๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Blockchains for Network Security: Principles, technologies and applications (Computing and Networks)

โœ Scribed by Haojun Huang


Tongue
English
Leaves
336
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Contents
About the editors
1. Introduction to blockchains | Haojun Huang, Jialin Tian, Geyong Min and Wang Miao
1.1 Overview
1.2 Structure of block and chain
1.3 Key technologies involved in blockchain
1.4 Evolution
References
2. Blockchain system architecture, applications and research issues | Wang Miao, Geyong Min, Haojun Huang and Haozhe Wang
2.1 System architecture
2.2 Conclusion
References
3. Blockchain consensuses and incentives | Meijun Li, Gaoyang Liu, Jialin Tian, Chen Wang, Yang Yang and Shaohua Wan
3.1 Blockchain consensuses
3.2 Consensus comparison
3.3 Incentives and consensus
3.4 Conclusions and future directions
References
4. Blockchain applications, projects and implementations | Haojun Huang, Geyong Min, Wang Miao and Haozhe Wang
4.1 Blockchain applications
4.2 Blockchain projects and implementations
References
5. Blockchain for Internet of Things | Xu Wang, Xuan Zha, Guangsheng Yu, Wei Ni and Ren Ping Liu
5.1 Introduction
5.2 Limitations of IoT security
5.3 Existing blockchain technologies
5.4 Blockchain for IoT: applications
5.5 Blockchain for IoT: technologies
5.6 Future research directions
5.7 Conclusion
References
6. Blockchain in 5G and 6G networks | Minghao Wang, Xuhan Zuo and Tianqing Zhu
6.1 Blockchain in 5G networks
6.2 Blockchain in 6G networks
6.3 Issues and problems in blockchain networks
6.4 Conclusion
Acknowledgment
Appendix A
References
7 EdgeChain to provide security in organization-based multi-agent systems | Diego Valdeolmillos, Roberto Casado-Vara and Juan M. Corchado
7.1 Introduction
7.2 Virtual organization of agents
7.3 Blockchain
7.4 Edge blockchain
7.5 Case study: bank services optimization
7.6 Conclusion
Acknowledgements
References
8. Blockchain-driven privacy-preserving machine learning | Youyang Qu, Longxiang Gao and Yong Xiang
8.1 GAN-DP and blockchain
8.2 Federated learning and blockchain
8.3 Conclusion remarks
References
9. Performance evaluation of differential privacy mechanisms in blockchain-based smart metering | Muneeb Ul Hassan, Mubashir Husain Rehmani and Jinjun Chen
9.1 Introduction
9.2 Preliminaries of our work
9.3 Functioning and system model
9.4 Performance evaluation
9.5 Conclusion and future directions
References
10. Scaling-out blockchains with sharding: an extensive survey | Guangsheng Yu, Xu Wang, Kan Yu, Wei Ni, J. Andrew Zhang and Ren Ping Liu
10.1 Introduction
10.2 Sharding review and survey methodology
10.3 Description
10.4 Discussions
10.5 Conclusions
References
11. Blockchain for GIS: an overview | Yong Wang, Lizhe Wang, Dongfang Zhang and Chengjun Li
11.1 Introduction
11.2 Related technologies
11.3 Blockchain GIS
11.4 Application in GIS
11.5 Challenges and future trends
11.6 Conclusion
References
12. Blockchain application in remote sensing big data management and production | Jining Yan, Lizhe Wang, Feng Zhang, Xiaodao Chen, Xiaohui Huang and Jiabao Li
12.1 Introduction
12.2 Challenges in remote sensing big data management and production
12.3 Blockchain-based remote sensing big data management
12.4 Blockchain-based remote sensing big data production
12.5 Blockchain-based remote sensing big data management and production system
12.6 Conclusions
References
Index


๐Ÿ“œ SIMILAR VOLUMES


Enabling Blockchain Technology for Secur
โœ Adel Ben Mnaouer; Lamia Chaari Fourati ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› IGI Global ๐ŸŒ English

In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more moder

Deep Network Design for Medical Image Co
โœ Haofu Liao, S. Kevin Zhou, Jiebo Luo ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Academic Press ๐ŸŒ English

<p><span>Deep Network Design for Medical Image Computing: Principles and Applications</span><span> covers a range of MIC tasks and discusses design principles of these tasks for deep learning approaches in medicine. These include skin disease classification, vertebrae identification and localization

Computer Incident Response and Product S
โœ Damir Rajnovic ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Cisco Press ๐ŸŒ English

Computer Incident Response and Product Security ย  The practical guide to building and running incident response and product security teams ย  Damir Rajnovic ย  Organizations increasingly recognize the urgent importance of effective, cohesive, and efficient security incident response. The speed a