Blockchains Blockchains
Advances in Information Security

Blockchains

A Handbook on Fundamentals, Platforms and Applications

Sushmita Ruj and Others
    • £199.99
    • £199.99

Publisher Description

This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptography. Consensus algorithms that form the basic backbone of blockchain protocols are presented. Various cryptographic tools like hash functions, digital signatures and commitment schemes are also introduced. Advanced cryptographic techniques such as zero knowledge protocols, secret sharing, verifiable random functions that are used for privacy-preserving and secure design are discussed. 
The second part of this handbook consists of popular blockchain designs and platforms. Architecture of Bitcoin, Ethereum, Monero, Tendermint and Algorand have been presented. Various important issues like scalability and security are discussed in the third part. Security design challenges, security vulnerabilities and their analysis are discussed. The final part of this handbook discusses various applications of blockchains. These include supply-chain, identity and credential management, Internet of Things (IoT), data-sharing, e-voting, e-governance, e-health, smart cities, and Industry 4.0. Research challenges and directions of future work are included in this handbook.
This comprehensive reference targets students and researchers, who are starting to explore blockchain. Professionals working in blockchain security and applications will find this handbook to be a valuable reference.

GENRE
Computing & Internet
RELEASED
2024
7 March
LANGUAGE
EN
English
LENGTH
633
Pages
PUBLISHER
Springer International Publishing
SIZE
49.4
MB
Information Security and Privacy Information Security and Privacy
2021
Progress in Cryptology – INDOCRYPT 2019 Progress in Cryptology – INDOCRYPT 2019
2019
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber Denial, Deception and Counter Deception Cyber Denial, Deception and Counter Deception
2015
Insider Attack and Cyber Security Insider Attack and Cyber Security
2008
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024