2 options
Bitcoin and blockchain : history and current applications / edited by Sandeep Kumar Panda [and three others].
- Format:
- Book
- Language:
- English
- Subjects (All):
- Blockchains (Databases).
- Bitcoin.
- Physical Description:
- 1 online resource (296 pages)
- Edition:
- 1st ed.
- Place of Publication:
- Boca Raton ; London ; New York : CRC Press, Taylor & Francis Group, 2020.
- Language Note:
- In English.
- Summary:
- In recent years, blockchain development has grown quickly from the original Bitcoin protocol to the second-generation Ethereum platform, and to today's process of building third-generation blockchains. During this evolution, we can see how blockchain technology has evolved from its original form as a distributed database to becoming a fully fledged, globally distributed, cloud computing platform. This book traces the past, present, and future of blockchain technology. Presents the knowledge and history of Bitcoin Offers blockchain applications Discusses developing working code for real-world blockchain applications Includes many real-life examples Covers the original Bitcoin protocol to the second-generation Ethereum platform Bitcoin and Blockchain: History and Current Applications is a useful reference for students, business schools, research scholars, practitioners, and business analytics professionals.
- Contents:
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Preface
- Editors
- Contributors
- Chapter 1 Bitcoin: A P2P Digital Currency
- 1.1 Introduction
- 1.2 Digital Currencies before Bitcoin
- 1.2.1 Blinded Cash
- 1.2.2 Web-Based Money
- 1.2.3 B-Money
- 1.2.4 Bit Gold
- 1.2.5 Hashcash
- 1.3 Bitcoin in a Nutshell
- 1.4 Transaction
- 1.4.1 Construct a Transaction
- 1.4.2 Getting the Right Input
- 1.4.3 Creating the Output
- 1.5 Timestamp Server
- 1.6 Proof of Work
- 1.7 Bitcoin Development Environment
- 1.7.1 Bitcoin Core Implementation
- 1.7.2 Wallet Setup and Encryption
- 1.8 Keys, Wallets, and Addresses
- 1.8.1 Digital Signature
- 1.8.2 Keys
- 1.8.3 Wallets
- 1.8.4 Addresses
- 1.9 Security Attacks on Bitcoin System and Countermeasures
- 1.9.1 Major Security Attacks
- 1.9.1.1 Double Spending
- 1.9.1.2 Mining Pool Attacks
- 1.9.1.3 Client-Side Security Threat
- 1.9.1.4 Bitcoin Network Attacks
- 1.9.2 Minor Attacks
- 1.9.2.1 Sybil Attack
- 1.9.2.2 Eclipse Attack
- 1.9.2.3 Tampering
- 1.10 Privacy and Anonymity in Bitcoin
- 1.11 Reclaiming Disk Space
- 1.12 Conclusion
- References
- Chapter 2 Exploring the Bitcoin Network
- 2.1 Introduction
- 2.2 P2P Network
- 2.3 Summary of Bitcoin System
- 2.4 Bitcoin Nodes
- 2.5 Experimenting with the Bitcoin Network
- 2.6 Joining and Conserving the Network
- 2.7 Transaction and Block Propagation
- 2.8 Deanonymization
- 2.9 Botnets
- 2.10 Bitcoin-Inspired Network Applications
- 2.11 Bitcoin Network Attacks
- 2.12 Securing Bitcoin Networks
- Conclusion
- Chapter 3 Blockchain Technology: The Trust-Free Systems
- 3.1 Introduction
- 3.2 History
- 3.3 Overview of Blockchain Technology
- 3.3.1 Structure of a Block
- 3.3.2 The Genesis Block
- 3.4 Types of Blockchain
- 3.4.1 Public Blockchain.
- 3.4.2 Private Blockchain
- 3.4.3 Consortium Blockchain
- 3.5 Properties of Blockchain
- 3.5.1 Decentralized
- 3.5.2 Transparent
- 3.5.3 Immutable
- 3.5.4 Persistency
- 3.5.5 Anonymity
- 3.5.6 Auditability
- 3.6 Transactions and Digital Signature
- 3.7 Merkle Tree
- 3.8 SHA-256
- 3.9 How Blockchain Works
- 3.10 Blockchain Open-Source Implementation
- 3.10.1 Bitcoin
- 3.10.2 Ethereum
- 3.10.3 Hyperledger
- 3.10.4 Corda
- 3.11 Testnet
- 3.11.1 Continuous Development
- 3.11.2 Prevents Disruptions
- 3.12 Payment Verification
- 3.13 Benefits and Challenges
- 3.13.1 Benefits
- 3.13.1.1 Decentralization
- 3.13.2 Transparent and Anonymous
- 3.13.3 Less Transaction Fee and No Taxes
- 3.13.4 Theft Resistance
- 3.13.5 Scalability
- 3.13.6 High Energy Consumption
- 3.13.7 Selfish Mining
- 3.13.8 Privacy Leakage
- Chapter 4 Consensus and Mining in a Nutshell
- 4.1 Background
- 4.2 Proof-of-X (PoX) Schemes
- 4.2.1 Reaching Consensus - The Issue of Byzantine Generals
- 4.2.2 Proof of Work - The Question of Monopoly
- 4.2.3 Proof of Stake - Resolving Incentive Problem
- 4.2.4 Proof of Activity - Promote Active Involvement
- 4.2.5 Proof of Elapsed Time
- 4.2.6 Tendermint
- 4.2.7 Federated BFT
- 4.3 Performance and Scalability in Consensus Algorithms
- Chapter 5 Blockchain: Introduction to the Technology behind Shared I nfor mation
- 5.1 Introduction to the Blockchain Technology
- 5.1.1 Blockchain: Types of Blockchain
- 5.1.2 Public Blockchain
- 5.1.3 Private Blockchain
- 5.2 Issues with the Conventional System: Trust at Stake
- 5.3 Fixing the Issues with the Conventional System: The White Paper by Nakamoto
- 5.3.1 Empowering Participants by Decentralizing the Architecture
- 5.3.2 Authentication of Blocks through Consensus Algorithm.
- 5.3.3 Enhanced Security Characteristics
- 5.4 Confidentiality Provisions: Encryption and Decryption
- 5.5 Self-Sustainable Architecture: Incentivization to Miners
- 5.6 Security Features: Digital Signature
- 5.6.1 Hashing
- 5.6.2 Consolidating Multiple Hash Signatures
- 5.7 Road Ahead
- 5.7.1 Impact on Existing Industry: A New Wave of Technological Revolution
- 5.7.2 Impact on Existing Industry: Doomed to Fail
- 5.8 Applications of Blockchain Technology
- 5.8.1 Product Authentication
- 5.8.2 Creative Industry and Academics
- 5.8.3 Voting and Governance
- 5.8.4 Storage and Movement of Assets
- 5.8.5 Link Service Provider Directly with Customers
- 5.8.6 Blood Group and/or Organ Donor List
- 5.8.7 Arresting Distribution Leakages
- Chapter 6 Growth of Financial Transaction toward Bitcoin and Blockchain Technology
- 6.1 Overview of the Blockchain
- 6.2 Astonishing Worldwide Financial Crisis of 2007-2008
- 6.2.1 Special Effects of the 2008 Financial Crisis on India
- 6.2.2 Influence on the Stock Market
- 6.2.3 Influence on India's Trade
- 6.2.4 Influence on Exports from India
- 6.2.5 Influence on Handloom Segment, Jewels Export, and Tourism in India
- 6.2.6 Conversation Ratio Devaluation
- 6.2.7 India's Information Technology and Business Process Outsourcing Sector
- 6.2.8 Foreign Institutional Investors and Foreign Direct Investment
- 6.3 Causes of Crisis
- 6.3.1 The Starting Concepts of Bitcoin (1998-2009)
- 6.3.2 Bitcoin-A Peer-to-Peer Electronic Cash System (2008)
- 6.3.3 The Beginning of Bitcoin Software (2009)
- 6.3.4 The First Bitcoin Value (2010)
- 6.3.5 Arise of Rival Cryptocurrencies (2011)
- 6.3.6 Bitcoin Value Bangs (2013)
- 6.3.7 Various Scams and Thefts (2014)
- 6.3.8 Ethereum and ICOs (2016)
- 6.3.9 A Hype in Bitcoin Touches 10,000 USD (2017).
- 6.3.10 Bitcoin Payment Started by Online Payment Firm (2018)
- 6.4 Current Status of Bitcoin (2019)
- 6.5 Preliminaries of Bitcoin Mining
- 6.6 Aspects of Bitcoin and Blockchain
- 6.7 List of Cryptocurrency Future Scenarios
- 6.7.1 Possibilities
- 6.7.2 FedCoin: An Alternate Central Banks Mull Future of Cryptocurrency
- 6.7.3 Is This Called as Bitcoin Crash or Cryptocurrency Revolution?
- 6.7.4 Potential System Risks by Bitcoin
- 6.8 Impressions of Bitcoin on Economy, Banking, and Finance
- 6.8.1 Dark Web Power
- 6.8.2 Speculations
- 6.8.3 Politicization of Currency
- 6.8.4 Apprehension among the Central Banks
- 6.8.5 Emergence of New Markets
- 6.9 Cybersecurity Aspects of Blockchain Technology
- 6.10 Blockchain and Bitcoin Cybersecurity Risks
- 6.10.1 Is Blockchain Fail-Safe?
- 6.10.2 Cybersecurity Plays a Key Role in Today's Market
- Chapter 7 A Brief Overview of Blockchain Algorithm and Its Impact upon Cloud-Connected Environment
- 7.1 Introduction
- 7.2 Overview of Blockchain Algorithm
- 7.3 Types of Algorithms in Blockchain
- 7.3.1 Consensus Algorithms
- 7.3.1.1 Consensus Algorithm
- 7.3.1.2 Consensus Algorithm Versus Protocol
- 7.3.2 Different Types of Consensus Algorithms
- 7.3.2.1 Proof of Work (PoW)
- 7.3.2.2 Proof of Stake (PoS)
- 7.4 Mining Algorithms
- 7.5 Traceability Chain Algorithms
- 7.6 Byzantine Fault Tolerance (BFT)
- 7.7 Choosing the Right Algorithm
- 7.7.1 Blockchain (Non-Proof of Work)
- 7.7.2 State of the Art of Blockchain
- 7.8 Cloud storage
- 7.8.1 Blockchain in Cloud Storage
- 7.8.2 The Risks of Cloud Computing Are Increasing
- Conclusion and Future Scope
- Chapter 8 Solidity Essentials
- 8.1 Introduction
- 8.2 Environment Setup
- 8.3 Getting Started
- 8.4 Value and Operator Types
- 8.4.1 Value Types
- 8.4.2 Variable Types.
- 8.4.2.1 State Variables
- 8.4.2.2 Local Variables
- 8.4.2.3 Global Variables
- 8.4.2.4 Rules for Naming Solidity Variables
- 8.4.3 Operator Types
- 8.4.3.1 Arithmetic Operators
- 8.4.3.2 Comparison Operators
- 8.4.3.3 Logical Operators
- 8.4.3.4 Assignment Operators
- 8.4.3.5 Conditional Operator (?: (conditional))
- 8.5 Control Structures
- 8.5.1 Loop
- 8.5.2 Decision-Making
- 8.6 Data Structures
- 8.6.1 Array
- 8.6.1.1 Fixed Array
- 8.6.1.2 Dynamic Array
- 8.6.1.3 Array Properties
- 8.6.2 Mapping
- 8.6.2.1 Mapping Gotchas
- 8.6.3 Struct
- 8.6.4 Enum
- 8.6.4.1 Enum Gotchas
- 8.6.5 Strings
- 8.7 Function
- 8.7.1 Function Definition
- 8.7.2 Function Call
- 8.7.3 Function Parameters
- 8.7.4 Return Statement
- 8.7.5 Function Modifiers
- 8.7.6 Function Types
- 8.7.7 Fallback Function
- 8.7.8 Function Overloading
- 8.7.9 Cryptographic Functions
- 8.8 Contracts
- 8.8.1 Constructor
- 8.8.2 State Variables
- 8.8.3 Function
- 8.9 Events
- 8.10 Error Handling
- Chapter 9 Installing Frameworks, Deploying, and Testing Smart Contracts in Ethereum Platform
- 9.1 Introduction
- 9.2 Gas and Transaction
- 9.2.1 Transaction Consensus
- 9.3 Smart Contract Account
- 9.3.1 Smart Contract Structure
- 9.4 Deployment of the Contract in Ethereum Rinkeby Test Network
- 9.5 Web3 Library
- 9.5.1 Ganache Module
- 9.5.2 Fetching Accounts from Ganache
- 9.5.3 Asynchronous Method for Fetching Accounts
- 9.6 Metamask extension
- 9.6.1 Infura
- 9.7 Testing with Mocha Framework
- 9.8 Design of a Smart Contract
- 9.8.1 Deciding Variables and Functions for Smart Contract
- 9.8.2 Entering the Lottery Contract
- 9.8.3 Validation with "require" Statement
- 9.9 Pseudo Random Number Generator
- 9.9.1 Methodology Used for Pseudo Random Number Generator
- 9.9.2 Selecting the Winner.
- 9.9.3 Sending Ether from Contract.
- Notes:
- Description based on: online resource; title from PDF information screen (Routledge, viewed December 29, 2022).
- ISBN:
- 1-00-303258-3
- 1-000-17883-8
- 1-003-03258-3
- 9781003032588
- OCLC:
- 1197745571
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.