Limit search to available items
1774 results found. sorted by date .
Book Cover
E-book
Author Garg, Rishabh

Title Blockchain for Real World Applications
Published Newark : John Wiley & Sons, Incorporated, 2023
©2023

Copies

Description 1 online resource (415 pages)
Contents Intro -- Blockchain for Real World Applications -- Contents -- Illustrations -- Foreword -- Preface -- 1 Introduction -- 2 Distributed Ledger Technology -- 2.1 Different Types of Distributed Ledger Technology -- 2.1.1 Blockchain -- 2.1.2 Directed Acyclic Graph -- 2.1.3 Hashgraph -- 2.1.4 Holochain -- 2.1.5 Tempo (Radix) -- 2.2 Chronological Evolution -- 2.2.1 Blockchain 1.0 -- 2.2.2 Blockchain 2.0 -- 2.2.3 Blockchain 3.0 -- 2.2.4 Blockchain 4.0 -- 2.3 Blockchain Architecture -- 2.3.1 Block -- 2.3.2 Hash Function -- 2.3.3 Encryption -- 2.3.3.1 Problems -- 2.3.4 Keys: Public and Private -- 2.3.5 Decentralized Identifier -- 3 Blockchain Ecosystem -- 3.1 Working of Blockchain -- 3.2 Key Characteristics -- 3.2.1 Decentralization -- 3.2.2 Persistence -- 3.2.3 Anonymity -- 3.2.4 Auditability -- 3.3 Unspent Transaction Output -- 3.4 Classification of Blockchain on Access Management -- 3.4.1 Public Blockchain -- 3.4.2 Private Blockchain -- 3.4.3 Consortium Blockchain -- 3.5 Consensus -- 3.5.1 Proof-of-Work -- 3.5.2 Proof-of-Stake -- 3.5.3 Peercoin -- 3.5.4 Practical Byzantine Fault Tolerance -- 3.5.5 Delegated Proof-of-Stake -- 3.5.6 Ripple -- 3.5.7 Tendermint -- 3.5.8 Consensus Algorithms: A Comparison -- 3.5.8.1 Node Identity Management -- 3.5.8.2 Energy Saving -- 3.5.8.3 Tolerated Power of Adversary -- 3.5.9 Advances in Consensus Algorithms -- 3.6 Payment Verification in Blockchain -- 3.6.1 Simple Payment Verification -- 3.6.1.1 Key Features -- 3.6.2 Full Payment Verification -- 3.6.2.1 Key Features -- 3.7 Hashgraph -- 3.7.1 Elements of Hashgraph -- 3.7.2 Diagrammatic Representation -- 3.7.3 How Does Hashgraph Work? -- 3.8 Scalability -- 4 Transactions in Bitcoin Blockchain -- 4.1 Coinbase Transactions -- 4.1.1 Structure -- 4.1.2 Key Features of Coinbase Transactions -- 4.1.3 Computation of Transaction Value -- 4.2 Transactions Involving Fiat Currency
4.2.1 Cryptocurrency Exchanges -- 4.2.2 Bitcoin Debit Card -- 4.2.3 Bitcoin ATMs -- 4.2.4 Metal Pay -- 4.2.5 Peer-to-Peer Exchanges -- 4.3 Top Fiat Currencies for Bitcoin Transactions -- 4.3.1 US Dollar -- 4.3.2 Japanese Yen -- 4.3.3 Euro -- 4.3.4 Korean Won -- 4.3.5 Chinese Yuan -- 4.3.6 Indian National Rupee -- 4.4 Price Determination for Bitcoin in Transactions -- 4.4.1 Cost of Mining Bitcoin -- 4.4.2 Market Supply and Demand -- 4.4.3 Bitcoin Rewards -- 4.4.4 Exchanges -- 4.4.5 Competing Cryptocurrencies -- 4.4.6 Regulatory Provisions -- 4.4.7 Internal Governance -- 4.4.8 Value of Bitcoin -- 4.4.9 Can the Bitcoin Price Be Zero? -- 4.4.10 Why Is Bitcoin's Price Volatile? -- 4.5 Controlling Transaction Costs in Bitcoin -- 4.5.1 History of Bitcoin Cash -- 4.5.2 Concerns about Bitcoin Cash -- 4.5.3 Bitcoin Cash Core Features -- 4.5.4 Utility of Bitcoin Cash -- 4.5.5 Advancements over Bitcoin -- 4.5.5.1 Maximum Block Size -- 4.5.5.2 Cost Efficiency -- 4.5.5.3 Smart Contract Support -- 4.5.5.4 Issue of Token -- 4.5.5.5 Nonfungible Tokens -- 4.5.5.6 No Replacement-by-Fee -- 4.5.5.7 Schnorr Signatures -- 4.5.5.8 Difficulty Adjustment Algorithm -- 4.5.6 Bitcoin Cash -- Ease of Use -- 4.5.7 Challenges to Bitcoin Cash -- 5 Ethereum and Hyperledger Fabric -- 5.1 Early Attempts to Program Cryptocurrencies -- 5.2 Smart Contracts -- 5.3 Working of Ethereum -- 5.3.1 Gas -- 5.3.2 Ether -- 5.4 Hyperledger -- 5.5 Working of Hyperledger -- 5.5.1 Components -- 5.5.2 Workflow -- 5.5.2.1 Proposal -- 5.5.2.2 Endorsement -- 5.5.2.3 Transmission to Ordering Service -- 5.5.2.4 Updating the Ledger -- 5.5.3 Industrial Applications of Hyperledger Fabric -- 5.5.3.1 Production -- 5.5.3.2 B2B Contract -- 5.5.3.3 Supply Chain -- 5.5.3.4 Asset Depository -- 5.5.3.5 Trading and Asset Transfer -- 5.5.3.6 Insurance -- 5.5.3.7 Real Estate -- 5.5.4 Benefits of Hyperledger Fabric
5.5.4.1 Open Source -- 5.5.4.2 Private and Confidential -- 5.5.4.3 Access Control -- 5.5.4.4 Chaincode Functionality -- 5.5.4.5 Performance -- 5.5.4.6 Modular Design -- 5.6 Ethereum Versus Hyperledger -- 5.6.1 Purpose -- 5.6.2 Cryptocurrency -- 5.6.3 Participation -- 5.6.4 Privacy -- 5.6.5 Governance -- 5.6.6 Computer Code -- 5.6.7 Smart Contracts -- 5.6.8 Consensus Mechanism -- 5.6.9 Rate of Transactions -- 5.6.10 Use-cases -- 5.7 Decentralized Applications -- 5.7.1 Merits of Decentralized Applications -- 5.7.1.1 Zero Downtime -- 5.7.1.2 Privacy -- 5.7.1.3 Resistance to Censorship -- 5.7.1.4 Absolute Data Integrity -- 5.7.2 Demerits of Decentralized Applications -- 5.7.2.1 Maintenance -- 5.7.2.2 Performance Overhead -- 5.7.2.3 Network Congestion -- 5.7.2.4 User Experience -- 5.7.2.5 Centralization -- 5.8 Tokens -- 6 Identity as a Panacea for the Real World -- 6.1 Identity Systems -- 6.1.1 Contemporary ID Systems -- 6.2 Centralized Model -- 6.2.1 A Case Study of World's Largest Biometric ID System -- Aadhaar -- 6.2.1.1 Salient Features of Aadhaar -- 6.2.1.2 Biometric and Demographic Standards -- 6.2.1.3 Enrollment Set-up -- 6.2.1.4 Entities and Their Roles -- 6.2.1.5 Process of Authentication -- 6.2.1.6 Budget and Outlay -- 6.2.1.7 Enrollment Status and Saturation -- 6.3 Cost and Benefits -- 6.3.1 Merits -- 6.3.2 Demerits -- 6.3.2.1 Waste of Resources -- 6.3.2.2 Lack of Neutrality -- 6.3.2.3 Technical Glitches -- 6.3.2.4 Security Procedures -- 6.3.2.5 Unauthorized Access -- 6.3.2.6 Absence of Data Protection Act -- 6.3.2.7 Involvement of Private Players -- 6.3.2.8 Freedom of Choice as an Illusion -- 6.3.2.9 Implicit Coercion -- 6.4 Quest for One World -- One Identity -- 7 Decentralized Identities -- 7.1 Identity Models -- 7.1.1 Centralized Identity -- 7.1.2 Federated Identity -- 7.1.3 User-centric Identity -- 7.1.4 Self-sovereign Identity
7.2 Blockchain-based Solutions -- 7.3 Identity Management -- 7.3.1 Current Challenges -- 7.3.1.1 Absence of Compatibility -- 7.3.1.2 Identity Theft -- 7.3.1.3 KYC Onboarding and Weak Authentication Protocols -- 7.3.1.4 Lack of Control -- 7.4 Identity Storage | Interplanetary File System -- 7.4.1 How Does IPFS Access the Documents? -- 7.4.2 Transactions Involved in Accessing Documents on IPFS -- 7.4.3 IPFS Commands -- 7.5 Biometric Solutions -- 7.5.1 Fingerprint Verification -- 7.5.2 Iris Scan -- 7.5.3 Vascular Technology -- 7.5.4 Palm Vein Pattern -- 7.5.5 Facial Recognition -- 7.5.1.1 Verification of Government ID -- 7.5.1.2 Verification of a User -- 7.5.1.3 Creation of a Digital ID -- 7.5.2 System Overview -- 7.5.2.1 Identify Creator -- 7.5.2.2 Identity User -- 7.5.2.3 Identity Manager -- 7.5.2.4 Identity Device -- 7.5.3 Blockchain Identity Protocol -- 7.5.3.1 Creation of Digital ID -- 7.5.3.2 Use of Digital ID -- 7.5.3.3 Digital ID Management -- 7.5.4 Security Audit -- 7.5.4.1 Binding -- 7.5.4.2 Privacy -- 7.5.5 Authentication Protocol -- 7.6 Identity Access -- 7.6.1 Identity Encryption -- 7.6.2 Zero Knowledge Proof -- 7.6.3 Revocation -- 7.7 Merits of a Proposed System -- 7.7.1 Seamless Navigation -- 7.7.2 Accessibility -- 7.7.3 Easy and Secure -- 7.7.4 Decentralized Public Key Infrastructure -- 7.7.5 Decentralized Storage -- 7.7.6 Manageability and Control -- 7.7.7 Data Portability -- 7.7.8 Prevention of Identity Theft -- 7.8 Disadvantages of the Proposed System -- 7.8.1 Privacy Leakage -- 7.8.2 Selfish Mining -- 7.8.3 Admin Conflicts -- 7.9 Challenges -- 7.9.1 Storage Optimization and Redesign -- 7.9.2 Privacy Protection -- 7.9.3 Random Beacons and Timestamps -- 7.10 Solutions with Hyperledger Fabric -- 7.10.1 Warning Pointers -- 7.10.2 Safety Protocols -- 8 Encryption and Cybersecurity -- 8.1 Cryptography
8.1.1 Different Types of Cryptography -- 8.1.1.1 Symmetric Key Cryptography -- 8.1.1.2 Asymmetric Key Cryptography -- 8.1.1.3 Hash Functions -- 8.1.2 Cryptographic Schemes -- 8.1.2.1 Simple Substitution Cipher -- 8.1.2.2 Caesar Cipher -- 8.1.2.3 Vigenère Cipher -- 8.1.2.4 Transposition Cipher -- 8.2 Playfair Cipher -- 8.2.1 Encryption Algorithm -- 8.2.1.1 Step 1 -- Generate Squares (5 * 5) -- 8.2.1.2 Step 2 -- Algorithm to Encrypt Plaintext -- 8.2.2 Decryption Algorithm -- 8.2.2.1 Step 1 -- Generate Squares (5 * 5) -- 8.2.2.2 Step 2 -- Algorithm to Decrypt the Ciphertext -- 8.2.3 Advantages and Disadvantages -- 8.2.3.1 Advantages -- 8.2.3.2 Disadvantages -- 8.3 Hill Cipher -- 8.3.1 Substitution Scheme -- 8.3.1.1 Encryption -- 8.3.1.2 Decryption -- 8.4 RSA Algorithm in Cryptography -- 8.4.1 Working Mechanism -- 8.4.1.1 Generating the Public Key -- 8.4.1.2 Generating a Private Key -- 8.5 Multiple Precision Arithmetic Library -- 8.5.1 GNU Multiple Precision Arithmetic Library -- 8.5.2 RSA Algorithm Implementation Using GMP Library -- 8.5.3 Weak RSA Decryption with Chinese Remainder Theorem -- 8.6 SHA-512 Hash in Java -- 8.7 Cybersecurity -- 8.7.1 Common Cyberattacks -- 8.7.1.1 Denial-of-Service Attacks -- 8.7.1.2 Malware -- 8.7.1.3 Man-in-the-Middle Attack -- 8.7.1.4 Phishing -- 8.7.1.5 Structured Language Query Injection -- 8.7.1.6 Latest Cyberthreats -- 8.7.2 Key Cybersecurity Features -- 8.7.3 Blockchain for Cybersecurity -- 8.7.4 Pros and Cons of Blockchain in Cybersecurity -- 8.7.4.1 Pros -- 8.7.4.2 Cons -- 8.7.5 Real-world Examples -- 8.7.5.1 Australian Government -- 8.7.5.2 Barclays -- 8.7.5.3 Chinese Military -- 8.7.5.4 Cisco -- 8.7.5.5 Coinbase -- 8.7.5.6 Colorado State -- 8.7.5.7 Founders Bank -- 8.7.5.8 Health Linkage -- 8.7.5.9 JP Morgan -- 8.7.5.10 Mobile Coin -- 8.7.5.11 Philips Healthcare -- 8.7.5.12 Santander Bank -- 8.7.5.13 Wall Street
Summary "Distributed Ledger Technology (DLT) is a technical infrastructure and protocol that allows simultaneous access, verification and updating of records in an irreversible manner over a network spanning multiple entities or locations. It can be a Blockchain, Directed Acylic Graph, Hashgraph, Holochain or Tempo (radix). The blockchain ecosystem includes blocks - the data structure used to keep records of transactions, which are distributed among all nodes in the network, and nodes - users or computers that hold a complete copy of the record or ledger. Blockchain uses an asymmetric cryptography mechanism to validate the authenticity of transactions. The hash function used here is a mathematical algorithm that converts any information into a string of alphanumeric values by a process called encryption. There are mainly two types of encryption - asymmetric encryption and symmetric encryption depending on whether same or different keys are used for encryption and decryption. Decentralized identifiers (DID) allow unique, private and secure peer-to-peer connections between two parties on a blockchain. DIDs are independent of centralized registries, authorities or identity providers, which enable identity-owner control and sovereignty over identities. There have been several innovations around blockchain consensus mechanisms, constitutional design, development of smart contracts, and tokens. Earlier, applications were mainly restricted to digital currencies, which were used in commercial transactions. The extension of Blockchain 2.0 applications enabled smart-contracts, Decentralized Applications (dApps), and Decentralized Autonomous Organizations (DAOs). Blockchain 3.0 was able to register its presence in areas such as education, health, science, transportation and logistics, and now Blockchain 4.0 is evolving as a business-friendly ecosystem for the world of commons."-- Provided by publisher
Notes 9 Data Management
Includes index
Description based on publisher supplied metadata and other sources
Subject Blockchains (Databases)
Electronic funds transfers.
Blockchains (Databases)
Electronic funds transfers
Form Electronic book
ISBN 1119903769
9781119903765
1119903750
9781119903758
1119903742
9781119903741