00829nam a2200229 i 450099100163245970753620020502203308.0970703s1996 us ||| | eng 0803958269b11541374-39ule_instPRUMB64830ExLDip. SSSCitaMacBeth, Tannis M.528333Tuning in to yong viewers :social science perspecyives on television /ed. Tannis M. MacBethThousand Oaks :Sage,c1996274 p. ;23 cm..b1154137421-09-0601-07-02991001632459707536LE021 NOD7312021000001963le021-E0.00-l- 00000.i1174034601-07-02Tuning in to yong viewers815744UNISALENTOle02101-01-97ma -engus 0104149nam 22005295 450 991100256370332120250510155230.0981-9636-86-810.1007/978-981-96-3686-0(CKB)38776254100041(DE-He213)978-981-96-3686-0(MiAaPQ)EBC32107877(Au-PeEL)EBL32107877(OCoLC)1524422987(EXLCZ)993877625410004120250510d2025 u| 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierSharding Blockchain: Fundamentals and Applications /by Yizhong Liu, Dongyu Li, Jianwei Liu1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (XVIII, 335 p. 93 illus., 58 illus. in color.) 981-9636-85-X Introduction -- Building Blocks of Sharding Blockchain Systems -- Shard Reconfiguration Protocol Realizing Fairness -- Shard Reconfiguration Protocol Against Proof-of-Work Solution Withhold Attack -- Secure and Scalable Sharding Blockchain Utilizing Aggregation-Supported Multi-Signature -- Secure and Scalable Sharding Blockchain with a Formal Security Framework -- Secure and Scalable Sharding Blockchain Based on Cross-Shard Byzantine Fault Tolerance -- Sharding Blockchain Application in Cross-Domain Data Sharing Under Zero-Trust Cloud-Edge-End Environments -- Sharding Blockchain Application in Cross-Domain Authentication Management System -- Sharding Blockchain Application in Consensus Control and Formation Flying of Intelligent Systems.This book presents a novel approach by decoupling the various modules of sharding blockchains and providing detailed insights into the functions and design methodologies of each key module. Previous sharding blockchain solutions suffered from tight coupling between functional modules, making it challenging to achieve optimal security, performance, and scalability. Building upon this foundation, the authors present a universal composable method for composing sharding blockchains in a flexible manner. Additionally, the authors propose a novel shard member configuration method that leverages proof-of-work and verifiable distributed randomness to guarantee that each shard maintains a sufficient proportion of honest nodes, preventing it from falling below the safety threshold. Furthermore, the authors offer a complete design methodology for creating secure and scalable sharding blockchains. This includes reducing the complexity of intra-shard transaction processing through aggregation-supported multi-signature. The authors ensure optimal sharding of computational, communication, and storage resources within a formal security framework. To facilitate flexible cross-shard transaction processing, the authors introduce a new cross-shard Byzantine fault tolerance protocol. Lastly, the authors explore practical applications of sharding blockchains in typical scenarios. In the context of zero-trust cloud-edge-end scenarios, the authors demonstrate how sharding blockchains enable scalable data cross-shard sharing. Simultaneously, the authors design a secure and universally applicable cross-domain device authentication scheme.Computational intelligenceArtificial intelligenceComputational IntelligenceArtificial IntelligenceComputational intelligence.Artificial intelligence.Computational Intelligence.Artificial Intelligence.006.3Liu Yizhongauthttp://id.loc.gov/vocabulary/relators/aut1821140Li Dongyuauthttp://id.loc.gov/vocabulary/relators/autLiu Jianweiauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9911002563703321Sharding Blockchain: Fundamentals and Applications4384752UNINA