Blockchain Applications in Security

Blockchain technologies are based on cryptographic algorithms and were initially proposed as a peer-to-peer data transfer mechanism. Often referred to as distributed ledgers, these technologies are decentralized databases in which all records are stored in blocks and linked by cryptographic algorithms called hash functions. Cryptographic hash functions are algorithms that take as input a message of arbitrary length and output a fixed-length digest of the message. It is well known that these cryptographic algorithms are developed for the purpose of providing information integrity since any change in the input message results in a drastic change in the message digest. Therefore, hash outputs are considered a “fingerprint” of a given message. This property makes hash functions the core of blockchain technology since information for each new record in a blockchain is encapsulated into a block, and meta-data from the hash output of the previous block is always incorporated into the hashing process of a new block.

Görüntülenme
3
16.07.2024 tarihinden bu yana
İndirme
1
16.07.2024 tarihinden bu yana
Son Erişim Tarihi
17 Ağustos 2024 17:41
Google Kontrol
Tıklayınız
Tam metin
Detaylı Görünüm
Yayın Adı
(dc.title)
Blockchain Applications in Security
Yazar/lar
(dc.contributor.yazarlar)
Rita Ismailova
Yayın Türü
(dc.type)
Kitap Bölümü
Dil
(dc.language)
İngilizce
Yayımlanma Yılı
(dc.date.issued)
2024
Ulusal/Uluslararası
(dc.identifier.ulusaluluslararasi)
Uluslararası
Kaynak
(dc.relation.journal)
Exploring Blockchain Applications: Management Perspectives
Editör
(dc.contributor.editor)
Sezer Bozkus Kahyaoglu, Vahap Tecim
Sayfa
(dc.identifier.startpage)
87-99
ISSN/ISBN
(dc.identifier.issn)
ISBN: 978-1-040-02153-8, 978-1-003-38955-2
Yayıncı
(dc.publisher)
CRC Press
Veri Tabanları
(dc.contributor.veritaban)
Taylor & Francis
Veri Tabanları
(dc.contributor.veritaban)
Scopus
İndex Türü
(dc.identifier.index)
Scopus
Özet
(dc.description.abstract)
Blockchain technologies are based on cryptographic algorithms and were initially proposed as a peer-to-peer data transfer mechanism. Often referred to as distributed ledgers, these technologies are decentralized databases in which all records are stored in blocks and linked by cryptographic algorithms called hash functions. Cryptographic hash functions are algorithms that take as input a message of arbitrary length and output a fixed-length digest of the message. It is well known that these cryptographic algorithms are developed for the purpose of providing information integrity since any change in the input message results in a drastic change in the message digest. Therefore, hash outputs are considered a “fingerprint” of a given message. This property makes hash functions the core of blockchain technology since information for each new record in a blockchain is encapsulated into a block, and meta-data from the hash output of the previous block is always incorporated into the hashing process of a new block.
URL
(dc.rights)
https://www.taylorfrancis.com/chapters/edit/10.1201/9781003389552-7/blockchain-applications-security-rita-ismailova
DOI
(dc.identifier.doi)
10.1201/9781003389552
Fakültesi / Enstitütü
(dc.identifier.fakulte)
Mühendislik Fakültesi
Bölümü
(dc.identifier.bolum)
Bilgisayar Mühendisliği Bölümü
Kurumdaki Yazar/lar
(dc.contributor.author)
Rita İSMAİLOVA
Kayıt No
(dc.identifier.kayitno)
BL922E6328
Kayıt Giriş Tarihi
(dc.date.available)
2024-07-16
Not (Yayımlanma Yılı)
(dc.identifier.notyayinyili)
January 2024
Analizler
Yayın Görüntülenme
Yayın Görüntülenme
Erişilen Ülkeler
Erişilen şehirler
Yükümlülüklerimiz ve çerez politikamız T.C. 6698 sayılı Kişisel Verilerin Korunması Kanunu kapsamındadır.
Tamam

creativecommons
Bu site altında yer alan tüm kaynaklar Creative Commons Alıntı-GayriTicari-Türetilemez 4.0 Uluslararası Lisansı ile lisanslanmıştır.
Platforms