03911nam 22005655 450 991100735490332120250526130244.0981-9643-95-310.1007/978-981-96-4395-0(CKB)39124437900041(DE-He213)978-981-96-4395-0(MiAaPQ)EBC32131940(Au-PeEL)EBL32131940(EXLCZ)993912443790004120250526d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierBlockchain Technology Cross-Chain Regulation and Privacy /by Peng Jiang, Liehuang Zhu1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (XVI, 184 p. 82 illus., 46 illus. in color.) 981-9643-94-5 Chapter 1: Introduction -- Chapter 2: Foundations -- Chapter 3: Cross-chain Abnormal Account Detection -- Chapter 4: Cross-chain Network Anomaly Detection -- Chapter 5: Cross-chain Traffic Anomaly Detection -- Chapter 6: Cross-chain Provenance Tracking -- Chapter 7: Generic Privacy-aware Cross-chain Framework -- Chapter 8: Lightweight Cross-chain Privacy Preserving Protocol -- Chapter 9: Balance of Regulation and Privacy for Cross-chain Transactions.The rapid development and widespread application of blockchain technology have led to a diverse and heterogeneous blockchain ecosystem. Independent operations, resembling isolated data islands, increase the difficulty of data exchange among blockchains. Cross-chain technology has emerged to connect independent blockchains, facilitating asset transfer and information interaction. As a promising new technology, cross-chain solutions with strong interoperability have garnered attention from both academia and industry. However, cross-chain financial incidents have exposed significant information leakage and property loss, highlighting the need for regulation and privacy in cross-chain environments. The lack of uniformity in cross-chain architecture and the use of common plain-format transactions increase the difficulty of both regulation and privacy preservation. This book, for the first time, explores the challenges and solutions related to cross-chain regulation and privacy. We provide a comprehensive understanding of how to design full life-cycle regulation mechanisms, from multi-dimensional detection to efficient provenance tracking, and lightweight privacy-preserving mechanisms. Additionally, we discuss how to balance regulation and privacy in cross-chain environments. This book will be of particular interest to researchers in the fields of blockchain, privacy concerns, and network security. It is the first book to comprehensively summarize cross-chain architecture and classification, analyze security challenges and potential requirements, and present numerous innovative technologies and practical solutions for regulation and privacy.Blockchains (Databases)Data protectionLaw and legislationComputer networksSecurity measuresBlockchainPrivacyMobile and Network SecurityBlockchains (Databases)Data protectionLaw and legislation.Computer networksSecurity measures.Blockchain.Privacy.Mobile and Network Security.005.824005.74Jiang Pengauthttp://id.loc.gov/vocabulary/relators/aut1823656Zhu Liehuangauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9911007354903321Blockchain Technology4390454UNINA