000 | 05234nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-030-93944-1 | ||
003 | DE-He213 | ||
005 | 20240730181139.0 | ||
007 | cr nn 008mamaa | ||
008 | 220123s2022 sz | s |||| 0|eng d | ||
020 |
_a9783030939441 _9978-3-030-93944-1 |
||
024 | 7 |
_a10.1007/978-3-030-93944-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData Privacy Management, Cryptocurrencies and Blockchain Technology _h[electronic resource] : _bESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers / _cedited by Joaquin Garcia-Alfaro, Jose Luis Muñoz-Tapia, Guillermo Navarro-Arribas, Miguel Soriano. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXIII, 342 p. 70 illus., 50 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v13140 |
|
505 | 0 | _aBest Security Measures to Reduce Cyber-incident and Data Breach Risks -- Synthesizing Privacy-Preserving Location Traces Including Co-locations -- Quantitative Rubric for Privacy Policy Analysis -- Rethinking the Limits of Mobile Operating System Permissions -- Interdependent privacy issues are pervasive among third-party applications -- SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning -- A k-anonymised Federated Learning Framework with Decision Trees -- Anonymizing Machine Learning Models -- A New Privacy Enhancing Beacon Scheme in V2X Communication -- Next Generation Data Masking Engine -- Towards a Formal Approach for Data Minimization in Programs -- Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies -- Asymmetric Asynchronous Byzantine Consensus -- Using Degree Centrality to Identify Market Manipulation on Bitcoin -- Augmenting MetaMask to support TLS-endorsed Smart Contracts -- Smart Contracts for Incentivized Outsourcing of Computation -- Anonymous Sidechains -- Filling the Tax Gap via Programmable Money -- Impact of delay classes on the data structure in IOTA -- Secure Static Content Delivery for CDN using Blockchain Technology -- Lattice-Based Proof-of-Work for Post-Quantum Blockchains -- Blockchain-based Two-Factor Authentication for Credit Card Validation -- Homomorphic decryption in blockchains via compressed discrete-log lookup tables. | |
520 | _aThis book constitutes the refereed proceedings and revised selected papers from the 16th International Workshop on Data Privacy Management, DPM 2021, and the 5th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2021, which were held online on October 8, 2021, in conjunction with ESORICS 2021. The workshops were initially planned to take place in Darmstadt, Germany, and changed to an online event due to the COVID-19 pandemic. The DPM 2021 workshop received 25 submissions and accepted 7 full and 3 short papers for publication. These papers were organized in topical sections as follows: Risks and privacy preservation; policies and regulation; privacy and learning. For CBT 2021 6 full papers and 6 short papers were accepted out of 31 submissions. They were organized in topical sections as follows: Mining, consensus and market manipulation; smart contracts and anonymity. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9123614 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9123614 |
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123615 |
|
700 | 1 |
_aMuñoz-Tapia, Jose Luis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123616 |
|
700 | 1 |
_aNavarro-Arribas, Guillermo. _eeditor. _0(orcid) _10000-0003-3535-942X _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123617 |
|
700 | 1 |
_aSoriano, Miguel. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9123618 |
|
710 | 2 |
_aSpringerLink (Online service) _9123619 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030939434 |
776 | 0 | 8 |
_iPrinted edition: _z9783030939458 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v13140 _9123620 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-93944-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90723 _d90723 |