Revolutionary applications of blockchain-enabled privacy and access control:
"This book provides the latest research findings, solutions and relevant theoretical frameworks in the area of blockchain technologies, information security, and privacy in computing and communication for professionals who want to improve their understanding of the recent challenges, design, an...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2021]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book provides the latest research findings, solutions and relevant theoretical frameworks in the area of blockchain technologies, information security, and privacy in computing and communication for professionals who want to improve their understanding of the recent challenges, design, and issues in these areas"-- |
Beschreibung: | "Premier Reference Source" -- taken from front cover. |
Beschreibung: | 20 PDFs (297 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1799875903 1799875911 9781799875901 9781799875918 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00264874 | ||
003 | IGIG | ||
005 | 20210326193259.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 210327s2021 pau fob 001 0 eng d | ||
010 | |z 2020047974 | ||
020 | |a 1799875903 |q electronic book | ||
020 | |a 1799875911 |q electronic bk. | ||
020 | |a 9781799875901 |q electronic book | ||
020 | |a 9781799875918 |q electronic bk. | ||
020 | |z 9781799875895 |q hardcover | ||
020 | |z 9781799886730 |q paperback | ||
024 | 7 | |a 10.4018/978-1-7998-7589-5 |2 doi | |
035 | |a (CaBNVSL)slc00001303 | ||
035 | |a (OCoLC)1204267399 |z (OCoLC)1242915345 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.B56 |b R48 2021e | |
082 | 7 | |a 005.74 |2 23 | |
245 | 0 | 0 | |a Revolutionary applications of blockchain-enabled privacy and access control |c Surjit Singh, Anca Delia Jurcut. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2021] | |
300 | |a 20 PDFs (297 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
490 | 1 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
500 | |a "Premier Reference Source" -- taken from front cover. | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Blockchain advances and security practices in WSN, CRN, SDN, opportunistic mobile networks, delay tolerant networks -- Chapter 2. Towards utilizing blockchain for countering distributed denial-of-service (ddos) -- Chapter 3. BLOFF: a blockchain-based forensic model in IoT -- Chapter 4. Forensic investigation-based framework for SDN using blockchain -- Chapter 5. The mobility open blockchain initiative: identity, members, technologies, and future trends -- Chapter 6. Revolutionizing the stock market with blockchain -- Chapter 7. Blockchain-based food supply chain management -- Chapter 8. Blockchain and PUF-based secure transaction procedure for bitcoin -- Chapter 9. Blockchain revolution: adaptability in business world and challenges in implementation -- Chapter 10. A reliable hybrid blockchain-based authentication system for IoT network -- Chapter 11. The detection of SQL injection on blockchain-based database. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book provides the latest research findings, solutions and relevant theoretical frameworks in the area of blockchain technologies, information security, and privacy in computing and communication for professionals who want to improve their understanding of the recent challenges, design, and issues in these areas"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 03/27/2021). | ||
650 | 0 | |a Blockchains (Databases) |x Security measures. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Jurcut, Anca |d 1984- |e editor. | |
700 | 1 | |a Singh, Surjit |d 1981- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2020047974 | |
776 | 0 | 8 | |i Print version: |z 179987589X |z 9781799875895 |w (DLC) 2020047974 |
830 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series. | |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7589-5 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00264874 |
---|---|
_version_ | 1816797085278666752 |
adam_text | |
any_adam_object | |
author2 | Jurcut, Anca 1984- Singh, Surjit 1981- |
author2_role | edt edt |
author2_variant | a j aj s s ss |
author_facet | Jurcut, Anca 1984- Singh, Surjit 1981- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.B56 R48 2021e |
callnumber-search | QA76.9.B56 R48 2021e |
callnumber-sort | QA 276.9 B56 R48 42021E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Blockchain advances and security practices in WSN, CRN, SDN, opportunistic mobile networks, delay tolerant networks -- Chapter 2. Towards utilizing blockchain for countering distributed denial-of-service (ddos) -- Chapter 3. BLOFF: a blockchain-based forensic model in IoT -- Chapter 4. Forensic investigation-based framework for SDN using blockchain -- Chapter 5. The mobility open blockchain initiative: identity, members, technologies, and future trends -- Chapter 6. Revolutionizing the stock market with blockchain -- Chapter 7. Blockchain-based food supply chain management -- Chapter 8. Blockchain and PUF-based secure transaction procedure for bitcoin -- Chapter 9. Blockchain revolution: adaptability in business world and challenges in implementation -- Chapter 10. A reliable hybrid blockchain-based authentication system for IoT network -- Chapter 11. The detection of SQL injection on blockchain-based database. |
ctrlnum | (CaBNVSL)slc00001303 (OCoLC)1204267399 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03480nam a2200541 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00264874</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20210326193259.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">210327s2021 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2020047974</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799875903</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1799875911</subfield><subfield code="q">electronic bk.</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799875901</subfield><subfield code="q">electronic book</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799875918</subfield><subfield code="q">electronic bk.</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799875895</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799886730</subfield><subfield code="q">paperback</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-7589-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00001303</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1204267399</subfield><subfield code="z">(OCoLC)1242915345</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.B56</subfield><subfield code="b">R48 2021e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Revolutionary applications of blockchain-enabled privacy and access control </subfield><subfield code="c">Surjit Singh, Anca Delia Jurcut.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">20 PDFs (297 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Premier Reference Source" -- taken from front cover.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Blockchain advances and security practices in WSN, CRN, SDN, opportunistic mobile networks, delay tolerant networks -- Chapter 2. Towards utilizing blockchain for countering distributed denial-of-service (ddos) -- Chapter 3. BLOFF: a blockchain-based forensic model in IoT -- Chapter 4. Forensic investigation-based framework for SDN using blockchain -- Chapter 5. The mobility open blockchain initiative: identity, members, technologies, and future trends -- Chapter 6. Revolutionizing the stock market with blockchain -- Chapter 7. Blockchain-based food supply chain management -- Chapter 8. Blockchain and PUF-based secure transaction procedure for bitcoin -- Chapter 9. Blockchain revolution: adaptability in business world and challenges in implementation -- Chapter 10. A reliable hybrid blockchain-based authentication system for IoT network -- Chapter 11. The detection of SQL injection on blockchain-based database.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides the latest research findings, solutions and relevant theoretical frameworks in the area of blockchain technologies, information security, and privacy in computing and communication for professionals who want to improve their understanding of the recent challenges, design, and issues in these areas"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 03/27/2021).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Blockchains (Databases)</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jurcut, Anca</subfield><subfield code="d">1984-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Surjit</subfield><subfield code="d">1981-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2020047974</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">179987589X</subfield><subfield code="z">9781799875895</subfield><subfield code="w">(DLC) 2020047974</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7589-5</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic books. |
genre_facet | Electronic books. |
id | ZDB-98-IGB-00264874 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:58Z |
institution | BVB |
isbn | 1799875903 1799875911 9781799875901 9781799875918 |
language | English |
oclc_num | 1204267399 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 20 PDFs (297 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | IGI Global, |
record_format | marc |
series | Advances in information security, privacy, and ethics (AISPE) book series. |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Revolutionary applications of blockchain-enabled privacy and access control Surjit Singh, Anca Delia Jurcut. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2021] 20 PDFs (297 pages) text rdacontent electronic isbdmedia online resource rdacarrier Advances in information security, privacy, and ethics (AISPE) book series "Premier Reference Source" -- taken from front cover. Includes bibliographical references and index. Chapter 1. Blockchain advances and security practices in WSN, CRN, SDN, opportunistic mobile networks, delay tolerant networks -- Chapter 2. Towards utilizing blockchain for countering distributed denial-of-service (ddos) -- Chapter 3. BLOFF: a blockchain-based forensic model in IoT -- Chapter 4. Forensic investigation-based framework for SDN using blockchain -- Chapter 5. The mobility open blockchain initiative: identity, members, technologies, and future trends -- Chapter 6. Revolutionizing the stock market with blockchain -- Chapter 7. Blockchain-based food supply chain management -- Chapter 8. Blockchain and PUF-based secure transaction procedure for bitcoin -- Chapter 9. Blockchain revolution: adaptability in business world and challenges in implementation -- Chapter 10. A reliable hybrid blockchain-based authentication system for IoT network -- Chapter 11. The detection of SQL injection on blockchain-based database. Restricted to subscribers or individual electronic text purchasers. "This book provides the latest research findings, solutions and relevant theoretical frameworks in the area of blockchain technologies, information security, and privacy in computing and communication for professionals who want to improve their understanding of the recent challenges, design, and issues in these areas"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 03/27/2021). Blockchains (Databases) Security measures. Electronic books. Jurcut, Anca 1984- editor. Singh, Surjit 1981- editor. IGI Global, publisher. (Original) (DLC)2020047974 Print version: 179987589X 9781799875895 (DLC) 2020047974 Advances in information security, privacy, and ethics (AISPE) book series. FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7589-5 Volltext |
spellingShingle | Revolutionary applications of blockchain-enabled privacy and access control Advances in information security, privacy, and ethics (AISPE) book series. Chapter 1. Blockchain advances and security practices in WSN, CRN, SDN, opportunistic mobile networks, delay tolerant networks -- Chapter 2. Towards utilizing blockchain for countering distributed denial-of-service (ddos) -- Chapter 3. BLOFF: a blockchain-based forensic model in IoT -- Chapter 4. Forensic investigation-based framework for SDN using blockchain -- Chapter 5. The mobility open blockchain initiative: identity, members, technologies, and future trends -- Chapter 6. Revolutionizing the stock market with blockchain -- Chapter 7. Blockchain-based food supply chain management -- Chapter 8. Blockchain and PUF-based secure transaction procedure for bitcoin -- Chapter 9. Blockchain revolution: adaptability in business world and challenges in implementation -- Chapter 10. A reliable hybrid blockchain-based authentication system for IoT network -- Chapter 11. The detection of SQL injection on blockchain-based database. Blockchains (Databases) Security measures. |
title | Revolutionary applications of blockchain-enabled privacy and access control |
title_auth | Revolutionary applications of blockchain-enabled privacy and access control |
title_exact_search | Revolutionary applications of blockchain-enabled privacy and access control |
title_full | Revolutionary applications of blockchain-enabled privacy and access control Surjit Singh, Anca Delia Jurcut. |
title_fullStr | Revolutionary applications of blockchain-enabled privacy and access control Surjit Singh, Anca Delia Jurcut. |
title_full_unstemmed | Revolutionary applications of blockchain-enabled privacy and access control Surjit Singh, Anca Delia Jurcut. |
title_short | Revolutionary applications of blockchain-enabled privacy and access control |
title_sort | revolutionary applications of blockchain enabled privacy and access control |
topic | Blockchains (Databases) Security measures. |
topic_facet | Blockchains (Databases) Security measures. Electronic books. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-7589-5 |
work_keys_str_mv | AT jurcutanca revolutionaryapplicationsofblockchainenabledprivacyandaccesscontrol AT singhsurjit revolutionaryapplicationsofblockchainenabledprivacyandaccesscontrol AT igiglobal revolutionaryapplicationsofblockchainenabledprivacyandaccesscontrol |