Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
The rapid development and widespread application of blockchain technology have led to a diverse and heterogeneous blockchain ecosystem. Independent operations, resembling isolated data islands, increase the difficulty of data exchange among blockchains. Cross-chain technology has emerged to connect independent blockchains, facilitating asset transfer and information interaction. As a promising new technology, cross-chain solutions with strong interoperability have garnered attention from both academia and industry. However, cross-chain financial incidents have exposed significant information leakage and property loss, highlighting the need for regulation and privacy in cross-chain environments. The lack of uniformity in cross-chain architecture and the use of common plain-format transactions increase the difficulty of both regulation and privacy preservation.
This book, for the first time, explores the challenges and solutions related to cross-chain regulation and privacy. We provide a comprehensive understanding of how to design full life-cycle regulation mechanisms, from multi-dimensional detection to efficient provenance tracking, and lightweight privacy-preserving mechanisms. Additionally, we discuss how to balance regulation and privacy in cross-chain environments.
This book will be of particular interest to researchers in the fields of blockchain, privacy concerns, and network security. It is the first book to comprehensively summarize cross-chain architecture and classification, analyze security challenges and potential requirements, and present numerous innovative technologies and practical solutions for regulation and privacy.
Peng Jiang is the associate professor at the School of Cyberspace Science and Technology of Beijing Institute of Technology. Her research interests include blockchain technology and information security. She has served as an associated editor for Computer Standards and Interfaces, a guest editor for many international journals and a program commitee member for many international conferences. She also serves as the co-chair of SIG for IEEE TEMS's TC on Blockchain and Distributed Ledger Technologies. In the past five years, she as PI has led more than 10 research projects about blockchain.
Liehuang Zhu is the professor and dean at the School of Cyberspace Science and Technology of Beijing Institute of Technology. His research interests include blockchain, network security, and cloud computing. His research has been supported by more than 20 national/provincial level projects and has been granted three provincial/ministerial level science and technology awards. He also serves as an expert of the National Science and Technology Innovation 2030 "Cyberspace Security" Major Project Guidelines Compilation Group, a director of the Blockchain Committee of the China Computer Society, and a director of the Blockchain Working Committee of the Information Technology New Engineering Science Alliance.
Chapter 1: Introduction.- Chapter 2: Foundations.- Chapter 3: Cross-chain Abnormal Account Detection.- Chapter 4: Cross-chain Network Anomaly Detection.- Chapter 5: Cross-chain Traffic Anomaly Detection.- Chapter 6: Cross-chain Provenance Tracking.- Chapter 7: Generic Privacy-aware Cross-chain Framework.- Chapter 8: Lightweight Cross-chain Privacy Preserving Protocol.- Chapter 9: Balance of Regulation and Privacy for Cross-chain Transactions.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.