LEADER 01371nam0 22003251i 450 001 UON00018664 005 20231205102007.345 010 $a08-248-1247-6 100 $a20020107d1993 |0itac50 ba 101 $aeng 102 $aUS 105 $a|||| 1|||| 200 1 $aComparative literature East and West$eTraditions and trends$fedited by Cornelia N. Moore, Raymond A. Moody 205 $a2nd print 210 $a[Honolulu]$cUniversity of Hawaii Press, College of Languages, Linguistics and Literature$d1993 215 $aXV, 219 p.$d22 cm 316 $aMM.BB.CC.AA.$5IT-UONSI INTVI/053 410 1$1001UON00033781$12001 $aLiterary Studies East and West$v1 606 $aLETTERATURE COMPARATE$xORIENTE E OCCIDENTE$3UONC012988$2FI 620 $aUS$dHonolulu$3UONL000136 686 $aINT VI$cINTERAREALE - LETTERATURA$2A 702 1$aMOODY$bRaymond A.$3UONV024786 702 1$aMOORE$bCornelia N.$3UONV024785 712 $aUniversity of Hawai?i Press$3UONV245880$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00018664 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI INT VI 053 $eSI SA 89926 5 053 MM.BB.CC.AA. 996 $aComparative literature East and West$91197803 997 $aUNIOR LEADER 04149nam 22005295 450 001 9911002563703321 005 20250510155230.0 010 $a981-9636-86-8 024 7 $a10.1007/978-981-96-3686-0 035 $a(CKB)38776254100041 035 $a(DE-He213)978-981-96-3686-0 035 $a(MiAaPQ)EBC32107877 035 $a(Au-PeEL)EBL32107877 035 $a(OCoLC)1524422987 035 $a(EXLCZ)9938776254100041 100 $a20250510d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSharding Blockchain: Fundamentals and Applications /$fby Yizhong Liu, Dongyu Li, Jianwei Liu 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (XVIII, 335 p. 93 illus., 58 illus. in color.) 311 08$a981-9636-85-X 327 $aIntroduction -- Building Blocks of Sharding Blockchain Systems -- Shard Reconfiguration Protocol Realizing Fairness -- Shard Reconfiguration Protocol Against Proof-of-Work Solution Withhold Attack -- Secure and Scalable Sharding Blockchain Utilizing Aggregation-Supported Multi-Signature -- Secure and Scalable Sharding Blockchain with a Formal Security Framework -- Secure and Scalable Sharding Blockchain Based on Cross-Shard Byzantine Fault Tolerance -- Sharding Blockchain Application in Cross-Domain Data Sharing Under Zero-Trust Cloud-Edge-End Environments -- Sharding Blockchain Application in Cross-Domain Authentication Management System -- Sharding Blockchain Application in Consensus Control and Formation Flying of Intelligent Systems. 330 $aThis book presents a novel approach by decoupling the various modules of sharding blockchains and providing detailed insights into the functions and design methodologies of each key module. Previous sharding blockchain solutions suffered from tight coupling between functional modules, making it challenging to achieve optimal security, performance, and scalability. Building upon this foundation, the authors present a universal composable method for composing sharding blockchains in a flexible manner. Additionally, the authors propose a novel shard member configuration method that leverages proof-of-work and verifiable distributed randomness to guarantee that each shard maintains a sufficient proportion of honest nodes, preventing it from falling below the safety threshold. Furthermore, the authors offer a complete design methodology for creating secure and scalable sharding blockchains. This includes reducing the complexity of intra-shard transaction processing through aggregation-supported multi-signature. The authors ensure optimal sharding of computational, communication, and storage resources within a formal security framework. To facilitate flexible cross-shard transaction processing, the authors introduce a new cross-shard Byzantine fault tolerance protocol. Lastly, the authors explore practical applications of sharding blockchains in typical scenarios. In the context of zero-trust cloud-edge-end scenarios, the authors demonstrate how sharding blockchains enable scalable data cross-shard sharing. Simultaneously, the authors design a secure and universally applicable cross-domain device authentication scheme. 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aComputational Intelligence 606 $aArtificial Intelligence 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 676 $a006.3 700 $aLiu$b Yizhong$4aut$4http://id.loc.gov/vocabulary/relators/aut$01821140 702 $aLi$b Dongyu$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aLiu$b Jianwei$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911002563703321 996 $aSharding Blockchain: Fundamentals and Applications$94384752 997 $aUNINA