Blockchain technologies are based on cryptographic algorithms and were initially proposed as a peer-to-peer data transfer mechanism. Often referred to as distributed ledgers, these technologies are decentralized databases in which all records are stored in blocks and linked by cryptographic algorithms called hash functions. Cryptographic hash functions are algorithms that take as input a message of arbitrary length and output a fixed-length digest of the message. It is well known that these cryptographic algorithms are developed for the purpose of providing information integrity since any change in the input message results in a drastic change in the message digest. Therefore, hash outputs are considered a “fingerprint” of a given message. This property makes hash functions the core of blockchain technology since information for each new record in a blockchain is encapsulated into a block, and meta-data from the hash output of the previous block is always incorporated into the hashing process of a new block.
Yayın Adı (dc.title) | Blockchain Applications in Security |
Yazar/lar (dc.contributor.yazarlar) | Rita Ismailova |
Yayın Türü (dc.type) | Kitap Bölümü |
Dil (dc.language) | İngilizce |
Yayımlanma Yılı (dc.date.issued) | 2024 |
Ulusal/Uluslararası (dc.identifier.ulusaluluslararasi) | Uluslararası |
Kaynak (dc.relation.journal) | Exploring Blockchain Applications: Management Perspectives |
Editör (dc.contributor.editor) | Sezer Bozkus Kahyaoglu, Vahap Tecim |
Sayfa (dc.identifier.startpage) | 87-99 |
ISSN/ISBN (dc.identifier.issn) | ISBN: 978-1-040-02153-8, 978-1-003-38955-2 |
Yayıncı (dc.publisher) | CRC Press |
Veri Tabanları (dc.contributor.veritaban) | Taylor & Francis |
Veri Tabanları (dc.contributor.veritaban) | Scopus |
İndex Türü (dc.identifier.index) | Scopus |
Özet (dc.description.abstract) | Blockchain technologies are based on cryptographic algorithms and were initially proposed as a peer-to-peer data transfer mechanism. Often referred to as distributed ledgers, these technologies are decentralized databases in which all records are stored in blocks and linked by cryptographic algorithms called hash functions. Cryptographic hash functions are algorithms that take as input a message of arbitrary length and output a fixed-length digest of the message. It is well known that these cryptographic algorithms are developed for the purpose of providing information integrity since any change in the input message results in a drastic change in the message digest. Therefore, hash outputs are considered a “fingerprint” of a given message. This property makes hash functions the core of blockchain technology since information for each new record in a blockchain is encapsulated into a block, and meta-data from the hash output of the previous block is always incorporated into the hashing process of a new block. |
URL (dc.rights) | https://www.taylorfrancis.com/chapters/edit/10.1201/9781003389552-7/blockchain-applications-security-rita-ismailova |
DOI (dc.identifier.doi) | 10.1201/9781003389552 |
Fakültesi / Enstitütü (dc.identifier.fakulte) | Mühendislik Fakültesi |
Bölümü (dc.identifier.bolum) | Bilgisayar Mühendisliği Bölümü |
Kurumdaki Yazar/lar (dc.contributor.author) | Rita İSMAİLOVA |
Kayıt No (dc.identifier.kayitno) | BL922E6328 |
Kayıt Giriş Tarihi (dc.date.available) | 2024-07-16 |
Not (Yayımlanma Yılı) (dc.identifier.notyayinyili) | January 2024 |