دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Weizhi Meng. Wenjuan Li
سری: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 498
ISBN (شابک) : 3031314190, 9783031314193
ناشر: Springer-EAI
سال نشر: 2023
تعداد صفحات: 180
[181]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 7 Mb
در صورت تبدیل فایل کتاب Blockchain Technology and Emerging Technologies: Second EAI International Conference, BlockTEA 2022, Virtual Event, November 21-22, 2022, Proceedings به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب فناوری بلاک چین و فناوری های نوظهور: دومین کنفرانس بین المللی EAI، BlockTEA 2022، رویداد مجازی، 21-22 نوامبر 2022، مجموعه مقالات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
This book constitutes the refereed proceedings of the Second EAI International Conference on Blockchain Technology and Emerging Technologies, BlockTEA 2022, held in Virtual Event, during November 21-22, 2022. The 10 full papers included in this book were carefully reviewed and selected from 28 submissions. They were organized in topical sections as follows: answer set programming; functional programming; Smart contract, Privacy protection, NFT and Machine learning
Preface Organization Contents Smart Contract ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract 1 Introduction 2 State of the Art 3 Background 4 ID-Based Self-encryption 4.1 Integrating Identity into the Encryption 4.2 Connecting the Encryption Algorithm and the Local Application 4.3 Smart Contract 4.4 Self-encryption Work Flow in a Blockchain-IPFS Based Network 5 Results 5.1 Performance Analysis 5.2 Benefits Overview 6 Discussion 7 Conclusion References Scalable Smart Contracts for Linear Regression Algorithm 1 Introduction and Motivation 2 Problem Definition 3 Our Contribution 4 Literature Review 5 Methodology 6 Experimental Setup 7 Performance Evaluation 8 Computational Analysis 9 Limitation and Challenges 10 Conclusion References Combining ID's, Attributes, and Policies in Hyperledger Fabric 1 Introduction 2 Related Work 3 Contribution 4 Background 4.1 Hyperledger Fabric 4.2 Secure Access Control 4.3 Certificate Authorities (CAs) 4.4 Membership Service Providers (MSPs) 4.5 Generating Certificates 5 Proposed Implementation 5.1 Combining Attributes 5.2 Combining Policies 5.3 Combining ID's 5.4 Workflow in a Blockchain-IPFS-Based Network 6 Results 7 Discussion 8 Conclusions References A Secure Microgrid Power Transaction Scheme Based on Hyperledger Fabric 1 Introduction 1.1 Related Works 1.2 Contribution 2 Preliminary 2.1 Hyperledger Fabric 2.2 Blockchain Oracle 2.3 Proof of Work 3 Smart Microgrid Power Trading System Based on Consortium Blockchain 3.1 User and Node Definitions 3.2 Smart Contract and Blockchain Oracle Design 3.3 PCDA Algorithm 4 Distributed Power Transaction Process 4.1 Publish Bid Order 4.2 Bid Matching and Contract Signing 4.3 Transaction Settlement 5 System Analysis 5.1 System Security Analysis 5.2 System Feasibility Analysis 6 Conclusions References Privacy Protection An Outsourced Multi-authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit 1 Introduction 1.1 Our Contribution 1.2 Paper Organization 2 Related Work 3 Preliminaries 3.1 Access Structures 3.2 Lagrange Interpolation 3.3 Bilinear Pairings 3.4 The Decisional Bilinear Diffie-Hellman Problem (DBDH) 3.5 Trapdoor Function 4 Syntax and Security 4.1 Security Assumptions 4.2 Security Model 5 Our Construction 5.1 System Initialization 5.2 Execution 5.3 Encryption and Decryption 5.4 Audit 5.5 Decryption by User 6 Security Analysis 7 Comparisons 7.1 Feature and Security Comparisons 7.2 Computational Analysis 7.3 Storage Overhead 8 Conclusion References A Privacy-Preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain 1 Introduction 1.1 Related Work 1.2 Our Contribution: Cross-Chain with Privacy and Auditability 2 Preliminaries 2.1 Mathematical Backgrounds 2.2 Threshold Signature 3 System Model 3.1 System Architecture 3.2 Threats 4 Our Proposed Scheme 4.1 Overview 4.2 Detailed Description 4.3 Security Discussion 5 Conclusion References Data Cooperatives for Trusted News Sharing in Social Media 1 Introduction and Problem Motivation 1.1 Data Cooperatives 1.2 Fake News 1.3 Why Blockchain for Data Cooperatives? 1.4 Our Contributions 1.5 Outline 2 Background and Related Work 3 System Architecture 3.1 Participants and Their Roles on the Blockchain 3.2 Smart Contract 3.3 Event Flows 3.4 Reputation System 3.5 Incentive Structure 4 Experimental Setup and Implementation 5 Results and Discussion 5.1 Security Analysis 6 Conclusion and Future Work References NFT and Machine Learning A Novel Fast Recovery Method for HT Tamper in Embedded Processor 1 Introduction 2 The Proposed Recovery Method 2.1 The Design and Implement of GPRs Backup Unit 2.2 The Design and Implement of PC Rollback Unit 3 Experimental Results 4 Conclusion References MIA-Leak: Exploring Membership Inference Attacks in Federated Learning Systems 1 Introduction 2 Related Work 2.1 Attacks in Federated Learning 2.2 Membership Inference 2.3 Defense Proposals 3 Membership Inference Attacks in Federated Learning 3.1 Threat Models 3.2 Case1: Class-Level Attack 3.3 Case2: User-Level Attack 4 Experimental Evaluation 4.1 Datasets and Experimental Setup 4.2 Effectiveness of Data Augmentation 4.3 Evaluation of Class-Level Attack 4.4 Evaluation of User-Level Attack 5 Summary and Future Work References SoK: Can NFTs Solve the Economic Problems of Countries with Ancient Heritage? Egypt as a Case Study 1 Countries and Cryptocurrencies 2 Countries and NFTs 3 NFTs Profitable Uses 4 The Egyptian Case 5 Issues, Challenges, and Design Decisions 6 NFTs.. The Concept, and Technical Details 6.1 The Conceptual Meaning of an NFT 6.2 Implementing NFTs in Different Smart Contract Blockchains 6.3 Implementing NFTs in Bitcoin 7 Conclusions and Prospectives Appendix A References Author Index