Data Privacy Management, Cryptocurrencies and Blockchain Technology

Data Privacy Management, Cryptocurrencies and Blockchain Technology

ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers

Dragoni, Nicola; Garcia-Alfaro, Joaquin; Navarro-Arribas, Guillermo

Springer International Publishing AG

02/2023

326

Mole

Inglês

9783031257339

15 a 20 dias

Descrição não disponível.
DPM Workshop: Di?erential Privacy and Data Analysis.- Enhancing Privacy in Federated Learning with Local Di?erential Privacy for Email Classi?cation.- Towards Measuring Fairness for Local Di?erential Privacy.- Privacy-Preserving Link Prediction.- DPM Workshop: Regulation, Arti?cial Intelligence, and Formal Veri?cation.- An Email a Day Could Give Your Health Data Away.- Explanation of Black Box AI for GDPR related Privacy using Isabelle.- Secure Internet Exams Despite Coercion.- DPM Workshop: Leakage Quanti?cation and Applications.- Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores.- A Parallel Privacy Preserving Shortest Path Protocol from a Path Algebra Problem.- A blockchain-based architecture to manage user privacy preferences on smart shared spaces privately.- No salvation from trackers: Privacy analysis of religious websites and mobile apps.- CBT Workshop: Bitcoin, Lightning Network and Scalability.- An empirical analysis of running a Bitcoin minimal wallet on an IoT device 160.- The Ticket Price Matters in Sharding Blockchain.- On the Routing Convergence Delay in the Lightning Network.- LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains.- CBT Workshop: Anonymity, Fault Tolerance and Governance.- Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces.- Grape: E?cient Hybrid Consensus Protocol Using DAG.- A Game-Theoretic Analysis of Delegation Incentives in Blockchain Governance.- CBT Workshop: Short Papers.- A Limitlessly Scalable Transaction System.- Migrating Blockchains Away From ECDSA for Post-Quantum Security: A Study of Impact on Users and Applications.- Veri?able External Blockchain Calls: Towards Removing Oracle Input Intermediaries.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
cryptography and cryptanalysis;anonymity and untracability;computer security;network protocols;network security;artificial intelligence;blockchain;consensus mechanisms;cyber-attacks;data communication systems;data regulation;data security;distributed computer systems;formal verification;governance;privacy;smart contracts