top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain : Empowering Secure Data Sharing / / by Meng Shen, Liehuang Zhu, Ke Xu
Blockchain : Empowering Secure Data Sharing / / by Meng Shen, Liehuang Zhu, Ke Xu
Autore Shen Meng
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 130 p. 53 illus., 33 illus. in color.) : illustrations
Disciplina 378.1662
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Cryptology
Information Storage and Retrieval
ISBN 981-15-5939-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. Blockchain and Data Sharing -- Chapter 3. Layered Data Sharing Architecture with Blockchain -- Chapter 4. Secure Homogeneous Data Sharing Using Blockchain -- Chapter 5. Secure Heterogeneous Data Sharing Using Blockchain -- Chapter 6. Secure Data Retrieval Using Blockchain -- Chapter 7. Data Sharing Incentives with Blockchain.
Record Nr. UNISA-996465356803316
Shen Meng  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain : Empowering Secure Data Sharing / / by Meng Shen, Liehuang Zhu, Ke Xu
Blockchain : Empowering Secure Data Sharing / / by Meng Shen, Liehuang Zhu, Ke Xu
Autore Shen Meng
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 130 p. 53 illus., 33 illus. in color.) : illustrations
Disciplina 378.1662
Soggetto topico Computer networks
Computer security
Data encryption (Computer science)
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Cryptology
Information Storage and Retrieval
ISBN 981-15-5939-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. Blockchain and Data Sharing -- Chapter 3. Layered Data Sharing Architecture with Blockchain -- Chapter 4. Secure Homogeneous Data Sharing Using Blockchain -- Chapter 5. Secure Heterogeneous Data Sharing Using Blockchain -- Chapter 6. Secure Data Retrieval Using Blockchain -- Chapter 7. Data Sharing Incentives with Blockchain.
Record Nr. UNINA-9910413446703321
Shen Meng  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain and Web3.0 Technology Innovation and Application : First Conference, BWTAC 2024, Guangzhou, China, November 6–8, 2024, Proceedings / / edited by Gansen Zhao, Jian Weng, Zhihong Tian, Liehuang Zhu, Zibin Zheng
Blockchain and Web3.0 Technology Innovation and Application : First Conference, BWTAC 2024, Guangzhou, China, November 6–8, 2024, Proceedings / / edited by Gansen Zhao, Jian Weng, Zhihong Tian, Liehuang Zhu, Zibin Zheng
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XV, 513 p. 180 illus., 149 illus. in color.)
Disciplina 005.3
Collana Communications in Computer and Information Science
Soggetto topico Application software
Data protection
Blockchains (Databases)
Software engineering
Computer and Information Systems Applications
Data and Information Security
Blockchain
Software Engineering
ISBN 981-9794-12-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Behavioral Unicity: On the Limits of Anonymized Social Behavior Metadata. -- Research on Effects of Blockchain Pilot Programs in Regional Equity Markets: Evidence from Participant and Non-Participant Institutions. -- Tailoring Noise to Fit: An Adaptive Noise Optimization Mechanism against Gradient Leakage. -- Design of Privacy-Preserving Smart Contracts for Regional Equity Markets. -- Deep Learning Empowered Blockchain Transaction Prediction and Anomaly Detection. -- A Blockchain-based Framework for Crowdsourcing Evaluation of Large Language Models. -- Trusted Data Authorization and Sharing Method Based on Distributed Digital Identity. -- Secure and Efficient Deduplication for Encrypted Image Data in Cloud Storage. -- SolSecure: A Security Analyzer for Integer Bugs in Smart Contracts. -- BBP: Blockchain-enabled Biological Assets Identity Protection System. -- Accountability Mechanism for Reliable Mobile Crowdsourcing with Efficient Blockchain. -- Who will be hooked?: A Phishing Fraud Detection Model Based on Dynamic Graph Temporal Feature Coding in Ethereum. -- Static Analysis Detection of Hyperleger Fabric Read-Write Logic Vulnerability. -- A Dataset Quality Evaluation Algorithm for Data Trading on Blockchain. -- A Variable (n, n) Threshold Secret Sharing Scheme Based on Paillier Cryptosystem. -- Design and Validation of a Hyper-Converged Blockchain Hardware and Software System Based on Domestic Chips. -- DFADNet: A Diverse-Feature Adaptive Network for Web3.0-oriented Deep Forgery Detection. -- Privacy Protection Model of International Cold Chain Trade Blockchain Platform Based on Zero-Knowledge Proofs. -- Blockchain-based Federated Recommendation with Incentive Mechanism. -- A Treatment of EIP-1559: Enhancing Transaction Fee Mechanism through Nth-Price Auction. -- Unravelling Stablecoin-favored Ecosystem: Extracting, Exploring On-chain Data from TRON Blockchain. -- Robust and Efficient Group-Based Ring Federated Learning Framework with Double-Masking Mechanism. -- Centralized Oracle for Smart Contract Applications, Information Output Methods, and Systems. -- DataSafe: Copyright Protection with PUF Watermarking and Blockchain Tracing. -- A GAN anomaly detection method based on multi-scale endogenous enhancement. -- A Comprehensive Review of Blockchain-Enabled Dynamic and Credible Spectrum Sharing. -- Heterogeneous Data Fusion Based Vulnerability Detection for Ethereum Smart Contracts. -- Adaptive Federated Learning Based on Device Performance in a Heterogeneous Environment of Medical Computing Devices. -- MSCV: A Cross-chain Smart Contract State Data Verification Model Based on MTC. -- How Does Hashgraph-based Blockchain Work in MANETs: A Theoretical Analysis Model. -- Heterogeneous Graph Structure Learning Based on Feature and Topology Information Extraction. -- A blockchain-based traceable and verifiable digital circuit trade method with dual-signature strategy. -- Personalized medical federated learning based on mutual knowledge distillation in object heterogeneous environment. -- Cryptocurrency Transaction Anomaly Detection Based on Chebyshev Graph Neural Network. -- Validating the integrity for Deep Learning Models based on Zero-knowledge proof and Blockchain. -- CLB-BAFL: Critical Learning Behaviour Verification Mechanism for Blockchain-Based Asynchronous Federated Learning. -- GeePT: Governance of Efficient and Extensible Privacy-preserving Transaction for Blockchain. -- HetGNN-TF: Self-supervised Learning on Heterogeneous Graph Neural Network via Topology and Feature Reconstruction. -- Cooperative Perception and Decision-Making in Internet of Vehicles: A Comprehensive Review of Federated Learning and Blockchain Technology. -- ETGuard: Malicious Encrypted Traffic Detection in Blockchain-based Power Grid Systems. -- Self-Supervised Heterogeneous Graph Neural Network Based on Deep and Broad Neighborhood Encoding. -- Batch Validation Scheme of Data Feature Requirement in Blockchain-based Data Trading Platform. -- Research on business process representation based on graph convolutional neural network. -- Membership Data Privacy Protection and Poisoning Detection Scheme for Federated Learning. -- Code-based Blockchain Light Node Data Availability Guarantee Method.
Record Nr. UNINA-9910983363103321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain Technology : Cross-Chain Regulation and Privacy / / by Peng Jiang, Liehuang Zhu
Blockchain Technology : Cross-Chain Regulation and Privacy / / by Peng Jiang, Liehuang Zhu
Autore Jiang Peng
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XVI, 184 p. 82 illus., 46 illus. in color.)
Disciplina 005.824
005.74
Soggetto topico Blockchains (Databases)
Data protection - Law and legislation
Computer networks - Security measures
Blockchain
Privacy
Mobile and Network Security
ISBN 981-9643-95-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction -- Chapter 2: Foundations -- Chapter 3: Cross-chain Abnormal Account Detection -- Chapter 4: Cross-chain Network Anomaly Detection -- Chapter 5: Cross-chain Traffic Anomaly Detection -- Chapter 6: Cross-chain Provenance Tracking -- Chapter 7: Generic Privacy-aware Cross-chain Framework -- Chapter 8: Lightweight Cross-chain Privacy Preserving Protocol -- Chapter 9: Balance of Regulation and Privacy for Cross-chain Transactions.
Record Nr. UNINA-9911007354903321
Jiang Peng  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain Technology and Application [[electronic resource] ] : Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11–13, 2019, Revised Selected Papers / / edited by Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, Xianhua Song, Zeguang Lu
Blockchain Technology and Application [[electronic resource] ] : Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11–13, 2019, Revised Selected Papers / / edited by Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, Xianhua Song, Zeguang Lu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 243 p. 116 illus., 72 illus. in color.)
Disciplina 005.74
Collana Communications in Computer and Information Science
Soggetto topico Computer organization
Operating systems (Computers)
Database management
Computer software
Application software
Data encryption (Computer science)
Computer Systems Organization and Communication Networks
Operating Systems
Database Management
Professional Computing
Information Systems Applications (incl. Internet)
Cryptology
ISBN 981-15-3278-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto OBBC-A Blockchain-based Data Sharing Scheme for Open Banking -- FutureOTC: An Intelligent Decentralized OTC Option Trading and E-contract Signing System-Forgetting Markov Model for Next-Basket Recommendation -- One-stop Efficient PKI Authentication Service Model Based on Blockchain -- Distributed Electronic Data Storage and Proof System Based on Blockchain -- Bye Audit! A Novel Blockchain-based Automated Data Processing Scheme for Bank Audit Confirmation -- A New Approach to Prevent Reentrant Attack in Solidity Smart Contracts -- CoT: A Secure Consensus of Trust with Delegation Mechanism in Blockchains -- A Uniform Payment System for Hyperledger Fabric Blockchain -- Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment -- Blockchain-based Content Name Search Mechanism in NDN -- Dizar: An Architecture of Distributed Public Key Infrastructure Based on Permissoned Blockchain -- Optimization Scheme of Consensus Mechanism Based on Practical Byzantine Fault Tolerance Algorithm -- The Trojan Message Attack on the Pay-to-Public-Key-Hash Protocol of Bitcoin -- Blockchain-based Implementation of Smart Contract and Risk Management for Interest Rate Swap -- Overview and Thoughts on Standardization of China's Blockchain Technology -- Routing Optimization for High Speed Photon State-Channel Architecture.
Record Nr. UNISA-996465356703316
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain Technology and Application : Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11–13, 2019, Revised Selected Papers / / edited by Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, Xianhua Song, Zeguang Lu
Blockchain Technology and Application : Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11–13, 2019, Revised Selected Papers / / edited by Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, Xianhua Song, Zeguang Lu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 243 p. 116 illus., 72 illus. in color.)
Disciplina 005.74
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Operating systems (Computers)
Database management
Programming languages (Electronic computers)
Application software
Cryptography
Data encryption (Computer science)
Computer Engineering and Networks
Operating Systems
Database Management
Programming Language
Computer and Information Systems Applications
Cryptology
ISBN 981-15-3278-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto OBBC-A Blockchain-based Data Sharing Scheme for Open Banking -- FutureOTC: An Intelligent Decentralized OTC Option Trading and E-contract Signing System-Forgetting Markov Model for Next-Basket Recommendation -- One-stop Efficient PKI Authentication Service Model Based on Blockchain -- Distributed Electronic Data Storage and Proof System Based on Blockchain -- Bye Audit! A Novel Blockchain-based Automated Data Processing Scheme for Bank Audit Confirmation -- A New Approach to Prevent Reentrant Attack in Solidity Smart Contracts -- CoT: A Secure Consensus of Trust with Delegation Mechanism in Blockchains -- A Uniform Payment System for Hyperledger Fabric Blockchain -- Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment -- Blockchain-based Content Name Search Mechanism in NDN -- Dizar: An Architecture of Distributed Public Key Infrastructure Based on Permissoned Blockchain -- Optimization Scheme of Consensus Mechanism Based on Practical Byzantine Fault Tolerance Algorithm -- The Trojan Message Attack on the Pay-to-Public-Key-Hash Protocol of Bitcoin -- Blockchain-based Implementation of Smart Contract and Risk Management for Interest Rate Swap -- Overview and Thoughts on Standardization of China's Blockchain Technology -- Routing Optimization for High Speed Photon State-Channel Architecture.
Record Nr. UNINA-9910380745903321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Edge Computing Resilience : Overcoming Resource Constraints in Unstable Computing Environments / / by Yanlong Zhai, Muhammad Mudassar, Liehuang Zhu
Edge Computing Resilience : Overcoming Resource Constraints in Unstable Computing Environments / / by Yanlong Zhai, Muhammad Mudassar, Liehuang Zhu
Autore Zhai Yanlong
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (139 pages)
Disciplina 005.758
Collana SpringerBriefs in Computer Science
Soggetto topico Mobile computing
Application software
Cooperating objects (Computer systems)
Internet of things
Mobile Computing
Computer and Information Systems Applications
Cyber-Physical Systems
Internet of Things
ISBN 981-9769-98-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Edge Computing -- Chapter 2. Scalability and Fault Tolerance for Real-Time Edge Applications -- Chapter 3. Resource-constrained Offloading in Edge Computing -- Chapter 4. Privacy Preserving Offloading -- Chapter 5. SDN-Based and Energy Aware Offloading -- Chapter 6. Optimization for Edge -- Chapter 7. FutureWork.
Record Nr. UNINA-9910896185103321
Zhai Yanlong  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Ad-hoc and Sensor Networks : 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers / / edited by Liehuang Zhu, Sheng Zhong
Mobile Ad-hoc and Sensor Networks : 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers / / edited by Liehuang Zhu, Sheng Zhong
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 524 p.)
Disciplina 004.685
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Application software
Data protection
Computer Communication Networks
Computer and Information Systems Applications
Data and Information Security
ISBN 981-10-8890-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi-hop wireless networks and wireless mesh networks -- Sensor and actuator networks -- Vehicle ad hoc networks -- Mobile social network -- Delay tolerant networks and opportunistic networking -- Cyber-physical systems -- Internet of things -- System modeling and performance analysis -- Routing and network protocols -- Data transport and management in mobile networks -- Resource management and wireless QoS provisioning -- Security and privacy -- Cross layer design and optimization -- Novel applications and architectures.
Record Nr. UNINA-9910299290703321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Web 3.0 / / by Meng Shen, Xiangyun Tang, Wei Wang, Liehuang Zhu
Security and Privacy in Web 3.0 / / by Meng Shen, Xiangyun Tang, Wei Wang, Liehuang Zhu
Autore Shen Meng
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (164 pages)
Disciplina 005.8
323.448
Altri autori (Persone) TangXiangyun
WangWei
ZhuLiehuang
Collana Digital Privacy and Security
Soggetto topico Data protection - Law and legislation
Computer networks - Security measures
Blockchains (Databases)
Privacy
Mobile and Network Security
Blockchain
ISBN 981-9757-52-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction of Web 3.0 -- Chapter 2. Security and Privacy Defense Framework for Web 3.0 -- Chapter 3. Verifiable Privacy-preserving Federated Learning in Web 3.0 -- Chapter 4. Membership Privacy Protection for Federated Learning in Web 3.0 -- Chapter 5. Secure Mobile Device Authentication in Web 3.0 -- Chapter 6. User Behavior Identification via Traffic Analysis in Web 3.0 -- Chapter 7. Malicious Transaction Detection in Web 3.0 -- Chapter 8. Malicious Transaction Deanonymity in Web 3.0 -- Chapter 9. Conclusion and Future Direction.
Record Nr. UNINA-9910886079703321
Shen Meng  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trusted Computing and Information Security [[electronic resource] ] : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers / / edited by Weili Han, Liehuang Zhu, Fei Yan
Trusted Computing and Information Security [[electronic resource] ] : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers / / edited by Weili Han, Liehuang Zhu, Fei Yan
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 356 p. 166 illus., 79 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer networks - Security measures
Computer security
Computer communication systems
Application software
Data encryption (Computer science)
Mobile and Network Security
Security Services
Computer Communication Networks
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
ISBN 981-15-3418-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Generative image Steganography based on GANs -- Partial blind proxy re-signature scheme for mobile internet -- Information Flow-Based Security Construction for Compositional Interface Automata -- Provably secure server-assisted verification threshold proxy re-signature scheme -- ReJection: A AST-based Reentrancy Vulnerability Detection Method -- Identity authentication under Internet of everything based on edge computing -- STC: Improving the Performance of Virtual Machines Based on Task Classification -- A Method for Realizing Covert Communication at Router Driving Layer -- A secure multi-party signature scheme based on trust mechanism -- Virtual FPGA Placement with An Efficient Ant Colony Optimization -- Identity-based threshold group signature scheme of Blockchain verification -- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences -- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation -- Research on Software Network Key Nodes Mining Methods Based on Complex Network -- Research and development of TPM virtualization -- A Secure Certificateless Identity Authentication Scheme Based on Blockchain -- A trust-based security research method for Internet of things terminal -- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing -- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching -- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph -- Outsourced Data Integrity Auditing for Efficient Batch Dynamic Updates -- Secure Personal Health Records Sharing based on Blockchain and IPFS. .
Record Nr. UNISA-996465353203316
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui