Blockchains Blockchains
Advances in Information Security

Blockchains

A Handbook on Fundamentals, Platforms and Applications

Sushmita Ruj and Others
    • 249,99 €
    • 249,99 €

Publisher Description

This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptography. Consensus algorithms that form the basic backbone of blockchain protocols are presented. Various cryptographic tools like hash functions, digital signatures and commitment schemes are also introduced. Advanced cryptographic techniques such as zero knowledge protocols, secret sharing, verifiable random functions that are used for privacy-preserving and secure design are discussed. 
The second part of this handbook consists of popular blockchain designs and platforms. Architecture of Bitcoin, Ethereum, Monero, Tendermint and Algorand have been presented. Various important issues like scalability and security are discussed in the third part. Security design challenges, security vulnerabilities and their analysis are discussed. The final part of this handbook discusses various applications of blockchains. These include supply-chain, identity and credential management, Internet of Things (IoT), data-sharing, e-voting, e-governance, e-health, smart cities, and Industry 4.0. Research challenges and directions of future work are included in this handbook.
This comprehensive reference targets students and researchers, who are starting to explore blockchain. Professionals working in blockchain security and applications will find this handbook to be a valuable reference.

GENRE
Computing & Internet
RELEASED
2024
7 March
LANGUAGE
EN
English
LENGTH
633
Pages
PUBLISHER
Springer International Publishing
PROVIDER INFO
Springer Science & Business Media LLC
SIZE
49.4
MB
Information Security and Privacy Information Security and Privacy
2021
Progress in Cryptology – INDOCRYPT 2019 Progress in Cryptology – INDOCRYPT 2019
2019
Biometric User Authentication for IT Security Biometric User Authentication for IT Security
2005
Intrusion Detection and Correlation Intrusion Detection and Correlation
2005
The Austin Protocol Compiler The Austin Protocol Compiler
2006
Impacts and Risk Assessment of Technology for Internet Security Impacts and Risk Assessment of Technology for Internet Security
2006
Security in E-Learning Security in E-Learning
2006
Hop Integrity in the Internet Hop Integrity in the Internet
2006