ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Blockchain and Trustworthy Systems: 4th International Conference, BlockSys 2022, Chengdu, China, August 4–5, 2022, Revised Selected Papers

دانلود کتاب بلاک چین و سیستم های قابل اعتماد: چهارمین کنفرانس بین المللی، BlockSys 2022، چنگدو، چین، 4 تا 5 اوت 2022، مقالات منتخب اصلاح شده

Blockchain and Trustworthy Systems: 4th International Conference, BlockSys 2022, Chengdu, China, August 4–5, 2022, Revised Selected Papers

مشخصات کتاب

Blockchain and Trustworthy Systems: 4th International Conference, BlockSys 2022, Chengdu, China, August 4–5, 2022, Revised Selected Papers

ویرایش:  
نویسندگان: , , , ,   
سری: Communications in Computer and Information Science, 1679 
ISBN (شابک) : 981198042X, 9789811980428 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 385
[386] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 27 Mb 

قیمت کتاب (تومان) : 39,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Blockchain and Trustworthy Systems: 4th International Conference, BlockSys 2022, Chengdu, China, August 4–5, 2022, Revised Selected Papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب بلاک چین و سیستم های قابل اعتماد: چهارمین کنفرانس بین المللی، BlockSys 2022، چنگدو، چین، 4 تا 5 اوت 2022، مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب بلاک چین و سیستم های قابل اعتماد: چهارمین کنفرانس بین المللی، BlockSys 2022، چنگدو، چین، 4 تا 5 اوت 2022، مقالات منتخب اصلاح شده

این کتاب مقالات پس از کنفرانس با داوری کامل چهارمین کنفرانس بین‌المللی بلاک چین و سیستم‌های قابل اعتماد، Blocksys 2022، که در چنگدو، چین، در آگوست 2022 برگزار شد، تشکیل می‌شود.
26 مقاله کامل با دقت بررسی و از بین 56 مقاله انتخاب شدند. ارسالی ها مقالات در بخش‌های موضوعی سازمان‌دهی شده‌اند: سیستم‌های قابل اعتماد؛ بلاک چین؛ محاسبات خصوصی.


توضیحاتی درمورد کتاب به خارجی

This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022.
The 26 full papers were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections: Trustworthy Systems; Blockchain; Private Computing.



فهرست مطالب

Preface
Organization
Contents
Trustworthy Systems
Secure and Efficient Agreement Signing Atop Blockchain and Decentralized Identity
	1 Introduction
	2 Background
	3 System and Security Models
		3.1 System Model
		3.2 Security Model
	4 System Design
		4.1 Identity System
		4.2 Agreement Signing System
		4.3 Security Sketch
	5 Experiments
	6 Conclusion
	References
A Privacy-Preserving Credit Bank Supervision Framework Based on Redactable Blockchain
	1 Introduction
		1.1 Related Works
		1.2 Our Contributions
		1.3 Paper Organization
	2 Preliminaries
		2.1 Chameleon Hash
		2.2 Smart Contract
		2.3 Threshold Signature
		2.4 Bilinear Mapping
	3 System Model and Requirements
		3.1 System Model
		3.2 Security Requirements
	4 PCR Construction
		4.1 Initialization Phase
		4.2 Storage Phase
		4.3 Delete Phase
	5 Security Analysis
	6 Evaluation
	7 Conclusion
	References
A Trusted Storage System for Digital Object in the Human-Cyber-Physical Environment
	1 Introduction
	2 Related Work
		2.1 Digital Object Architecture’s Application
		2.2 Trusted Storage Technology Based on Blockchain
	3 Trusted Storage System
		3.1 System Description
		3.2 Block Generation
		3.3 Block Consensus
	4 Experiment and Analysis
		4.1 The Experiment Setting
		4.2 The Performance in the Block Generation Stage
		4.3 The Performance in the Block Consensus Stage
		4.4 The Performance of the Trusted Storage System
	5 Conclusion
	References
The Role of Absorptive Capacity in the Blockchain Enabled Traceability Alignment: An Empirical Investigation
	1 Introduction
	2 Literature Review
	3 Research Setting and Method
	4 Data Interpretation
	5 Discussion and Implications
	6 Conclusion and Limitation
	References
DataAttest: A Framework to Attest Off-Chain Data Authenticity
	1 Introduction
	2 Motivating Example and Goals
	3 DataAttest Design
		3.1 DAP Construction and Verification
		3.2 Attestation Optimization
	4 Case Study
		4.1 Experimental Setup
		4.2 Effectiveness Evaluation
		4.3 Performance Evaluation
	5 Discussion
	6 Related Work
		6.1 Blockchain Oracle
		6.2 Control-Flow Attestation
	7 Conclusion
	References
Blockchain-Based Healthcare and Medicine Data Sharing and Service System
	1 Introduction
	2 Related Work
	3 HMChain Architecture
	4 Data Extraction and Storage Layer
		4.1 Data Extraction
		4.2 Data Storage
	5 Data Management Layer
		5.1 Peer-to-Peer Network
		5.2 Consensus Mechanism
		5.3 Smart Contract
	6 Data Application Layer
		6.1 Clinical Research and Development
		6.2 Medicine Traceability
	7 Conclusions
	References
BCSChain: Blockchain-Based Ceramic Supply Chain
	1 Introduction
	2 Background
		2.1 Conventional Ceramic Supply Chains
		2.2 Blockchain
		2.3 Related Works
	3 BCSChain: Blockchain-Based Ceramic Supply Chain
		3.1 System Architecture of BCSChain
		3.2 Advantages of BCSChain
	4 Application Scenarios of BCSChain
		4.1 Application in Logistics Traceability Management
		4.2 Application in Supply Chains Finance
		4.3 Application in Automatic Trading
	5 Conclusion
	References
Blockchain
A Highly Scalable Blockchain-Enabled DNS Architecture
	1 Background
		1.1 Challenges
		1.2 Related Work
		1.3 Contribution
	2 Architecture and Procedures
		2.1 Design Principles
		2.2 Architecture Overview
		2.3 Procedures
		2.4 Data Structure
	3 Scalabiity
		3.1 Limitless Capacity
		3.2 Overload
		3.3 Lookup Latency
		3.4 On-Demand Spanning
		3.5 Reasonable Lookup Latency
	4 Security
		4.1 Intra-node Security
		4.2 Inter-node Security
	5 Assessment
		5.1 Lookup-Latency (LO) and Branch Number (k)
		5.2 Amount of De-centralized Services (TN) and TREE’S Depth (D)
		5.3 Round-Trip Time (RTT)
		5.4 Total Latency (LA)
	6 Discussion
		6.1 Merits
		6.2 Further Discussion
		6.3 Future Work
	7 Conclusion
	References
Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System
	1 Introduction
		1.1 Application Case
		1.2 Our Contributions
		1.3 Layout
	2 Preliminaries
		2.1 Notions
		2.2 SM2 Signature Algorithm
	3 The Proposed SM2 Traceable Ring Signature
		3.1 Definition
		3.2 Constructions
		3.3 Discussion
	4 Evaluation and Analysis
		4.1 Communication Cost
		4.2 Computation Cost
	5 STRS-Based Blockchain Evidence-Storage System
		5.1 System Model
		5.2 Our Protocol
	6 Security Analysis
	7 Conclusion
	References
Blockchain-Enabled Techniques for Energy Internet of Things: A Review
	1 Introduction
	2 Blockchain-Enabled Key Techniques in EIoT
		2.1 Smart Contracts to Achieve EIoT Access Control
		2.2 Consensus Protocol in EIoT Network
		2.3 Cross-Chain Communication in Distributed Energy Transactions
	3 Performance Evaluation Methods of Blockchain-Based EIoT
	4 Challenges and Future Research Opportunities
	5 Conclusion
	References
Blockchain-Based Social Network Access Control Mechanism
	1 Introduction
	2 Preliminaries
		2.1 Blockchain and Smart Contract
		2.2 Role-Based Access Control
	3 General Process and Design Model of Blockchain-Based Social Network Access Control Mechanism
		3.1 Procedure of Blockchain-Based Social Network Access Control
		3.2 Design Model of Social Network Access Control Based on Blockchain
	4 Specific Scheme of Blockchain-Based Social Network Access Control Mechanism
		4.1 User and Role
		4.2 Upload Data
		4.3 The Public Role of Feature Extraction
		4.4 Role Application
	5 Realization of Social Network Access Control Based on Smart Contracts
		5.1 Contract Description
		5.2 Access Control Algorithm
	6 Verification of Social Network Access Control Mechanism Scheme Based on Blockchain
		6.1 Experimental Environment
		6.2 Experimental Details
		6.3 Interpretation of Result
	7 Conclusion
	References
Latency Analysis for Raft Consensus on Hyperledger Fabric
	1 Introduction
	2 Related Work
	3 Theoretical Modeling
		3.1 A Transaction Block Size Modeling
		3.2 Raft Consensus Latency Modeling
	4 Experiments and Analysis
	5 Conclusion
	References
A Survey of Blockchain-Based Stablecoin: Cryptocurrencies and Central Bank Digital Currencies
	1 Introduction
	2 Background
		2.1 Blockchain Technology
		2.2 Blockchain-Based Stablecoins
	3 Project Review on Blockchain-Based Stablecoins
		3.1 Wholesale CBDC Stablecoins
		3.2 Retail CBDC Stablecoins
		3.3 Fiat Asset-Backed Stablecoins
		3.4 Crypto Asset-Backed Stablecoins
		3.5 Algorithmic Stablecoins
	4 Regulation Towards Blockchain-Based Stablecoins
		4.1 Regulation Towards Stablecoins in CBDC
		4.2 Regulation Towards Cryptocurrencies Stablecoins
	5 Discussions
		5.1 Regulation Issues
		5.2 Technology Issues
		5.3 Stability Issues
	6 Conclusion
	References
Collusion Attack Analysis and Detection of DPoS Consensus Mechanism
	1 Introduction
	2 Related Work
	3 Preliminaries
		3.1 DPoS: Delegated Proof of Stake
		3.2 Weighted Voting Games
		3.3 Collusion Attack
	4 Model and Definitions
		4.1 Coalitional Games in DPoS
		4.2 SSI: Shapley-Shubik Power Index
		4.3 PBI: Banzhaf Power Index or Penrose Index
		4.4 The Weighted Voting Game in DPoS
	5 Experiment and Analysis
		5.1 Analysis of Collusion Attack in DPoS
		5.2 Detection of Collusion Attack in DPoS
	6 Conclusion
	References
Decentralized Blockchain Transaction Scheme Based on Digital Commitment
	1 Introduction
	2 Preliminaries
		2.1 Digital Commitment
		2.2 Homomorphic Encryption
		2.3 Multi-key Fully Homomorphic Encryption
		2.4 Zero-Knowledge Proof
	3 Blockchain Transaction Scheme Based on Digital Commitment
		3.1 Transaction Scene
		3.2 Scheme Design
	4 Scheme Analysis
		4.1 Positive Analysis
		4.2 Security Analysis
		4.3 Performance Analysis
	5 Conclusion
	References
Private Computing
Research on Abnormal Transaction Detection Method for Blockchain
	1 Introduction
	2 Related Work
	3 Model
		3.1 System Model
		3.2 Building Transaction Topology
	4 Blockchain Anomaly Detection Based on GNN-FiLM
	5 Experiment
		5.1 Method Comparison
		5.2 Feature Preprocessing and Sample Equalization
	6 Conclusion
	References
Cross Cryptocurrency Relationship Mining for Bitcoin Price Prediction
	1 Introduction
	2 Related Work
		2.1 External Factors
		2.2 Machine Learning Methods
		2.3 Graph Analytics
	3 Methodology
		3.1 Data Preprocessing
		3.2 Lead-Lag Variance Kernel
		3.3 Deep Learning Models
	4 Experiments
		4.1 Dataset
		4.2 Baselines
		4.3 Evaluation Metric
		4.4 Results and Analysis
	5 Conclusion
	References
Blockchain-Based UAV-Assisted Forest Supervision and Data Sharing
	1 Introduction
		1.1 Related Works
		1.2 Our Contributions
	2 Preliminaries
		2.1 Blockchain
		2.2 Smart Contract
		2.3 Interplanetary File System
		2.4 Physical Unclonable Functions
	3 System Model and Security Requirements
		3.1 System Model
		3.2 Security Requirements
	4 BSR Construction
		4.1 System Initialization
		4.2 Forest Information Initialization
		4.3 Data Collection
		4.4 Data Processing
	5 Security Analysis
	6 Performance Analysis
	7 Conclusion
	References
Suspicious Customer Detection on the Blockchain Network for Cryptocurrency Exchanges
	1 Introduction
	2 Related Work
		2.1 Crime Detection in Traditional Financial Activities
		2.2 Crime Detection in Cryptocurrency Activities
	3 Suspicious Customer Detection
		3.1 Design Goal
		3.2 System Architecture
		3.3 Suspicious Address Detection Models
		3.4 Transaction and Address Visualization
	4 Evaluation
		4.1 Dataset
		4.2 Evaluation Metrics
		4.3 Results and Discussions
	5 Conclusion
	References
Real-Time Detection of Cryptocurrency Mining Behavior
	1 Introduction
	2 Related Work
		2.1 Network Communication of Cryptocurrency Mining
		2.2 Summary of Mining Detection Study
	3 Methodology
		3.1 Data Collection
		3.2 Feature Extraction
		3.3 Machine Learning Classifier
	4 Performance Evaluation
		4.1 Preliminary
		4.2 Effectiveness Evaluation
		4.3 Time Cost Evaluation
		4.4 Roubustness Evaluation
	5 Conclusion
	References
Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 System Overview
		3.2 Data Collection
		3.3 Background Traffic Filtering
		3.4 Traffic Correlation Analysis
	4 Evaluation
		4.1 Prerequisite Knowledge
		4.2 The Difference Between Wallet Stream and Normal Stream
		4.3 Correlation Analysis of Inbound Flow and Outbound Flow
	5 Summary
	References
FL-MFGM: A Privacy-Preserving and High-Accuracy Blockchain Reliability Prediction Model
	1 Introduction
	2 Related Work
	3 Privacy-Preserving Blockchain Reliability Prediction Model
		3.1 Model Framework
		3.2 Federated Matrix Factorization for Blockchain Reliability Prediction
		3.3 Gradient Compression
		3.4 FL-MFGM Algorithm
	4 Experiments and Analysis
		4.1 Experiment Settings
		4.2 Prediction Accuracy Comparison (RQ1)
		4.3 Effect of Gradient Compression and Momentum Correction (RQ2)
		4.4 Impact of Sparsity (RQ3)
	5 Conclusion and Future Work
	References
WaLi: Control-Flow-Based Analysis of Wasm Smart Contracts
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Overview
		3.2 Critical Path Identification
		3.3 Path Tracing and Detection
	4 Experiment
		4.1 Performance on Converted Dataset
		4.2 Search Scope Narrowing Strategy Analysis
		4.3 Generalization Capability of Patterns
	5 Conclusion
	References
Blockchain Policy Tool Selection in CHina’s Blockchain Industry Clustering Areas
	1 Introduction
	2 First Section
		2.1 Data Acquisition
		2.2 Text Segmentation
		2.3 Remove Stop-Words and Illegal Characters
		2.4 Text Vectorization
		2.5 Policy Text Clustering
		2.6 Model Evaluation
	3 Policy Tool Choice
		3.1 Generate Word Cloud
		3.2 The Classification of Policy Tools
		3.3 Provinces Match Policy Tools
	4 Impact of Policy Tool Choice on Blockchain Industry Distribution
	5 Conclusion
	References
Lock-Based Proof of Authority: A Faster and Low-Forking PoA Fault Tolerance Protocol for Blockchain Systems
	1 Introduction
	2 Design of LPoA
		2.1 Mechanism
		2.2 Consensus Process
	3 Implementation and Evaluation
		3.1 Evaluation Metrics
		3.2 Transactions and Sending Program
		3.3 Stress Model
		3.4 Experiment Configuration
	4 Results and Comparisons
		4.1 PoA and LPoA with Different Parameters
		4.2 PoA and LPoA Across Data Centers
		4.3 Across Systems and Protocols
	5 Conclusion
	References
Phishing Fraud Detection on Ethereum Using Graph Neural Network
	1 Introduction
	2 Related Work
		2.1 Phishing Detection Method
		2.2 Network Representation Learning
	3 Methodology
		3.1 Problem Description
		3.2 Lightweight Transaction Network
		3.3 Subgraph Sampling
		3.4 Phishing Detection Based on Graph Neural Network
	4 Experimental Results
		4.1 Dataset
		4.2 Comparison Methods and Experimental Setup
		4.3 Evaluation Metrics
		4.4 Evaluation on Phishing Detection
		4.5 Parameter Analysis
	5 Conclusions and Future Work
	References
Author Index




نظرات کاربران