000 | 05296nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-25734-6 | ||
003 | DE-He213 | ||
005 | 20240730174318.0 | ||
007 | cr nn 008mamaa | ||
008 | 230223s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031257346 _9978-3-031-25734-6 |
||
024 | 7 |
_a10.1007/978-3-031-25734-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData Privacy Management, Cryptocurrencies and Blockchain Technology _h[electronic resource] : _bESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers / _cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nicola Dragoni. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2023. |
|
300 |
_aXVII, 326 p. 118 illus., 52 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13619 |
|
505 | 0 | _aDPM Workshop: Differential Privacy and Data Analysis -- Enhancing Privacy in Federated Learning with Local Differential Privacy for Email Classification -- Towards Measuring Fairness for Local Differential Privacy -- Privacy-Preserving Link Prediction -- DPM Workshop: Regulation, Artificial Intelligence, and Formal Verification -- An Email a Day Could Give Your Health Data Away -- Explanation of Black Box AI for GDPR related Privacy using Isabelle -- Secure Internet Exams Despite Coercion -- DPM Workshop: Leakage Quantification and Applications -- Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores -- A Parallel Privacy Preserving Shortest Path Protocol from a Path Algebra Problem -- A blockchain-based architecture to manage user privacy preferences on smart shared spaces privately -- No salvation from trackers: Privacy analysis of religious websites and mobile apps -- CBT Workshop: Bitcoin, Lightning Network and Scalability -- An empirical analysis of running a Bitcoin minimal wallet on an IoT device 160 -- The Ticket Price Matters in Sharding Blockchain -- On the Routing Convergence Delay in the Lightning Network -- LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains -- CBT Workshop: Anonymity, Fault Tolerance and Governance -- Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces -- Grape: Efficient Hybrid Consensus Protocol Using DAG -- A Game-Theoretic Analysis of Delegation Incentives in Blockchain Governance -- CBT Workshop: Short Papers -- A Limitlessly Scalable Transaction System -- Migrating Blockchains Away From ECDSA for Post-Quantum Security: A Study of Impact on Users and Applications -- Verifiable External Blockchain Calls: Towards Removing Oracle Input Intermediaries. | |
520 | _aThis book constitutes the refereed proceedings and revised selected papers from the ESORICS 2022 International Workshops on Data Privacy Management, Cryptocurrencies and Blockchain Technology, DPM 2022 and CBT 2022, which took place in Copenhagen, Denmark, during September 26-30, 2022. For DPM 2022, 10 full papers out of 21 submissions have been accepted for inclusion in this book. They were organized in topical sections as follows: differential privacy and data analysis; regulation, artificial intelligence, and formal verification; and leakage quantification and applications. The CBT 2022 workshop accepted 7 full papers and 3 short papers from 18 submissions. The papers were organized in the following topical sections: Bitcoin, lightning network and scalability; and anonymity, fault tolerance and governance; and short papers. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aComputer Communication Networks. _9111966 |
650 | 2 | 4 |
_aDatabase Management. _93157 |
650 | 2 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9111967 |
|
700 | 1 |
_aNavarro-Arribas, Guillermo. _eeditor. _0(orcid) _10000-0003-3535-942X _4edt _4http://id.loc.gov/vocabulary/relators/edt _9111968 |
|
700 | 1 |
_aDragoni, Nicola. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9111969 |
|
710 | 2 |
_aSpringerLink (Online service) _9111970 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031257339 |
776 | 0 | 8 |
_iPrinted edition: _z9783031257353 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13619 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-25734-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89365 _d89365 |