Cargando…

Blockchain technology for secure and smart applications across industry verticals /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Aggarwal, Shubhani, Kumar, Neeraj, Raj, Pethuru
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge : Academic Press, 2021.
Colección:Advances in computers ; v. 121.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_on1233008648
003 OCoLC
005 20231120010529.0
006 m o d
007 cr |n|||||||||
008 210126s2021 mau o 000 0 eng d
040 |a YDX  |b eng  |e pn  |c YDX  |d OPELS  |d OCLCO  |d EBLCP  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1233124728 
020 |a 9780128219928  |q (electronic bk.) 
020 |a 0128219920  |q (electronic bk.) 
020 |z 9780128219911 
020 |z 0128219912 
035 |a (OCoLC)1233008648  |z (OCoLC)1233124728 
050 4 |a QA76.9.B56 
082 0 4 |a 005.74  |2 23 
245 0 0 |a Blockchain technology for secure and smart applications across industry verticals /  |c edited by Shubhani Aggarwal, Neeraj Kumar, Pethuru Raj. 
260 |a Cambridge :  |b Academic Press,  |c 2021. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in computers ;  |v v. 121 
505 0 |a Intro -- The Blockchain Technology for Secure and Smart Applications across Industry Verticals -- Copyright -- Contents -- Contributors -- Preface -- Chapter One: Demystifying the blockchain technology -- 1. Introduction -- 2. The key motivations for the blockchain technology -- 3. Delineating the blockchain technology -- 4. Briefing of the blockchain system elements -- 5. Blockchain consensus algorithms -- 6. Power of work -- 6.1. Advantages of PoW -- 6.2. Disadvantages of PoW -- 6.3. Where POW used? -- 7. Proof of stake -- 8. Delegated proof of stake -- 9. Proof of burn 
505 8 |a 10. Practical Byzantine fault tolerance -- 11. Blockchain types -- 12. About the bitcoin application of the blockchain technology -- 13. Enterprise blockchain use cases -- 14. The blockchain technology benefits -- 15. The blockchain challenges and concerns -- 16. How blocks and their chains nullify security attacks on blockchain networks -- 17. An efficient cross-organizational information transfer method through blockchain -- 18. The marriage between blockchain, AI, and the IoT -- 19. Conclusion -- Appendix -- A.1. The blockchain frameworks -- Chapter Two: Data structures 
505 8 |a 1. Primitive data structure -- 1.1. Integers -- 1.2. Float -- 1.3. Characters -- 1.4. Pointers -- 2. Nonprimitive data structure -- 2.1. Arrays -- 2.1.1. Creating an array -- 2.1.2. Adding elements to an array -- 2.1.3. Accessing elements from the array -- 2.1.4. Removing elements from the array -- 2.1.5. Searching element in an array -- 2.1.6. Updating elements in an array -- 2.2. Linked list -- 2.2.1. Linked list insertion -- 2.2.2. Deletion of an element in a linked list -- 2.3. Queue -- 2.3.1. Implement queues using linked list -- 2.3.2. Implement queues using arrays -- 2.4. Stack 
505 8 |a 2.4.1. Stack implementation using list -- 2.4.2. Stack implementation using queue module -- 2.5. Graphs -- 2.5.1. Creating a graph -- 2.5.2. Display vertices of graph -- 2.5.3. Display edges of graph -- 2.5.4. Adding a vertex to the graph -- 2.5.5. Adding an edge to the graph -- 2.6. Trees -- 2.6.1. Creating a root -- 2.6.2. Inserting a node into tree -- 2.7. Heaps -- 2.7.1. Creating a heap -- 2.7.2. Inserting into heap -- 2.7.3. Removing from heap -- 2.7.4. Replacing in a heap -- 3. Merkle root -- 3.1. Hash function -- 3.2. Applications of Merkle tree -- 4. InterPlanetary file system 
505 8 |a 4.1. History of IPFS -- 4.2. Nodes of IPFS -- 4.3. Advantages of IPFS -- 4.4. Disadvantages of IPFS -- References -- Chapter Three: Hashes -- 1. SHA-256 or SHA-2 -- 2. Ethash -- 3. Scrypt -- 4. X11 -- 5. Equihash -- 5.1. Properties of Equihash -- 6. RIPEMD-160 -- References -- Chapter Four: Digital signatures -- 1. Digital signatures -- 2. Digital signature algorithm -- 3. Elliptic curve digital signature algorithm -- 4. Edward curve digital signature algorithm -- 5. Difference between EdDSA and ECDSA -- References -- Chapter Five: Signature primitives -- 1. Ring signatures 
650 0 |a Blockchains (Databases) 
650 0 |a Vertical integration  |x Technological innovations. 
650 6 |a Cha�ines de blocs.  |0 (CaQQLa)000300319 
650 6 |a Int�egration verticale  |0 (CaQQLa)201-0129845  |x Innovations.  |0 (CaQQLa)201-0379286 
650 7 |a Blockchains (Databases)  |2 fast  |0 (OCoLC)fst01981761 
700 1 |a Aggarwal, Shubhani. 
700 1 |a Kumar, Neeraj. 
700 1 |a Raj, Pethuru. 
776 0 8 |i Ebook version :  |z 9780128219928 
776 0 8 |i Print version:  |t Blockchain technology for secure and smart applications across industry verticals.  |d Cambridge : Academic Press, 2021  |z 0128219912  |z 9780128219911  |w (OCoLC)1164493410 
830 0 |a Advances in computers ;  |v v. 121. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/bookseries/00652458/121  |z Texto completo