite!.- Suborn Channels: Incentives Against Timelock Bribes.- Sliding Window Challenge Process for Congestion Detection.- Short Paper: On Game-Theoretically-Fair Leader Election.- Not Proof of Work.- The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets.- Three Attacks on Proof-of-Stake Ethereum.- Permissionless Consensus in the Resource Model.- Performance.- Plumo: An Ultralight Blockchain Client.- SoK: Blockchain Light Clients.- Achieving Almost All Blockchain Functionalities with Polylogarithmic Storage.- Measurements.- Short Paper: On the Claims of Weak Block Synchronization in Bitcoin.- India's "Aadhaar" Biometric ID: Structure, Security, and Vulnerabilities.- Short Paper: What Peer Announcements Tell Us About the Size of the Bitcoin P2P Network.- An empirical study of two Bitcoin artifacts through deep learning.