Data Privacy Management, Cryptocurrencies and Blockchain Technology
Springer International Publishing (Verlag)
978-3-031-25733-9 (ISBN)
For DPM 2022, 10 full papers out of 21 submissions have been accepted for inclusion in this book. They were organized in topical sections as follows: differential privacy and data analysis; regulation, artificial intelligence, and formal verification; and leakage quantification and applications.
The CBT 2022 workshop accepted 7 full papers and 3 short papers from 18 submissions. The papers were organized in the following topical sections: Bitcoin, lightning network and scalability; and anonymity, fault tolerance and governance; and short papers.
DPM Workshop: Di erential Privacy and Data Analysis.- Enhancing Privacy in Federated Learning with Local Di erential Privacy for Email Classification.- Towards Measuring Fairness for Local Di erential Privacy.- Privacy-Preserving Link Prediction.- DPM Workshop: Regulation, Artificial Intelligence, and Formal Verification.- An Email a Day Could Give Your Health Data Away.- Explanation of Black Box AI for GDPR related Privacy using Isabelle.- Secure Internet Exams Despite Coercion.- DPM Workshop: Leakage Quantification and Applications.- Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores.- A Parallel Privacy Preserving Shortest Path Protocol from a Path Algebra Problem.- A blockchain-based architecture to manage user privacy preferences on smart shared spaces privately.- No salvation from trackers: Privacy analysis of religious websites and mobile apps.- CBT Workshop: Bitcoin, Lightning Network and Scalability.- An empirical analysis of running a Bitcoin minimal wallet on an IoT device 160.- The Ticket Price Matters in Sharding Blockchain.- On the Routing Convergence Delay in the Lightning Network.- LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains.- CBT Workshop: Anonymity, Fault Tolerance and Governance.- Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces.- Grape: E cient Hybrid Consensus Protocol Using DAG.- A Game-Theoretic Analysis of Delegation Incentives in Blockchain Governance.- CBT Workshop: Short Papers.- A Limitlessly Scalable Transaction System.- Migrating Blockchains Away From ECDSA for Post-Quantum Security: A Study of Impact on Users and Applications.- Verifiable External Blockchain Calls: Towards Removing Oracle Input Intermediaries.
Erscheinungsdatum | 25.02.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XVII, 326 p. 118 illus., 52 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 528 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | anonymity and untracability • Artificial Intelligence • Blockchain • Computer Security • consensus mechanisms • cryptography and cryptanalysis • Cyber-attacks • Data communication systems • data regulation • Data Security • distributed computer systems • Formal Verification • Governance • Network Protocols • Network Security • privacy • Smart Contracts |
ISBN-10 | 3-031-25733-2 / 3031257332 |
ISBN-13 | 978-3-031-25733-9 / 9783031257339 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich