Hash Power
Download Hash Power PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Hash Power book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Financial Cryptography and Data Security
The two-volume set LNCS 13950 and 13951 constitutes revised selected papers from the 27th International Conference on Financial Cryptography and Data Security, FC 2023, which was held from May 1-5, 2023, in Bol, Croatia. The 39 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 182 submissions. They were organized in topical sections as follows:Part I: Consensus; cryptographic protocols; decentralized finance; Part II: Proof of X; Layer 2; attack techniques, defenses, and attack case studies; empirical studies and more decentralized finance; game theory and protocols.
Information and Software Technologies
This book constitutes the refereed proceedings of the 28th International Conference on Information and Software Technologies, ICIST 2022, held in Kaunas, Lithuania, in October 2022. The 23 full papers and 3 short papers presented were carefully reviewed and selected from 66 submissions. The papers discuss such topics as business intelligence for information and software systems, intelligent methods for data analysis and computer aided software engineering, information technology applications, smart e-learning technologies and applications, language technologies.
Financial Cryptography and Data Security
This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.