Limit search to available items
Book Cover
E-book

Title Financial cryptography and data security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers / edited by Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff
Published Heidelberg : Springer, 2015

Copies

Description 1 online resource (xii, 309 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 8976
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8976. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro; BITCOIN 2015: Second Workshop on Bitcoin Research; WAHC 2015: Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography; Wearable 2015: First Workshop on Wearable Security and Privacy; Contents; On the Malleability of Bitcoin Transactions; 1 Introduction; 1.1 Possible Fixes to the Bitcoin Malleability Problem; 1.2 Our Contribution; 1.3 Ethical Issues; 2 Bitcoin Description; 3 Experiments; 4 Malleability in Bitcoin Contracts; 4.1 The Deposit Protocol; 4.2 Other Protocols Vulnerable to the Malleability Attack; 5 Our Technique; 5.1 Bitcoin-Based Timed Commitment Scheme
5.2 The Details of Our MethodReferences; Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees; 1 Introduction; 2 Background and Research Questions; 3 Data and Method; 4 Results; 4.1 Trends: Descriptive Analysis; 4.2 Tips: Explaining the Decision to Offer a Fee; 4.3 Tolls: Mining Pools as Gatekeepers; 5 Discussion; 6 Concluding Remarks; References; ZombieCoin: Powering Next-Generation Botnets with Bitcoin; 1 Introduction; 2 Background; 2.1 Botnet C & C Mechanisms; 2.2 Bitcoin; 3 ZombieCoin; 3.1 Inserting C & C Instructions in Transactions; 4 Proof of Concept; 5 Discussion
6 Prior Work7 Conclusion; References; Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work; 1 Introduction; 2 Motivation; 3 Graph-Theoretic Proofs-of-work; 4 Cuckoo Cycle; 5 Cuckoo Hashing; 6 Cycle Detection in Cuckoo Cycle; 7 Union-Find; 8 Cuckoo Cycle Basic Algorithm; 9 Difficulty Control; 10 Edge Trimming; 11 Time-Memory Trade-Offs (TMTOs); 12 Choice of Cycle Length; 13 Parallelization; 14 Choice of Graph Size; 15 Dynamic Sizing; 16 Conclusion; References; When Bitcoin Mining Pools Run Dry; 1 Introduction; 2 Related Work; 3 Model; 3.1 Overview; 3.2 Players; 3.3 Choices
3.4 Consequences4 Model Analysis; 4.1 Steady-State Pool Sizes; 4.2 Steady-State Pool Utilities; 4.3 Peaceful Equilibria; 4.4 One-Sided Attack Equilibria; 5 Numerical Illustrations; 5.1 The Peaceful Equilibrium; 5.2 One-Sided Attack Equilibria; 6 Conclusion and Future Work; References; Issues in Designing a Bitcoin-like Community Currency; Abstract; 1 Background; 1.1 Cryptocurrencies; 2 Community Cryptocurrency Features; 2.1 Mining; 2.2 Geofencing; 2.3 Privileged Transactions; 2.4 Demurrage; 2.5 The Community Loan Fund; 2.5.1 Adding to the Community Fund
2.5.2 Disbursing from the Community Fund3 Challenges with a Cryptocurrency Community Fund; 3.1 Identity; 3.2 Voting; 3.3 Loan Regulation; 4 Vulnerability Assessment; 4.1 STRIDE Framework; 4.2 The Vulnerability Matrix; 4.3 Mitigations; 5 Conclusion and Future Research; References; The Bitcoin Market Potential Index; References; Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions; 1 Introduction; 2 Our Process; 3 Background: Bitcoin and Crypto Currencies; 4 Analysis of Relevant Legal Contexts; 5 Tech-Policy Issues for Crypto Currencies
Summary This book constitutes the refereed proceedings of three workshops held at the 19th International Conference on Financial Cryptography and Data Security, FC 2015, in San Juan, Puerto Rico, in January 2015. The 22 full papers presented were carefully reviewed and selected from 39 submissions. They feature the outcome of the Second Workshop on Bitcoin Research, BITCOIN 2015, the Third Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2015, and the First Workshop on Wearable Security and Privacy, Wearable 2015
Notes Includes author index
English
Online resource; title from PDF title page (SpringerLink, viewed September 11, 2015)
Subject Data encryption (Computer science) -- Congresses
Computer security -- Congresses
User-centered system design -- Congresses
Data encryption.
Business applications.
Public administration.
Information architecture.
Computer security.
Computers -- Security -- General.
Computers -- Electronic Commerce.
Computers -- Data Processing.
Business & Economics -- Information Management.
Computer security
Data encryption (Computer science)
User-centered system design
Genre/Form Conference papers and proceedings
Form Electronic book
Author Brenner, Michael (Computer scientist), editor.
Christin, Nicolas, editor.
Johnson, Benjamin, editor
Rohloff, Kurt, editor
BITCOIN (Workshop) (2nd : 2015 : San Juan, P.R.)
WAHC (Workshop) (3rd : 2015 : San Juan, P.R.)
Wearable (Workshop) (1st : 2015 : San Juan, P.R.)
FC (Conference) (19th : 2015 : San Juan, P.R.)
ISBN 9783662480519
3662480514
3662480506
9783662480502
Other Titles FC 2015