You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The new field of cryptographic currencies and consensus ledgers, commonly referred to as blockchains, is receiving increasing interest from various different communities. These communities are very diverse and amongst others include: technical enthusiasts, activist groups, researchers from various disciplines, start ups, large enterprises, public authorities, banks, financial regulators, business men, investors, and also criminals. The scientific community adapted relatively slowly to this emerging and fast-moving field of cryptographic currencies and consensus ledgers. This was one reason that, for quite a while, the only resources available have been the Bitcoin source code, blog and forum...
The success of counterterrorism finance strategies in reducing terrorist access to official currencies has raised concerns that terrorist organizations might increase their use of such digital cryptocurrencies as Bitcoin to support their activities. RAND researchers thus consider the needs of terrorist groups and the advantages and disadvantages of the cryptocurrency technologies available to them.
Cryptographic Primitives in Blockchain Technology provides an introduction to the mathematical and cryptographic concepts behind blockchain technologies and shows how they are applied in blockchain-based systems.
The second volume of this edited collection offers a number of contributions from leading scholars investigating Blockchain and its implications for business. Focusing on the transformation of the overall value chain, the sections cover the foundations of Blockchain and its sustainability, social and legal applications. It features a variety of use cases, from tourism to healthcare. Using a number of theoretical and methodological approaches, this innovative publication aims to further the cause of this ground-breaking technology and its use within information technology, supply chain and wider business management research.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.
The definitive guide to the game-theoretic and probabilistic underpinning for Bitcoin’s security model. The book begins with an overview of probability and game theory. Nakamoto Consensus is discussed in both practical and theoretical terms. This volume: Describes attacks and exploits with mathematical justifications, including selfish mining. Identifies common assumptions such as the Market Fragility Hypothesis, establishing a framework for analyzing incentives to attack. Outlines the block reward schedule and economics of ASIC mining. Discusses how adoption by institutions would fundamentally change the security model. Analyzes incentives for double-spend and sabotage attacks via stock-flow models. Overviews coalitional game theory with applications to majority takeover attacks Presents Nash bargaining with application to unregulated environments This book is intended for students or researchers wanting to engage in a serious conversation about the future viability of Bitcoin as a decentralized, censorship-resistant, peer-to-peer electronic cash system.
This essential collection of essays delves into the European Union's Internal Market, offering a thorough analysis inspired by the Council of the European Union's pivotal 2024 conclusions. The book outlines a strategic roadmap for the market’s future development, making it a critical resource for academic libraries. In three parts, the volume examines (I) Citizens’ Rights, highlighting the impact of EU regulations on individuals, (II) the challenges and opportunities posed by digital rights and Artificial Intelligence, crucial for the market's progression over the next decade, and (III) substantive rights, providing insights into legislative and policy measures vital for the market’s evolution. Ideal for researchers, policymakers, and students, this book is an invaluable resource for understanding and influencing the future of the EU’s economic landscape.
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the seemingly diverse application domains, anomaly detection solutions share similar technical challenges, such as how to accurately recognize various normal patterns, how to reduce false alarms, how to adapt to concept drifts, and how to minimize performance impact. They also share similar detection approaches and evaluation methods, such as feature extraction, dimension reduction, and experimental evaluation. The main purpose of this b...
The three-volume set CCIS 1419, CCIS 1420, and CCIS 1421 contains the extended abstracts of the posters presented during the 23rd International Conference on Human-Computer Interaction, HCII 2021, which was held virtually in July 2021. The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The posters presented in these three volumes are organized in topical sections as follows: Part I: HCI theory and methods; perceptual, cognitive and psychophisiological aspects of interaction; designing for children; designing for older people; design case studies; dimensions of user experience; information, language, culture and media. Part II: interaction methods and techniques; eye-tracking and facial expressions recognition; human-robot interaction; virtual, augmented and mixed reality; security and privacy issues in HCI; AI and machine learning in HCI. Part III: interacting and learning; interacting and playing; interacting and driving; digital wellbeing, eHealth and mHealth; interacting and shopping; HCI, safety and sustainability; HCI in the time of pandemic.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Financial Cryptography and Data Security, FC 2016, held in Christ church, Barbados, in February 2016. The 27 revised full papers and 9 short papers were carefully selected and reviewed from 137 full papers submissions. The papers are grouped in the following topical sections: fraud and deception; payments, auctions, and e-voting; multiparty computation; mobile malware; social interaction and policy; cryptanalysis; surveillance and anonymity; Web security and data privacy; Bitcoin mining; cryptographic protocols; payment use and abuse.