Blockchain technology for secure and smart applications across industry verticals /

Saved in:
Bibliographic Details
Imprint:Cambridge : Academic Press, 2021.
Description:1 online resource.
Language:English
Series:Advances in computers ; v. 121
Advances in computers ; v. 121.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12592395
Hidden Bibliographic Details
Other authors / contributors:Aggarwal, Shubhani.
Kumar, Neeraj.
Raj, Pethuru.
ISBN:9780128219928
0128219920
9780128219911
0128219912
Other form:ebook version : 9780128219928
Original 0128219912 9780128219911

MARC

LEADER 00000cam a2200000Ia 4500
001 12592395
005 20210730191233.9
006 m o d
007 cr |n|||||||||
008 210126s2021 mau o 000 0 eng d
019 |a 1233124728 
020 |a 9780128219928  |q (electronic bk.) 
020 |a 0128219920  |q (electronic bk.) 
020 |z 9780128219911 
020 |z 0128219912 
035 |a (OCoLC)1233008648  |z (OCoLC)1233124728 
035 9 |a (OCLCCM-CC)1233008648 
040 |a YDX  |b eng  |c YDX  |d OPELS  |d OCLCO  |d EBLCP  |d OCLCF 
049 |a MAIN 
050 4 |a QA76.9.B56 
245 0 0 |a Blockchain technology for secure and smart applications across industry verticals /  |c edited by Shubhani Aggarwal, Neeraj Kumar, Pethuru Raj. 
260 |a Cambridge :  |b Academic Press,  |c 2021. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Advances in computers ;  |v v. 121 
505 0 |a Intro -- The Blockchain Technology for Secure and Smart Applications across Industry Verticals -- Copyright -- Contents -- Contributors -- Preface -- Chapter One: Demystifying the blockchain technology -- 1. Introduction -- 2. The key motivations for the blockchain technology -- 3. Delineating the blockchain technology -- 4. Briefing of the blockchain system elements -- 5. Blockchain consensus algorithms -- 6. Power of work -- 6.1. Advantages of PoW -- 6.2. Disadvantages of PoW -- 6.3. Where POW used? -- 7. Proof of stake -- 8. Delegated proof of stake -- 9. Proof of burn 
505 8 |a 10. Practical Byzantine fault tolerance -- 11. Blockchain types -- 12. About the bitcoin application of the blockchain technology -- 13. Enterprise blockchain use cases -- 14. The blockchain technology benefits -- 15. The blockchain challenges and concerns -- 16. How blocks and their chains nullify security attacks on blockchain networks -- 17. An efficient cross-organizational information transfer method through blockchain -- 18. The marriage between blockchain, AI, and the IoT -- 19. Conclusion -- Appendix -- A.1. The blockchain frameworks -- Chapter Two: Data structures 
505 8 |a 1. Primitive data structure -- 1.1. Integers -- 1.2. Float -- 1.3. Characters -- 1.4. Pointers -- 2. Nonprimitive data structure -- 2.1. Arrays -- 2.1.1. Creating an array -- 2.1.2. Adding elements to an array -- 2.1.3. Accessing elements from the array -- 2.1.4. Removing elements from the array -- 2.1.5. Searching element in an array -- 2.1.6. Updating elements in an array -- 2.2. Linked list -- 2.2.1. Linked list insertion -- 2.2.2. Deletion of an element in a linked list -- 2.3. Queue -- 2.3.1. Implement queues using linked list -- 2.3.2. Implement queues using arrays -- 2.4. Stack 
505 8 |a 2.4.1. Stack implementation using list -- 2.4.2. Stack implementation using queue module -- 2.5. Graphs -- 2.5.1. Creating a graph -- 2.5.2. Display vertices of graph -- 2.5.3. Display edges of graph -- 2.5.4. Adding a vertex to the graph -- 2.5.5. Adding an edge to the graph -- 2.6. Trees -- 2.6.1. Creating a root -- 2.6.2. Inserting a node into tree -- 2.7. Heaps -- 2.7.1. Creating a heap -- 2.7.2. Inserting into heap -- 2.7.3. Removing from heap -- 2.7.4. Replacing in a heap -- 3. Merkle root -- 3.1. Hash function -- 3.2. Applications of Merkle tree -- 4. InterPlanetary file system 
505 8 |a 4.1. History of IPFS -- 4.2. Nodes of IPFS -- 4.3. Advantages of IPFS -- 4.4. Disadvantages of IPFS -- References -- Chapter Three: Hashes -- 1. SHA-256 or SHA-2 -- 2. Ethash -- 3. Scrypt -- 4. X11 -- 5. Equihash -- 5.1. Properties of Equihash -- 6. RIPEMD-160 -- References -- Chapter Four: Digital signatures -- 1. Digital signatures -- 2. Digital signature algorithm -- 3. Elliptic curve digital signature algorithm -- 4. Edward curve digital signature algorithm -- 5. Difference between EdDSA and ECDSA -- References -- Chapter Five: Signature primitives -- 1. Ring signatures 
650 0 |a Blockchains (Databases)  |0 http://id.loc.gov/authorities/subjects/sh2016002790 
650 0 |a Vertical integration  |x Technological innovations. 
650 7 |a Blockchains (Databases)  |2 fast  |0 (OCoLC)fst01981761 
655 0 |a Electronic books. 
655 4 |a Electronic books. 
700 1 |a Aggarwal, Shubhani. 
700 1 |a Kumar, Neeraj. 
700 1 |a Raj, Pethuru. 
776 0 8 |i ebook version :  |z 9780128219928 
776 0 8 |c Original  |z 0128219912  |z 9780128219911  |w (OCoLC)1164493410 
830 0 |a Advances in computers ;  |v v. 121. 
903 |a HeVa 
929 |a oclccm 
999 f f |i 600bffe7-59d1-5dad-9210-2e22519ab784  |s 3162ca30-2991-53ff-8e32-a517a70aae04 
928 |t Library of Congress classification  |a QA76.9.B56  |l Online  |c UC-FullText  |u https://www.sciencedirect.com/science/bookseries/00652458/121  |z Elsevier  |g ebooks  |i 12583893