In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more moder
Blockchains for Network Security: Principles, technologies and applications (Computing and Networks)
โ Scribed by Haojun Huang
- Tongue
- English
- Leaves
- 336
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Contents
About the editors
1. Introduction to blockchains | Haojun Huang, Jialin Tian, Geyong Min and Wang Miao
1.1 Overview
1.2 Structure of block and chain
1.3 Key technologies involved in blockchain
1.4 Evolution
References
2. Blockchain system architecture, applications and research issues | Wang Miao, Geyong Min, Haojun Huang and Haozhe Wang
2.1 System architecture
2.2 Conclusion
References
3. Blockchain consensuses and incentives | Meijun Li, Gaoyang Liu, Jialin Tian, Chen Wang, Yang Yang and Shaohua Wan
3.1 Blockchain consensuses
3.2 Consensus comparison
3.3 Incentives and consensus
3.4 Conclusions and future directions
References
4. Blockchain applications, projects and implementations | Haojun Huang, Geyong Min, Wang Miao and Haozhe Wang
4.1 Blockchain applications
4.2 Blockchain projects and implementations
References
5. Blockchain for Internet of Things | Xu Wang, Xuan Zha, Guangsheng Yu, Wei Ni and Ren Ping Liu
5.1 Introduction
5.2 Limitations of IoT security
5.3 Existing blockchain technologies
5.4 Blockchain for IoT: applications
5.5 Blockchain for IoT: technologies
5.6 Future research directions
5.7 Conclusion
References
6. Blockchain in 5G and 6G networks | Minghao Wang, Xuhan Zuo and Tianqing Zhu
6.1 Blockchain in 5G networks
6.2 Blockchain in 6G networks
6.3 Issues and problems in blockchain networks
6.4 Conclusion
Acknowledgment
Appendix A
References
7 EdgeChain to provide security in organization-based multi-agent systems | Diego Valdeolmillos, Roberto Casado-Vara and Juan M. Corchado
7.1 Introduction
7.2 Virtual organization of agents
7.3 Blockchain
7.4 Edge blockchain
7.5 Case study: bank services optimization
7.6 Conclusion
Acknowledgements
References
8. Blockchain-driven privacy-preserving machine learning | Youyang Qu, Longxiang Gao and Yong Xiang
8.1 GAN-DP and blockchain
8.2 Federated learning and blockchain
8.3 Conclusion remarks
References
9. Performance evaluation of differential privacy mechanisms in blockchain-based smart metering | Muneeb Ul Hassan, Mubashir Husain Rehmani and Jinjun Chen
9.1 Introduction
9.2 Preliminaries of our work
9.3 Functioning and system model
9.4 Performance evaluation
9.5 Conclusion and future directions
References
10. Scaling-out blockchains with sharding: an extensive survey | Guangsheng Yu, Xu Wang, Kan Yu, Wei Ni, J. Andrew Zhang and Ren Ping Liu
10.1 Introduction
10.2 Sharding review and survey methodology
10.3 Description
10.4 Discussions
10.5 Conclusions
References
11. Blockchain for GIS: an overview | Yong Wang, Lizhe Wang, Dongfang Zhang and Chengjun Li
11.1 Introduction
11.2 Related technologies
11.3 Blockchain GIS
11.4 Application in GIS
11.5 Challenges and future trends
11.6 Conclusion
References
12. Blockchain application in remote sensing big data management and production | Jining Yan, Lizhe Wang, Feng Zhang, Xiaodao Chen, Xiaohui Huang and Jiabao Li
12.1 Introduction
12.2 Challenges in remote sensing big data management and production
12.3 Blockchain-based remote sensing big data management
12.4 Blockchain-based remote sensing big data production
12.5 Blockchain-based remote sensing big data management and production system
12.6 Conclusions
References
Index
๐ SIMILAR VOLUMES
<p><span>Deep Network Design for Medical Image Computing: Principles and Applications</span><span> covers a range of MIC tasks and discusses design principles of these tasks for deep learning approaches in medicine. These include skin disease classification, vertebrae identification and localization
Computer Incident Response and Product Security ย The practical guide to building and running incident response and product security teams ย Damir Rajnovic ย Organizations increasingly recognize the urgent importance of effective, cohesive, and efficient security incident response. The speed a