000 | 05103nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-031-32146-7 | ||
003 | DE-He213 | ||
005 | 20240730171505.0 | ||
007 | cr nn 008mamaa | ||
008 | 240307s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031321467 _9978-3-031-32146-7 |
||
024 | 7 |
_a10.1007/978-3-031-32146-7 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aBlockchains _h[electronic resource] : _bA Handbook on Fundamentals, Platforms and Applications / _cedited by Sushmita Ruj, Salil S. Kanhere, Mauro Conti. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2024. |
|
300 |
_aVIII, 625 p. 195 illus., 98 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Information Security, _x2512-2193 ; _v105 |
|
505 | 0 | _aTen Myths About Blockchain Consensus -- Cryptographic Primitives in Blockchain -- Bitcoin Blockchain System: An Overview of Security and Privacy Aspects -- The Ethereum Blockchain: Implementation and Security Aspects -- The Future Ring Confidential Transaction Protocols for Privacy-Preserving Blockchain -- Algorand Blockchain -- Tendermint -- The Security of Delegated Proof of Stake Wallet and Stake Pools -- Layer-2 Scalability Solutions for Blockchains -- Illicit Blockchain Content - Its Different Shapes, Consequences, and Remedies -- Blockchain-based Distributed and Secure Digital Forensic Investigation Systems -- Supply Chain Management Using Blockchain -- Blockchain Technology for E-Governance Applications -- When Blockchain meets Smart Cities: Opportunities, Security and Future Research -- Decentralised Identity Management and Blockchains: Design Patterns and Architectures -- From Centralized to Decentralized Remote Electronic Voting -- Blockchain Technology Accelerating Industry 4.0 -- Blockchain for Health Data Management -- Supporting Secure Trusted Manufacturing via Blockchain -- Blockchain for Data Sharing. | |
520 | _aThis handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptography. Consensus algorithms that form the basic backbone of blockchain protocols are presented. Various cryptographic tools like hash functions, digital signatures and commitment schemes are also introduced. Advanced cryptographic techniques such as zero knowledge protocols, secret sharing, verifiable random functions that are used for privacy-preserving and secure design are discussed. The second part of this handbook consists of popular blockchain designs and platforms. Architecture of Bitcoin, Ethereum, Monero, Tendermint and Algorand have been presented. Various important issues like scalability and security are discussed in the third part. Security design challenges, security vulnerabilities and their analysis are discussed. The final part of this handbook discusses various applications of blockchains. These include supply-chain, identity and credential management, Internet of Things (IoT), data-sharing, e-voting, e-governance, e-health, smart cities, and Industry 4.0. Research challenges and directions of future work are included in this handbook. This comprehensive reference targets students and researchers, who are starting to explore blockchain. Professionals working in blockchain security and applications will find this handbook to be a valuable reference. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection _xLaw and legislation. _923450 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aPrivacy. _935098 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aRuj, Sushmita. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998841 |
|
700 | 1 |
_aKanhere, Salil S. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998842 |
|
700 | 1 |
_aConti, Mauro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998844 |
|
710 | 2 |
_aSpringerLink (Online service) _998847 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031321450 |
776 | 0 | 8 |
_iPrinted edition: _z9783031321474 |
776 | 0 | 8 |
_iPrinted edition: _z9783031321481 |
830 | 0 |
_aAdvances in Information Security, _x2512-2193 ; _v105 _998848 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-32146-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87620 _d87620 |