000 07379cam a2200673 i 4500
001 on1345465671
003 OCoLC
005 20240523125544.0
006 m o d
007 cr cnu---unuuu
008 220831t20232023njua ob 001 0 eng
010 _a 2022041347
040 _aDLC
_beng
_erda
_cDLC
_dOCLCF
_dDG1
_dORMDA
_dYDX
_dUKMGB
_dN$T
_dOCLCQ
_dIEEEE
_dOCLCO
_dOCLCA
015 _aGBC395288
_2bnb
016 7 _a021049390
_2Uk
019 _a1381122837
020 _a9781119903765
_qelectronic book
020 _a1119903769
_qelectronic book
020 _a9781119903741
_qelectronic book
020 _a1119903742
_qelectronic book
020 _a1119903750
_qelectronic book
020 _a9781119903758
_q(electronic bk.)
020 _z9781119903734
_qhardcover
024 7 _a10.1002/9781119903765
_2doi
029 1 _aAU@
_b000072775036
029 1 _aUKMGB
_b021049390
035 _a(OCoLC)1345465671
_z(OCoLC)1381122837
037 _a9781119903734
_bO'Reilly Media
037 _a10214694
_bIEEE
042 _apcc
050 0 4 _aQA76.9.B56
_bG37 2023
072 7 _aCOM
_x004000
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
082 0 0 _a005.74
_223/eng/20220920
049 _aMAIN
100 1 _aGarg, Rishabh,
_eauthor.
245 1 0 _aBlockchain for real world applications /
_cRishabh Garg.
264 1 _aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc.,
_c2023.
264 4 _c�2023
300 _a1 online resource (xxviii, 385 pages) :
_billustrations (some color)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"Distributed Ledger Technology (DLT) is a technical infrastructure and protocol that allows simultaneous access, verification and updating of records in an irreversible manner over a network spanning multiple entities or locations. It can be a Blockchain, Directed Acylic Graph, Hashgraph, Holochain or Tempo (radix). The blockchain ecosystem includes blocks - the data structure used to keep records of transactions, which are distributed among all nodes in the network, and nodes - users or computers that hold a complete copy of the record or ledger. Blockchain uses an asymmetric cryptography mechanism to validate the authenticity of transactions. The hash function used here is a mathematical algorithm that converts any information into a string of alphanumeric values by a process called encryption. There are mainly two types of encryption - asymmetric encryption and symmetric encryption depending on whether same or different keys are used for encryption and decryption. Decentralized identifiers (DID) allow unique, private and secure peer-to-peer connections between two parties on a blockchain. DIDs are independent of centralized registries, authorities or identity providers, which enable identity-owner control and sovereignty over identities. There have been several innovations around blockchain consensus mechanisms, constitutional design, development of smart contracts, and tokens. Earlier, applications were mainly restricted to digital currencies, which were used in commercial transactions. The extension of Blockchain 2.0 applications enabled smart-contracts, Decentralized Applications (dApps), and Decentralized Autonomous Organizations (DAOs). Blockchain 3.0 was able to register its presence in areas such as education, health, science, transportation and logistics, and now Blockchain 4.0 is evolving as a business-friendly ecosystem for the world of commons."--
_cProvided by publisher.
588 _aDescription based on online resource; title from digital title page (viewed on April 17, 2023).
505 0 _aIllustrations xix -- Foreword xxv -- Preface xxvii -- 1 Introduction 1 -- 2 Distributed Ledger Technology 11 -- 2.1 Different Types of Distributed Ledger Technology 11 -- 2.2 Chronological Evolution 13 -- 2.3 Blockchain Architecture 15 -- 3 Blockchain Ecosystem 23 -- 3.1 Working of Blockchain 24 -- 3.2 Key Characteristics 29 -- 3.3 Unspent Transaction Output 30 -- 3.4 Classification of Blockchain on Access Management 30 -- 3.5 Consensus 32 -- 3.6 Payment Verification in Blockchain 37 -- 3.7 Hashgraph 39 -- 3.8 Scalability 40 -- 4 Transactions in Bitcoin Blockchain 43 -- 4.1 Coinbase Transactions 43 -- 4.2 Transactions Involving Fiat Currency 47 -- 4.3 Top Fiat Currencies for Bitcoin Transactions 50 -- 4.4 Price Determination for Bitcoin in Transactions 51 -- 4.5 Controlling Transaction Costs in Bitcoin 57 -- 5 Ethereum and Hyperledger Fabric 67 -- 5.1 Early Attempts to Program Cryptocurrencies 68 -- 5.2 Smart Contracts 69 -- 5.3 Working of Ethereum 72 -- 5.4 Hyperledger 74 -- 5.5 Working of Hyperledger 74 -- 5.6 Ethereum Versus Hyperledger 79 -- 5.7 Decentralized Applications 81 -- 5.8 Tokens 84 -- 6 Identity as a Panacea for the Real World 87 -- 6.1 Identity Systems 87 -- 6.2 Centralized Model 92 -- 6.3 Cost and Benefits 100 -- 6.4 Quest for One World – One Identity 108 -- 7 Decentralized Identities 115 -- 7.1 Identity Models 115 -- 7.2 Block chain-based Solutions 117 -- 7.3 Identity Management 119 -- 7.4 Identity Storage Interplanetary File System 121 -- 7.5 Biometric Solutions 130 -- 7.6 Identity Access 139 -- 7.7 Merits of a Proposed System 141 -- 7.8 Disadvantages of the Proposed System 144 -- 7.9 Challenges 145 -- 7.10 Solutions with Hyperledger Fabric 146 -- 8 Encryption and Cybersecurity 151 -- 8.1 Cryptography 151 -- 8.2 Playfair Cipher 153 -- 8.3 Hill Cipher 167 -- 8.4 RSA Algorithm in Cryptography 171 -- 8.5 Multiple Precision Arithmetic Library 175 -- 8.6 SHA-512 Hash in Java 180 -- 8.7 Cybersecurity 183 -- 9 Data Management 193 -- 9.1 Data Science 193 -- 9.2 Education and Employment Verification 194 -- 9.3 Health Care 204 -- 9.4 Genomics 210 -- 9.5 Food Supply Chain 211 -- 9.6 Real Estate 213 -- 9.7 Crowd Operations 216 -- 10 Banking and Finance 227 -- 10.1 Banking and Investment 227 -- 10.2 Trade Finance 236 -- 10.3 Auction Process 248 -- 10.4 Decentralized Finance 263 -- 10.5 Prediction Markets 286 -- 11 Growing Landscape of Blockchain 297 -- 11.1 Blockchain Applications in Real World: An Overview 297 -- 11.2 e-Governance 297 -- 11.3 Supply Chain Management 305 -- 11.4 e-Commerce 310 -- 11.5 Distributed Resources and Internet of Things 317 -- 11.6 Decentralized Streaming 320 -- 12 Functional Mechanism 329 -- 12.1 Software Requirements 329 -- 12.2 Installing a Mobile Application 330 -- 12.3 Fetching or Uploading the Documents 331 -- 12.4 Government or Third-party Access 335 -- 12.5 Credibility Through Smart Contracts 336 -- 12.6 User-Optimized Features 337 -- Appendices 339 -- Glossary 347 -- Index 371.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aBlockchains (Databases)
650 0 _aElectronic funds transfers.
650 6 _aCha�ines de blocs.
650 6 _aTransferts �electroniques de fonds.
650 7 _aBlockchains (Databases)
_2fast
650 7 _aElectronic funds transfers
_2fast
776 0 8 _iPrint version:
_aGarg, Rishabh.
_tBlockchain for real world applications
_dHoboken, New Jersey : John Wiley & Sons, 2023
_z9781119903734
_w(DLC) 2022041346
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119903765
938 _aEBSCOhost
_bEBSC
_n3507063
994 _a92
_bINLUM
999 _c12919
_d12919