دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Davor Svetinović, Yin Zhang, Xiapu Luo, Xiaoyan Huang, Xingping Chen سری: Communications in Computer and Information Science, 1679 ISBN (شابک) : 981198042X, 9789811980428 ناشر: Springer سال نشر: 2022 تعداد صفحات: 385 [386] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 27 Mb
در صورت تبدیل فایل کتاب Blockchain and Trustworthy Systems: 4th International Conference, BlockSys 2022, Chengdu, China, August 4–5, 2022, Revised Selected Papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب بلاک چین و سیستم های قابل اعتماد: چهارمین کنفرانس بین المللی، BlockSys 2022، چنگدو، چین، 4 تا 5 اوت 2022، مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مقالات پس از کنفرانس با داوری کامل چهارمین
کنفرانس بینالمللی بلاک چین و سیستمهای قابل اعتماد، Blocksys
2022، که در چنگدو، چین، در آگوست 2022 برگزار شد، تشکیل
میشود.
26 مقاله کامل با دقت بررسی و از بین 56 مقاله انتخاب شدند.
ارسالی ها مقالات در بخشهای موضوعی سازماندهی
شدهاند: سیستمهای قابل اعتماد؛ بلاک چین؛ محاسبات
خصوصی.
This book constitutes the thoroughly refereed post
conference papers of the 4th International Conference on
Blockchain and Trustworthy Systems, Blocksys 2022, held
in Chengdu, China, in August 2022.
The 26 full papers were carefully reviewed and selected from 56
submissions. The papers are organized in topical
sections: Trustworthy Systems; Blockchain; Private
Computing.
Preface Organization Contents Trustworthy Systems Secure and Efficient Agreement Signing Atop Blockchain and Decentralized Identity 1 Introduction 2 Background 3 System and Security Models 3.1 System Model 3.2 Security Model 4 System Design 4.1 Identity System 4.2 Agreement Signing System 4.3 Security Sketch 5 Experiments 6 Conclusion References A Privacy-Preserving Credit Bank Supervision Framework Based on Redactable Blockchain 1 Introduction 1.1 Related Works 1.2 Our Contributions 1.3 Paper Organization 2 Preliminaries 2.1 Chameleon Hash 2.2 Smart Contract 2.3 Threshold Signature 2.4 Bilinear Mapping 3 System Model and Requirements 3.1 System Model 3.2 Security Requirements 4 PCR Construction 4.1 Initialization Phase 4.2 Storage Phase 4.3 Delete Phase 5 Security Analysis 6 Evaluation 7 Conclusion References A Trusted Storage System for Digital Object in the Human-Cyber-Physical Environment 1 Introduction 2 Related Work 2.1 Digital Object Architecture’s Application 2.2 Trusted Storage Technology Based on Blockchain 3 Trusted Storage System 3.1 System Description 3.2 Block Generation 3.3 Block Consensus 4 Experiment and Analysis 4.1 The Experiment Setting 4.2 The Performance in the Block Generation Stage 4.3 The Performance in the Block Consensus Stage 4.4 The Performance of the Trusted Storage System 5 Conclusion References The Role of Absorptive Capacity in the Blockchain Enabled Traceability Alignment: An Empirical Investigation 1 Introduction 2 Literature Review 3 Research Setting and Method 4 Data Interpretation 5 Discussion and Implications 6 Conclusion and Limitation References DataAttest: A Framework to Attest Off-Chain Data Authenticity 1 Introduction 2 Motivating Example and Goals 3 DataAttest Design 3.1 DAP Construction and Verification 3.2 Attestation Optimization 4 Case Study 4.1 Experimental Setup 4.2 Effectiveness Evaluation 4.3 Performance Evaluation 5 Discussion 6 Related Work 6.1 Blockchain Oracle 6.2 Control-Flow Attestation 7 Conclusion References Blockchain-Based Healthcare and Medicine Data Sharing and Service System 1 Introduction 2 Related Work 3 HMChain Architecture 4 Data Extraction and Storage Layer 4.1 Data Extraction 4.2 Data Storage 5 Data Management Layer 5.1 Peer-to-Peer Network 5.2 Consensus Mechanism 5.3 Smart Contract 6 Data Application Layer 6.1 Clinical Research and Development 6.2 Medicine Traceability 7 Conclusions References BCSChain: Blockchain-Based Ceramic Supply Chain 1 Introduction 2 Background 2.1 Conventional Ceramic Supply Chains 2.2 Blockchain 2.3 Related Works 3 BCSChain: Blockchain-Based Ceramic Supply Chain 3.1 System Architecture of BCSChain 3.2 Advantages of BCSChain 4 Application Scenarios of BCSChain 4.1 Application in Logistics Traceability Management 4.2 Application in Supply Chains Finance 4.3 Application in Automatic Trading 5 Conclusion References Blockchain A Highly Scalable Blockchain-Enabled DNS Architecture 1 Background 1.1 Challenges 1.2 Related Work 1.3 Contribution 2 Architecture and Procedures 2.1 Design Principles 2.2 Architecture Overview 2.3 Procedures 2.4 Data Structure 3 Scalabiity 3.1 Limitless Capacity 3.2 Overload 3.3 Lookup Latency 3.4 On-Demand Spanning 3.5 Reasonable Lookup Latency 4 Security 4.1 Intra-node Security 4.2 Inter-node Security 5 Assessment 5.1 Lookup-Latency (LO) and Branch Number (k) 5.2 Amount of De-centralized Services (TN) and TREE’S Depth (D) 5.3 Round-Trip Time (RTT) 5.4 Total Latency (LA) 6 Discussion 6.1 Merits 6.2 Further Discussion 6.3 Future Work 7 Conclusion References Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System 1 Introduction 1.1 Application Case 1.2 Our Contributions 1.3 Layout 2 Preliminaries 2.1 Notions 2.2 SM2 Signature Algorithm 3 The Proposed SM2 Traceable Ring Signature 3.1 Definition 3.2 Constructions 3.3 Discussion 4 Evaluation and Analysis 4.1 Communication Cost 4.2 Computation Cost 5 STRS-Based Blockchain Evidence-Storage System 5.1 System Model 5.2 Our Protocol 6 Security Analysis 7 Conclusion References Blockchain-Enabled Techniques for Energy Internet of Things: A Review 1 Introduction 2 Blockchain-Enabled Key Techniques in EIoT 2.1 Smart Contracts to Achieve EIoT Access Control 2.2 Consensus Protocol in EIoT Network 2.3 Cross-Chain Communication in Distributed Energy Transactions 3 Performance Evaluation Methods of Blockchain-Based EIoT 4 Challenges and Future Research Opportunities 5 Conclusion References Blockchain-Based Social Network Access Control Mechanism 1 Introduction 2 Preliminaries 2.1 Blockchain and Smart Contract 2.2 Role-Based Access Control 3 General Process and Design Model of Blockchain-Based Social Network Access Control Mechanism 3.1 Procedure of Blockchain-Based Social Network Access Control 3.2 Design Model of Social Network Access Control Based on Blockchain 4 Specific Scheme of Blockchain-Based Social Network Access Control Mechanism 4.1 User and Role 4.2 Upload Data 4.3 The Public Role of Feature Extraction 4.4 Role Application 5 Realization of Social Network Access Control Based on Smart Contracts 5.1 Contract Description 5.2 Access Control Algorithm 6 Verification of Social Network Access Control Mechanism Scheme Based on Blockchain 6.1 Experimental Environment 6.2 Experimental Details 6.3 Interpretation of Result 7 Conclusion References Latency Analysis for Raft Consensus on Hyperledger Fabric 1 Introduction 2 Related Work 3 Theoretical Modeling 3.1 A Transaction Block Size Modeling 3.2 Raft Consensus Latency Modeling 4 Experiments and Analysis 5 Conclusion References A Survey of Blockchain-Based Stablecoin: Cryptocurrencies and Central Bank Digital Currencies 1 Introduction 2 Background 2.1 Blockchain Technology 2.2 Blockchain-Based Stablecoins 3 Project Review on Blockchain-Based Stablecoins 3.1 Wholesale CBDC Stablecoins 3.2 Retail CBDC Stablecoins 3.3 Fiat Asset-Backed Stablecoins 3.4 Crypto Asset-Backed Stablecoins 3.5 Algorithmic Stablecoins 4 Regulation Towards Blockchain-Based Stablecoins 4.1 Regulation Towards Stablecoins in CBDC 4.2 Regulation Towards Cryptocurrencies Stablecoins 5 Discussions 5.1 Regulation Issues 5.2 Technology Issues 5.3 Stability Issues 6 Conclusion References Collusion Attack Analysis and Detection of DPoS Consensus Mechanism 1 Introduction 2 Related Work 3 Preliminaries 3.1 DPoS: Delegated Proof of Stake 3.2 Weighted Voting Games 3.3 Collusion Attack 4 Model and Definitions 4.1 Coalitional Games in DPoS 4.2 SSI: Shapley-Shubik Power Index 4.3 PBI: Banzhaf Power Index or Penrose Index 4.4 The Weighted Voting Game in DPoS 5 Experiment and Analysis 5.1 Analysis of Collusion Attack in DPoS 5.2 Detection of Collusion Attack in DPoS 6 Conclusion References Decentralized Blockchain Transaction Scheme Based on Digital Commitment 1 Introduction 2 Preliminaries 2.1 Digital Commitment 2.2 Homomorphic Encryption 2.3 Multi-key Fully Homomorphic Encryption 2.4 Zero-Knowledge Proof 3 Blockchain Transaction Scheme Based on Digital Commitment 3.1 Transaction Scene 3.2 Scheme Design 4 Scheme Analysis 4.1 Positive Analysis 4.2 Security Analysis 4.3 Performance Analysis 5 Conclusion References Private Computing Research on Abnormal Transaction Detection Method for Blockchain 1 Introduction 2 Related Work 3 Model 3.1 System Model 3.2 Building Transaction Topology 4 Blockchain Anomaly Detection Based on GNN-FiLM 5 Experiment 5.1 Method Comparison 5.2 Feature Preprocessing and Sample Equalization 6 Conclusion References Cross Cryptocurrency Relationship Mining for Bitcoin Price Prediction 1 Introduction 2 Related Work 2.1 External Factors 2.2 Machine Learning Methods 2.3 Graph Analytics 3 Methodology 3.1 Data Preprocessing 3.2 Lead-Lag Variance Kernel 3.3 Deep Learning Models 4 Experiments 4.1 Dataset 4.2 Baselines 4.3 Evaluation Metric 4.4 Results and Analysis 5 Conclusion References Blockchain-Based UAV-Assisted Forest Supervision and Data Sharing 1 Introduction 1.1 Related Works 1.2 Our Contributions 2 Preliminaries 2.1 Blockchain 2.2 Smart Contract 2.3 Interplanetary File System 2.4 Physical Unclonable Functions 3 System Model and Security Requirements 3.1 System Model 3.2 Security Requirements 4 BSR Construction 4.1 System Initialization 4.2 Forest Information Initialization 4.3 Data Collection 4.4 Data Processing 5 Security Analysis 6 Performance Analysis 7 Conclusion References Suspicious Customer Detection on the Blockchain Network for Cryptocurrency Exchanges 1 Introduction 2 Related Work 2.1 Crime Detection in Traditional Financial Activities 2.2 Crime Detection in Cryptocurrency Activities 3 Suspicious Customer Detection 3.1 Design Goal 3.2 System Architecture 3.3 Suspicious Address Detection Models 3.4 Transaction and Address Visualization 4 Evaluation 4.1 Dataset 4.2 Evaluation Metrics 4.3 Results and Discussions 5 Conclusion References Real-Time Detection of Cryptocurrency Mining Behavior 1 Introduction 2 Related Work 2.1 Network Communication of Cryptocurrency Mining 2.2 Summary of Mining Detection Study 3 Methodology 3.1 Data Collection 3.2 Feature Extraction 3.3 Machine Learning Classifier 4 Performance Evaluation 4.1 Preliminary 4.2 Effectiveness Evaluation 4.3 Time Cost Evaluation 4.4 Roubustness Evaluation 5 Conclusion References Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor 1 Introduction 2 Related Works 3 Methodology 3.1 System Overview 3.2 Data Collection 3.3 Background Traffic Filtering 3.4 Traffic Correlation Analysis 4 Evaluation 4.1 Prerequisite Knowledge 4.2 The Difference Between Wallet Stream and Normal Stream 4.3 Correlation Analysis of Inbound Flow and Outbound Flow 5 Summary References FL-MFGM: A Privacy-Preserving and High-Accuracy Blockchain Reliability Prediction Model 1 Introduction 2 Related Work 3 Privacy-Preserving Blockchain Reliability Prediction Model 3.1 Model Framework 3.2 Federated Matrix Factorization for Blockchain Reliability Prediction 3.3 Gradient Compression 3.4 FL-MFGM Algorithm 4 Experiments and Analysis 4.1 Experiment Settings 4.2 Prediction Accuracy Comparison (RQ1) 4.3 Effect of Gradient Compression and Momentum Correction (RQ2) 4.4 Impact of Sparsity (RQ3) 5 Conclusion and Future Work References WaLi: Control-Flow-Based Analysis of Wasm Smart Contracts 1 Introduction 2 Related Work 3 Methodology 3.1 Overview 3.2 Critical Path Identification 3.3 Path Tracing and Detection 4 Experiment 4.1 Performance on Converted Dataset 4.2 Search Scope Narrowing Strategy Analysis 4.3 Generalization Capability of Patterns 5 Conclusion References Blockchain Policy Tool Selection in CHina’s Blockchain Industry Clustering Areas 1 Introduction 2 First Section 2.1 Data Acquisition 2.2 Text Segmentation 2.3 Remove Stop-Words and Illegal Characters 2.4 Text Vectorization 2.5 Policy Text Clustering 2.6 Model Evaluation 3 Policy Tool Choice 3.1 Generate Word Cloud 3.2 The Classification of Policy Tools 3.3 Provinces Match Policy Tools 4 Impact of Policy Tool Choice on Blockchain Industry Distribution 5 Conclusion References Lock-Based Proof of Authority: A Faster and Low-Forking PoA Fault Tolerance Protocol for Blockchain Systems 1 Introduction 2 Design of LPoA 2.1 Mechanism 2.2 Consensus Process 3 Implementation and Evaluation 3.1 Evaluation Metrics 3.2 Transactions and Sending Program 3.3 Stress Model 3.4 Experiment Configuration 4 Results and Comparisons 4.1 PoA and LPoA with Different Parameters 4.2 PoA and LPoA Across Data Centers 4.3 Across Systems and Protocols 5 Conclusion References Phishing Fraud Detection on Ethereum Using Graph Neural Network 1 Introduction 2 Related Work 2.1 Phishing Detection Method 2.2 Network Representation Learning 3 Methodology 3.1 Problem Description 3.2 Lightweight Transaction Network 3.3 Subgraph Sampling 3.4 Phishing Detection Based on Graph Neural Network 4 Experimental Results 4.1 Dataset 4.2 Comparison Methods and Experimental Setup 4.3 Evaluation Metrics 4.4 Evaluation on Phishing Detection 4.5 Parameter Analysis 5 Conclusions and Future Work References Author Index