Financial Cryptography and Data Security: 28th International Conference, FC 2024, Willemstad, Curaao, March 48, 2024, Revised Selected Papers, Part I - Lecture Notes in Computer Science 14744
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place inWillemstad, Curaao, during March 48, 2024.
The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows:
Part I: Consensus; AMMs; fees and rewards; hardware attacks;
Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.
The two-volume set LNCS 14744 + 14745 constitutes the proceedings of the 28th International Conference on Financial Cryptography and Data Security, FC 2024, which took place inWillemstad, Curaao, during March 48, 2024.
The number of 36 full and 6 short papers included in the proceedings were carefully reviewed and selected from 199 submissions. They were organized in topical sections as follows:
Part I: Consensus; AMMs; fees and rewards; hardware attacks;
Part II: Feeling Optimistic; randomness and time; signatures; applied cryptography; PETS; designing for the real world.
Note: The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
Note
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
People who bought this also bought
[{"item_id":"9311","item_name":"Everyday Cryptography: Fundamental Principles and Applications","item_brand":"Keith Martin","item_category":"Computing & Internet","list":"Product Page","price":"40.60","variant":"","quantity":1},{"item_id":"13018","item_name":"Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings - Security and Cryptology 6061","item_brand":"Nicolas Sendrier","item_category":"Computing & Internet","list":"Product Page","price":"31.49","variant":"","quantity":1},{"item_id":"4493","item_name":"This Is How They Tell Me the World Ends: A True Story","item_brand":"Nicole Perlroth","item_category":"Computing & Internet","list":"Product Page","price":"1.95","variant":"","quantity":1},{"item_id":"9082","item_name":"Handbook of Applied Cryptography - Discrete Mathematics and Its Applications","item_brand":"Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone","item_category":"Computing & Internet","list":"Product Page","price":"88.39","variant":"","quantity":1},{"item_id":"9133","item_name":"Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks","item_brand":"Geoff White","item_category":"Computing & Internet","list":"Product Page","price":"5.28","variant":"","quantity":1},{"item_id":"9809","item_name":"Cryptography For Dummies","item_brand":"Chey Cobb","item_category":"Computing & Internet","list":"Product Page","price":"7.06","variant":"","quantity":1},{"item_id":"9973","item_name":"Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto","item_brand":"Roger A. Grimes","item_category":"Computing & Internet","list":"Product Page","price":"13.96","variant":"","quantity":1},{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Product Page","price":"10.12","variant":"","quantity":1}]