Blockchain technology for secure and smart applications across industry verticals /
Saved in:
Imprint: | Cambridge : Academic Press, 2021. |
---|---|
Description: | 1 online resource. |
Language: | English |
Series: | Advances in computers ; v. 121 Advances in computers ; v. 121. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/12592395 |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | 12592395 | ||
005 | 20210730191233.9 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 210126s2021 mau o 000 0 eng d | ||
019 | |a 1233124728 | ||
020 | |a 9780128219928 |q (electronic bk.) | ||
020 | |a 0128219920 |q (electronic bk.) | ||
020 | |z 9780128219911 | ||
020 | |z 0128219912 | ||
035 | |a (OCoLC)1233008648 |z (OCoLC)1233124728 | ||
035 | 9 | |a (OCLCCM-CC)1233008648 | |
040 | |a YDX |b eng |c YDX |d OPELS |d OCLCO |d EBLCP |d OCLCF | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.B56 | |
245 | 0 | 0 | |a Blockchain technology for secure and smart applications across industry verticals / |c edited by Shubhani Aggarwal, Neeraj Kumar, Pethuru Raj. |
260 | |a Cambridge : |b Academic Press, |c 2021. | ||
300 | |a 1 online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Advances in computers ; |v v. 121 | |
505 | 0 | |a Intro -- The Blockchain Technology for Secure and Smart Applications across Industry Verticals -- Copyright -- Contents -- Contributors -- Preface -- Chapter One: Demystifying the blockchain technology -- 1. Introduction -- 2. The key motivations for the blockchain technology -- 3. Delineating the blockchain technology -- 4. Briefing of the blockchain system elements -- 5. Blockchain consensus algorithms -- 6. Power of work -- 6.1. Advantages of PoW -- 6.2. Disadvantages of PoW -- 6.3. Where POW used? -- 7. Proof of stake -- 8. Delegated proof of stake -- 9. Proof of burn | |
505 | 8 | |a 10. Practical Byzantine fault tolerance -- 11. Blockchain types -- 12. About the bitcoin application of the blockchain technology -- 13. Enterprise blockchain use cases -- 14. The blockchain technology benefits -- 15. The blockchain challenges and concerns -- 16. How blocks and their chains nullify security attacks on blockchain networks -- 17. An efficient cross-organizational information transfer method through blockchain -- 18. The marriage between blockchain, AI, and the IoT -- 19. Conclusion -- Appendix -- A.1. The blockchain frameworks -- Chapter Two: Data structures | |
505 | 8 | |a 1. Primitive data structure -- 1.1. Integers -- 1.2. Float -- 1.3. Characters -- 1.4. Pointers -- 2. Nonprimitive data structure -- 2.1. Arrays -- 2.1.1. Creating an array -- 2.1.2. Adding elements to an array -- 2.1.3. Accessing elements from the array -- 2.1.4. Removing elements from the array -- 2.1.5. Searching element in an array -- 2.1.6. Updating elements in an array -- 2.2. Linked list -- 2.2.1. Linked list insertion -- 2.2.2. Deletion of an element in a linked list -- 2.3. Queue -- 2.3.1. Implement queues using linked list -- 2.3.2. Implement queues using arrays -- 2.4. Stack | |
505 | 8 | |a 2.4.1. Stack implementation using list -- 2.4.2. Stack implementation using queue module -- 2.5. Graphs -- 2.5.1. Creating a graph -- 2.5.2. Display vertices of graph -- 2.5.3. Display edges of graph -- 2.5.4. Adding a vertex to the graph -- 2.5.5. Adding an edge to the graph -- 2.6. Trees -- 2.6.1. Creating a root -- 2.6.2. Inserting a node into tree -- 2.7. Heaps -- 2.7.1. Creating a heap -- 2.7.2. Inserting into heap -- 2.7.3. Removing from heap -- 2.7.4. Replacing in a heap -- 3. Merkle root -- 3.1. Hash function -- 3.2. Applications of Merkle tree -- 4. InterPlanetary file system | |
505 | 8 | |a 4.1. History of IPFS -- 4.2. Nodes of IPFS -- 4.3. Advantages of IPFS -- 4.4. Disadvantages of IPFS -- References -- Chapter Three: Hashes -- 1. SHA-256 or SHA-2 -- 2. Ethash -- 3. Scrypt -- 4. X11 -- 5. Equihash -- 5.1. Properties of Equihash -- 6. RIPEMD-160 -- References -- Chapter Four: Digital signatures -- 1. Digital signatures -- 2. Digital signature algorithm -- 3. Elliptic curve digital signature algorithm -- 4. Edward curve digital signature algorithm -- 5. Difference between EdDSA and ECDSA -- References -- Chapter Five: Signature primitives -- 1. Ring signatures | |
650 | 0 | |a Blockchains (Databases) |0 http://id.loc.gov/authorities/subjects/sh2016002790 | |
650 | 0 | |a Vertical integration |x Technological innovations. | |
650 | 7 | |a Blockchains (Databases) |2 fast |0 (OCoLC)fst01981761 | |
655 | 0 | |a Electronic books. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Aggarwal, Shubhani. | |
700 | 1 | |a Kumar, Neeraj. | |
700 | 1 | |a Raj, Pethuru. | |
776 | 0 | 8 | |i ebook version : |z 9780128219928 |
776 | 0 | 8 | |c Original |z 0128219912 |z 9780128219911 |w (OCoLC)1164493410 |
830 | 0 | |a Advances in computers ; |v v. 121. | |
903 | |a HeVa | ||
929 | |a oclccm | ||
999 | f | f | |i 600bffe7-59d1-5dad-9210-2e22519ab784 |s 3162ca30-2991-53ff-8e32-a517a70aae04 |
928 | |t Library of Congress classification |a QA76.9.B56 |l Online |c UC-FullText |u https://www.sciencedirect.com/science/bookseries/00652458/121 |z Elsevier |g ebooks |i 12583893 |