LEADER 03911nam 22005655 450 001 9911007354903321 005 20250526130244.0 010 $a981-9643-95-3 024 7 $a10.1007/978-981-96-4395-0 035 $a(CKB)39124437900041 035 $a(DE-He213)978-981-96-4395-0 035 $a(MiAaPQ)EBC32131940 035 $a(Au-PeEL)EBL32131940 035 $a(EXLCZ)9939124437900041 100 $a20250526d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBlockchain Technology $eCross-Chain Regulation and Privacy /$fby Peng Jiang, Liehuang Zhu 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (XVI, 184 p. 82 illus., 46 illus. in color.) 311 08$a981-9643-94-5 327 $aChapter 1: Introduction -- Chapter 2: Foundations -- Chapter 3: Cross-chain Abnormal Account Detection -- Chapter 4: Cross-chain Network Anomaly Detection -- Chapter 5: Cross-chain Traffic Anomaly Detection -- Chapter 6: Cross-chain Provenance Tracking -- Chapter 7: Generic Privacy-aware Cross-chain Framework -- Chapter 8: Lightweight Cross-chain Privacy Preserving Protocol -- Chapter 9: Balance of Regulation and Privacy for Cross-chain Transactions. 330 $aThe rapid development and widespread application of blockchain technology have led to a diverse and heterogeneous blockchain ecosystem. Independent operations, resembling isolated data islands, increase the difficulty of data exchange among blockchains. Cross-chain technology has emerged to connect independent blockchains, facilitating asset transfer and information interaction. As a promising new technology, cross-chain solutions with strong interoperability have garnered attention from both academia and industry. However, cross-chain financial incidents have exposed significant information leakage and property loss, highlighting the need for regulation and privacy in cross-chain environments. The lack of uniformity in cross-chain architecture and the use of common plain-format transactions increase the difficulty of both regulation and privacy preservation. This book, for the first time, explores the challenges and solutions related to cross-chain regulation and privacy. We provide a comprehensive understanding of how to design full life-cycle regulation mechanisms, from multi-dimensional detection to efficient provenance tracking, and lightweight privacy-preserving mechanisms. Additionally, we discuss how to balance regulation and privacy in cross-chain environments. This book will be of particular interest to researchers in the fields of blockchain, privacy concerns, and network security. It is the first book to comprehensively summarize cross-chain architecture and classification, analyze security challenges and potential requirements, and present numerous innovative technologies and practical solutions for regulation and privacy. 606 $aBlockchains (Databases) 606 $aData protection$xLaw and legislation 606 $aComputer networks$xSecurity measures 606 $aBlockchain 606 $aPrivacy 606 $aMobile and Network Security 615 0$aBlockchains (Databases) 615 0$aData protection$xLaw and legislation. 615 0$aComputer networks$xSecurity measures. 615 14$aBlockchain. 615 24$aPrivacy. 615 24$aMobile and Network Security. 676 $a005.824 676 $a005.74 700 $aJiang$b Peng$4aut$4http://id.loc.gov/vocabulary/relators/aut$01823656 702 $aZhu$b Liehuang$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911007354903321 996 $aBlockchain Technology$94390454 997 $aUNINA