<span>Create your own crypto currency by implementing blockchain technology using Java. This step-by-step guide will teach you how to create a user interface using Java FX and implement SQLite DB using JDBC Driver for the blockchain.</span><p><span>Introducing Blockchain with Java</span><span> inclu
Implementing and Leveraging Blockchain Programming
â Scribed by Bharat S. Rawal, Gunasekaran Manogaran, M. Poongodi
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 217
- Series
- Blockchain Technologies
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book gives a comprehensive overview of blockchain programming and its implementation in the wide range of blockchain-based applications such as cross-border payment, digital banking, and digital identities. The consistent thrive of the blockchain phenomenon and the ecosystem of e-business use cases have led to the Industrial Revolution in the e-business world, and it is demonstrated in this book. The digital advancement, interference, and transformation being brought through the influence of the blockchain advancements are creating waves across e-business verticals. The book caters to academics, industrial practitioners, and entrepreneurs working in the field of blockchain technology and programming.
⌠Table of Contents
Contents
Introduction to Cryptography in Blockchain
1 What is Cryptography?
2 Types of Encryption and Decryption Algorithms
3 Secure Hash Algorithms
4 Cryptography in Blockchain
4.1 Secure Hash Algorithm
4.2 Public-Key Cryptography
4.3 Digital Signature
5 How to Implement Cryptography Using Java
5.1 Symmetric Encryption
5.2 Asymmetric Encryption
5.3 Key Storage
5.4 Digital Signatures
6 Blockchain Block Hashing
7 Blockchain Hashcode Using Java
8 Creation of Block and Hashes Using Java
9 Create a Blockchain
References
Quantum-Safe Cryptography and Security
1 Overview
2 Scope and Purpose
2.1 What is Cryptography?
2.2 What is Quantum Computing?
2.3 What Quantum Computing Does Well?
2.4 What Does Quantum-Safe Mean?
3 Technology SurveyââWhat's Currently âState of the Art?â
3.1 The Pervasiveness of the RSA and ECC in Various Security Protocols
4 Quantum-Safe Cryptography Primitives
4.1 Quantum Key Distribution
4.2 Working of Quantum Key Distribution
4.3 QKD Channel Authentication
4.4 QKD Protocols and Their Implementation
4.5 QKD in the Networks
5 Code-Based Cryptosystems
6 Lattice-Based Cryptosystems
7 Hash-Based Cryptosystems
8 Multivariate Cryptosystems
9 Comparison of the Classical and the Quantum Safe
10 Security Protocols: How We Can Upgrade
10.1 X.509 Certificates
10.2 Internet Key Exchange (IKE v2)
10.3 Transport Layer Security Version 1.2/S-MIME/SSH
11 Field of Applications and the User Cases
12 Field of Application
13 Economics of Quantum-Safe Cryptography
14 Conclusion
References
How Profitable Is Bitcoin Mining?
1 Hashing, Electricity, Difficulty Calculation, and Complexity
2 Introduction
2.1 Hash Rate
2.2 51% Attack
2.3 Consensus Algorithm
2.4 Peers
2.5 Compute
2.6 Electricity Cost
2.7 Threat from Quantum Computing
3 The Solution to the Double-Spending Problem
4 Value Creation in Bitcoin
5 Validation Using âE3 Modelâ
5.1 Measuring the Value Streams
6 Miner Sustainability Assessment
6.1 Data Collection
6.2 Value Flows
7 Whatâs the Problem?
8 Conclusion
References
Generative Adversarial Network-Based Visual-Aware Interactive Fashion Design Framework
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset Collection
3.2 Augmentation
3.3 Preprocessing Techniques Used
4 Proposed Architecture
4.1 Proposed Discriminator Architecture
4.2 Proposed Generator Architecture
5 Results and Discussions
5.1 Experimental Setups
5.2 Experimental Results
6 Evaluation Metrics Results
6.1 Frechet Inception Distance
6.2 Perceptual Path Length
6.3 AÂ Human Evaluation User Study
6.4 Human Evaluation Quality Assessments User Study
7 Conclusion and Future Work
7.1 Conclusion
7.2 Future Work
References
Plasma Chain and Blockchain Security Model
1 Introduction
1.1 Blockchain
1.2 Cryptocurrency
2 Role and Benefits of Blockchain Technology in Society
2.1 Benefits and Role of Blockchain
2.2 Ways in Which Blockchain Benefit Society
3 How Blockchain Maintain Security Model
4 Proof of Security Model in Blockchain
4.1 Blockchain Security in Telecom
4.2 Is the Blockchain Secure Even After This?
5 Blockchain Transaction Methods
5.1 Size of Blockchain for Transaction
6 Problems with Existing Public Chains
7 Plasma Network and Checking Point Layer
8 Incentivized Checkpointing
9 Block Rewards
10 Conclusion
References
Blockchain, Smart Contracts, and Decentralized Applications: An Introduction
1 Introduction
2 Blockchain and Distributed Ledgers
2.1 Public Distributed Ledgers
2.2 Private Distributed Ledgers
2.3 Consortium Distributed Ledgers
3 A Step-by-Step Guide on How Blockchain Works
4 Smart Contracts and DApps
4.1 Smart Contract
4.2 Features and Benefits of Smart Contracts
4.3 Decentralized Applications (DApps)
5 Blockchain in Different Industry Sectors
5.1 Blockchain in Banking
5.2 Blockchain in Supply Chain
5.3 Blockchain in Health Care
5.4 Blockchain in Government Sector
6 Traditional Model Versus Blockchain
References
A Contingent of Blockchain-IoT - An Organized Review
1 Introduction
2 Main Process/Operations of Blockchain
3 Operations
4 Roles of Participants
5 Aspects of BC
6 3 Dâs & 2 Aâs and I of BC
7 Types of Blockchain
8 In the View of Industryâs Experts
9 Blockchain Infrastructures
10 Other Infrastructures
11 Design Space of BC
12 Enabling Technologies
13 IoT
14 Functional Components of IoT
15 5 âAâs and 3 âIâ s in IoT
16 BC-IoT Implementation
17 Difference Between the Platforms of Blockchain
18 Research Categories of Blockchain
References
A Secured Data Processing Model for Monitoring the Studentâs Performance Using Decentralized Application
1 Introduction
2 Literature Review
3 Related Work
4 Working Flow
5 Experimental Setup on Blockchain Technique
6 Case Study is Made on studentâs Data Set in the Training Session
7 Measuring the Grey Area on Training Data and Testing Data
8 Overall Performance of Each Student on Different Skill Sets
9 Conclusion
References
An Efficient Trust-Based Supply Chain Management Framework Utilizing the Internet of Things and Blockchain Technology
1 Introduction
2 Trust Performance Metrics
3 Factors Affecting IOT Trust
4 Factors Affecting Blockchain Trust
5 Factors Affecting Supply Chain Trust
6 An Efficient Trust-Based Supply Chain Management Framework
7 A Computational Model to Evaluate Product Status and Make Decisions
8 Conclusion
References
Blockchain Technology and Machine Learning for Fake News Detection
1 Introduction
2 Fake News Detection Terminology
3 Machine Learning and Deep Learning for Fake News Detection
4 Era of Blockchain Technology for Fake News Detection
5 Blueprint of FN Detection System
6 Conclusion
References
Using Blockchain-Based Attestation Architecture for Securing IoT
1 Introduction
2 Challenges
3 Blockchain Architecture
3.1 Smart Contract [11]
3.2 Ledger [10]
3.3 Cryptography [12]
3.4 Consensus [13]
3.5 Events [10]
4 Related Works
5 The Proposed Approach of Using IoT with Blockchain
6 Business Use Cases for Blockchain IoT Security
6.1 Smart Homes
6.2 Implementation of Security Fabric for IoT
7 Conclusion
References
The Forgotten Cryptocurrencies: Beyond Bitcoin
1 Introduction
2 Bitcoin Network
2.1 Tether
2.2 Bitcoin Cash
2.3 Litecoin
3 Ethereum Network
3.1 Chainlink
4 Ripple Network
4.1 XRP
4.2 Stellar
5 EOS Network
5.1 Telos
6 Conclusion
References
Decentralized Application for the Classification of Products Based on IPFS and Blockchain
1 Introduction
2 Theoretical Background
3 Application Modules
4 Database Model
5 General System Requirements
6 Functional Model Based on Use Cases
7 Architecture
8 Component Diagram
9 Deployment Diagram
10 Results
11 Conclusion
References
đ SIMILAR VOLUMES
This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity. The 50 programs presented in this book are all you need to gain a firm understanding of blockchain
This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity. The 50 programs presented in this book are all you need to gain a firm understanding of blockchain
<p><span>Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.</span></p><p><span>You have probably notice
Professional Multicore Programming: Design and Implementation for C++ Developers presents the basics of multicore programming in a simple, easy-to-understand manner so that you can easily apply the concepts to your everyday projects. Learn the fundamentals of programming for multiprocessor and multi