000
|
|
nam5i |
001
|
|
2210080934086 |
003
|
|
DE-He213 |
005
|
|
20250321105332 |
007
|
|
cr nn 008mamaa |
008
|
|
240502s2024 sz | s |||| 0|eng d |
020
|
|
▼a9783031600371▼9978-3-031-60037-1 |
024
|
|
▼a10.1007/978-3-031-60037-1▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aQA76.9.S88 |
072
|
|
▼aUYD▼2bicssc |
072
|
|
▼aCOM011000▼2bisacsh |
072
|
|
▼aUYD▼2thema |
082
|
|
▼a004.2▼223 |
245
|
00 |
▼aBlockchain Technology and Emerging Applications▼h[electronic resource] :▼bThird EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings /▼cedited by Jiageng Chen, Zhe Xia. |
250
|
|
▼a1st ed. 2024. |
264
|
|
▼aCham :▼bSpringer Nature Switzerland :▼bImprint: Springer,▼c2024. |
300
|
|
▼aIX, 155 p. 36 illus., 20 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,▼x1867-822X ;▼v577 |
505
|
|
▼a -- Applied Cryptography and system security. -- Identity-Based Key Verifiable Inner Product Functional Encryption Scheme. -- DRSA: Debug Register-based Self-relocating Attack against software-based remote authentication. -- Fuzz Testing of UAV Configurations Based on Evolutionary Algorithm. -- A suvey of algorithms for addressing the Shortest Vector Problem (SVP). -- Blockchain and applications. -- PSWS: Private Support-Weighted Sum Protocol for Privacy-Preserving Blockchain-Based Voting With Ballot Secrecy. -- Cross-chain trusted information match scheme with privacy-perserving and auditability. -- Verifiable Attribute-Based Proxy Re-Encryption with Non-repudiation based on Block-Chain. -- Blockchain-based Hierarchical Access Control with Efficient Revocation in mHealth System. |
520
|
|
▼aThis book constitutes the refereed proceedings of the Third International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2023, held in December 2-3, 2023 in Wuhan, China. The 10 regular papers presented were carefully reviewed and selected from 41 submissions. Blockchain technology has been emerging as a potential technology to be applied in various domains, including finance, computer science, electronic engineering, agriculture, healthcare and more. The blockchain-based applications are able to aid the current systems and networks by leveraging the benefits provided by blockchain technology, such as a decentralized, immutable, and cryptographically secured ledger. |
650
|
|
▼aComputer systems. |
650
|
|
▼aComputer networks . |
650
|
|
▼aArtificial intelligence. |
650
|
|
▼aMachine learning. |
650
|
|
▼aData protection. |
650
|
|
▼aComputer System Implementation. |
650
|
|
▼aComputer Communication Networks. |
650
|
|
▼aArtificial Intelligence. |
650
|
|
▼aMachine Learning. |
650
|
|
▼aData and Information Security. |
700
|
|
▼aChen, Jiageng.▼eeditor.▼0(orcid)0000-0001-9033-2575▼1https://orcid.org/0000-0001-9033-2575▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
700
|
|
▼aXia, Zhe.▼eeditor.▼0(orcid)0000-0003-4397-1248▼1https://orcid.org/0000-0003-4397-1248▼4edt▼4http://id.loc.gov/vocabulary/relators/edt |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9783031600364 |
776
|
|
▼iPrinted edition:▼z9783031600388 |
830
|
|
▼aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,▼x1867-822X ;▼v577 |
856
|
|
▼uhttps://doi.org/10.1007/978-3-031-60037-1 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
912
|
|
▼aZDB-2-LNS |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |