000 | 05066nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-030-43725-1 | ||
003 | DE-He213 | ||
005 | 20240730180000.0 | ||
007 | cr nn 008mamaa | ||
008 | 200312s2020 sz | s |||| 0|eng d | ||
020 |
_a9783030437251 _9978-3-030-43725-1 |
||
024 | 7 |
_a10.1007/978-3-030-43725-1 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aFinancial Cryptography and Data Security _h[electronic resource] : _bFC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers / _cedited by Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2020. |
|
300 |
_aXIV, 347 p. 216 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11599 |
|
505 | 0 | _aTwo-Party State Channels with State Assertions -- Secure Offline Payments in Bitcoin -- Proof-of-Work Sidechains -- You Sank my Battleship! A Case Study to Evaluate State Channels as a Scaling Solution for Cryptocurrencies -- Game-theoretic Analysis of an Incentivized Verifiable Computation System -- Sluggish Mining: Profiting from the Verier's Dilemma -- Deploying PayWord on Ethereum -- SoK: Development of Secure Smart Contracts - Lessons from a Graduate Course -- Verification-Led Smart Contracts -- A Java Framework for Smart Contracts -- Is Solidity solid enough -- Building Executable Secure Design Models for Smart Contracts with Formal Methods -- SoK: Transparent Dishonesty: Front-running Attacks on Blockchain -- Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum -- Election Manipulation 100 -- A Manifest Improvement for Risk-Limiting Audits -- k-Cut: A Simple Approximately-Uniform Method for Sampling Ballots in Post-Election Audits -- How to Assess the Usability Metrics inE-Voting Schemes -- Improving the Performance of Cryptographic Voting Protocols (SoK) -- Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption -- Priv-Apollo - Secret Ballot E2E-V Internet Voting -- End-to-End Verifiable Quadratic Voting with Everlasting Privacy -- Lattice-Based Proof of a Shuffle. | |
520 | _aThis book constitutes the refereed proceedings of two workshops held at the 23rd International Conference on Financial Cryptography and Data Security, FC 2019, in St. Kitts, St. Kitts and Nevis, in February 2019. The 20 full papers and 4 short papers presented in this book were carefully reviewed and selected from 34 submissions. The papers feature the outcome of the 4th Workshop on Advances in Secure Electronic Voting, VOTING 2019 and the Third Workshop on Trusted Smart Contracts, WTSC 2019. VOTING covered topics like election auditing, voting system efficiency, voting system usability, and new technical designs for cryptographic protocols for voting systems. WTSC focuses on smart contracts, i.e., self-enforcing agreements in the form of executable programs, and other decentralized applications that are deployed to and run on top of (specialized) blockchains. . | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9118483 |
|
650 | 0 |
_aComputer systems. _9118484 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9118485 |
650 | 2 | 4 |
_aComputer System Implementation. _938514 |
650 | 2 | 4 |
_aDatabase Management. _93157 |
650 | 2 | 4 |
_aComputer Communication Networks. _9118486 |
700 | 1 |
_aBracciali, Andrea. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118487 |
|
700 | 1 |
_aClark, Jeremy. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118488 |
|
700 | 1 |
_aPintore, Federico. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118489 |
|
700 | 1 |
_aRønne, Peter B. _eeditor. _0(orcid) _10000-0002-2785-8301 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118490 |
|
700 | 1 |
_aSala, Massimiliano. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9118491 |
|
710 | 2 |
_aSpringerLink (Online service) _9118492 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030437244 |
776 | 0 | 8 |
_iPrinted edition: _z9783030437268 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11599 _9118493 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-43725-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c90123 _d90123 |