語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Blockchain cybersecurity, trust and ...
~
Choo, Kim-Kwang Raymond.
Blockchain cybersecurity, trust and privacy
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Blockchain cybersecurity, trust and privacyedited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi.
其他作者:
Choo, Kim-Kwang Raymond.
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
vi, 290 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Blockchains (Databases)Security measures.
電子資源:
https://doi.org/10.1007/978-3-030-38181-3
ISBN:
9783030381813$q(electronic bk.)
Blockchain cybersecurity, trust and privacy
Blockchain cybersecurity, trust and privacy
[electronic resource] /edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi. - Cham :Springer International Publishing :2020. - vi, 290 p. :ill., digital ;24 cm. - Advances in information security,v.791568-2633 ;. - Advances in information security ;12..
Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism.
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments) This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
ISBN: 9783030381813$q(electronic bk.)
Standard No.: 10.1007/978-3-030-38181-3doiSubjects--Topical Terms:
862459
Blockchains (Databases)
--Security measures.
LC Class. No.: QA76.9.B56 / B56 2020
Dewey Class. No.: 005.8
Blockchain cybersecurity, trust and privacy
LDR
:04707nmm a2200337 a 4500
001
574724
003
DE-He213
005
20200302065147.0
006
m d
007
cr nn 008maaau
008
201016s2020 sz s 0 eng d
020
$a
9783030381813$q(electronic bk.)
020
$a
9783030381806$q(paper)
024
7
$a
10.1007/978-3-030-38181-3
$2
doi
035
$a
978-3-030-38181-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.B56
$b
B56 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.B56
$b
B651 2020
245
0 0
$a
Blockchain cybersecurity, trust and privacy
$h
[electronic resource] /
$c
edited by Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
vi, 290 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
1568-2633 ;
$v
v.79
505
0
$a
Chapter 1- Blockchain in Cybersecurity Realm: An Overview -- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT -- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain -- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications -- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus -- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning -- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis -- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence -- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security -- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography -- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness -- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain -- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms -- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism.
520
$a
This book provides the reader with the most up-to-date knowledge of blockchain in mainstream areas of security, trust, and privacy in the decentralized domain, which is timely and essential (this is due to the fact that the distributed and P2P applications is increasing day-by-day, and the attackers adopt new mechanisms to threaten the security and privacy of the users in those environments) This book also provides the technical information regarding blockchain-oriented software, applications, and tools required for the researcher and developer experts in both computing and software engineering to provide solutions and automated systems against current security, trust and privacy issues in the cyberspace. Cybersecurity, trust and privacy (CTP) are pressing needs for governments, businesses, and individuals, receiving the utmost priority for enforcement and improvement in almost any societies around the globe. Rapid advances, on the other hand, are being made in emerging blockchain technology with broadly diverse applications that promise to better meet business and individual needs. Blockchain as a promising infrastructural technology seems to have the potential to be leveraged in different aspects of cybersecurity promoting decentralized cyberinfrastructure. Blockchain characteristics such as decentralization, verifiability and immutability may revolve current cybersecurity mechanisms for ensuring the authenticity, reliability, and integrity of data. Almost any article on the blockchain points out that the cybersecurity (and its derivatives) could be revitalized if it is supported by blockchain technology. Yet, little is known about factors related to decisions to adopt this technology, and how it can systemically be put into use to remedy current CTP's issues in the digital world. This book provides information for security and privacy experts in all the areas of blockchain, cryptocurrency, cybersecurity, forensics, smart contracts, computer systems, computer networks, software engineering, applied artificial intelligence for computer security experts, big data analysts, and decentralized systems. Researchers, scientists and advanced level students working in computer systems, computer networks, artificial intelligence, big data will find this book useful as well.
650
0
$a
Blockchains (Databases)
$x
Security measures.
$3
862459
650
1 4
$a
Security.
$3
760527
650
2 4
$a
Information Systems and Communication Service.
$3
274025
650
2 4
$a
Artificial Intelligence.
$3
212515
650
2 4
$a
Computer Communication Networks.
$3
218087
700
1
$a
Choo, Kim-Kwang Raymond.
$3
337891
700
1
$a
Dehghantanha, Ali.
$3
814711
700
1
$a
Parizi, Reza M.
$3
862458
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advances in information security ;
$v
12.
$3
451557
856
4 0
$u
https://doi.org/10.1007/978-3-030-38181-3
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000180832
電子館藏
1圖書
電子書
EB QA76.9.B56 B651 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-38181-3
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入