top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Nxt : unsurpassable blockchain solutions / / writers, Apenzl [and nine others] ; editor: Robert Bold
Nxt : unsurpassable blockchain solutions / / writers, Apenzl [and nine others] ; editor: Robert Bold
Autore Apenzl
Pubbl/distr/stampa La Chaux-de-Fonds, Switzerland : , : Valeur d'Histoire, , [2017]
Descrizione fisica 1 online resource (114 pages)
Disciplina 005.74
Soggetto topico Blockchains (Databases)
ISBN 2-9700947-8-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910164985903321
Apenzl  
La Chaux-de-Fonds, Switzerland : , : Valeur d'Histoire, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Oracle blockchain quick start guide : a practical approach to implementing blockchain in your enterprise / / Vivek Acharya, Anand Eswararao Yerrapati, Nimesh Prakash
Oracle blockchain quick start guide : a practical approach to implementing blockchain in your enterprise / / Vivek Acharya, Anand Eswararao Yerrapati, Nimesh Prakash
Autore Acharya Vivek
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, England ; ; Mumbai : , : Packt, , [2019]
Descrizione fisica 1 online resource (344 pages)
Disciplina 005.824
Soggetto topico Blockchains (Databases)
ISBN 1-78980-130-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910793614603321
Acharya Vivek  
Birmingham, England ; ; Mumbai : , : Packt, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Oracle blockchain quick start guide : a practical approach to implementing blockchain in your enterprise / / Vivek Acharya, Anand Eswararao Yerrapati, Nimesh Prakash
Oracle blockchain quick start guide : a practical approach to implementing blockchain in your enterprise / / Vivek Acharya, Anand Eswararao Yerrapati, Nimesh Prakash
Autore Acharya Vivek
Edizione [1st edition]
Pubbl/distr/stampa Birmingham, England ; ; Mumbai : , : Packt, , [2019]
Descrizione fisica 1 online resource (344 pages)
Disciplina 005.824
Soggetto topico Blockchains (Databases)
ISBN 1-78980-130-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910814964503321
Acharya Vivek  
Birmingham, England ; ; Mumbai : , : Packt, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
A practical guide to trading and tracing for the energy blockchain / / edited by Giuseppe Sciumè, Eleonora Riva Sanseverino, Pierluigi Gallo
A practical guide to trading and tracing for the energy blockchain / / edited by Giuseppe Sciumè, Eleonora Riva Sanseverino, Pierluigi Gallo
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (178 pages)
Disciplina 333.79
Collana UNIPA Springer
Soggetto topico Blockchains (Databases)
ISBN 3-030-96607-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910568249503321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Predictive analytics in cloud, fog, and edge computing : perspectives and practices of Blockchain, IoT, and 5G / / edited by Hiren Kumar Thakkar [and three others]
Predictive analytics in cloud, fog, and edge computing : perspectives and practices of Blockchain, IoT, and 5G / / edited by Hiren Kumar Thakkar [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (252 pages)
Disciplina 621.38456
Soggetto topico Blockchains (Databases)
5G mobile communication systems
Cloud computing
ISBN 3-031-18034-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgement -- Contents -- Collaboration of IoT and Cloud Computing Towards HealthcareSecurity -- 1 Introduction -- 2 Inspiration -- 3 Related Work and Background -- 4 Cloud Computing Deployment Models -- 4.1 Public Internet -- 4.2 Corporate Cloud -- 4.3 Cloud Hybrid -- 4.4 Cloud Provider -- 5 Utility Computing Service Models -- 5.1 Software as a Service (SaaS) -- 5.2 Infrastructure as a Service (IaaS) -- 5.3 Platform as a Service (PaaS) -- 6 Security Issues -- 7 Threats in Cloud Computing -- 7.1 Compromised Identities and Broken Security -- 7.2 Data Infringement -- 7.3 Hacked Frontier and APIs -- 7.4 Manipulated System Vulnerabilities -- 7.5 Permanent Data Loss -- 7.6 Inadequate Assiduity -- 7.7 Cloud Service Inattention -- 7.8 DoS Attacks -- 7.9 Security Challenges in Cloud Infrastructure -- 7.9.1 Security Challenges -- 7.9.2 Challenges of Deployed Models -- 7.9.3 Resource Pooling -- 7.9.4 Unencrypted Data -- 7.9.5 Identity Management and Authentication -- 7.9.6 Network Issues -- 7.10 Point at Issue in the IoT Health Care Framework -- 7.10.1 Reliability -- 7.10.2 Discretion -- 7.10.3 Solitude -- 7.10.4 Unintended Efforts -- 7.11 Challenges -- 7.11.1 Security -- 7.11.2 Confidentiality -- 7.11.3 Assimilation -- 7.11.4 Business Illustration -- 7.12 Dispensing Refined Patient Supervision -- 7.13 Character of IoT in Healthcare -- 7.14 Conclusion -- 7.15 Future Work -- References -- Robust, Reversible Medical Image Watermarking for Transmission of Medical Images over Cloud in Smart IoT Healthcare -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 EHR Insertion (Embedding) and Retrieval (Extraction) -- 3.2 EHR Encryption and Decryption -- 4 Experimental Results and Discussion -- 5 Conclusions -- References -- The Role of Blockchain in Cloud Computing -- 1 Blockchain -- 1.1 Introduction -- 1.2 Characteristics.
1.2.1 Immutability -- 1.2.2 Distributed -- 1.2.3 Enhanced Security -- 1.2.4 Distributed Ledgers -- 1.2.5 Faster Settlement -- 1.2.6 Working of Blockchain -- 1.3 Major Implementations -- 1.3.1 Cryptocurrencies -- 1.3.2 Smart Contracts -- 1.3.3 Monetary Services -- 1.3.4 Games -- 1.4 Blockchain Types -- 1.5 There Are Mainly 4 Types of Blockchain as Shown in Table 1 -- 1.5.1 Public Blockchain Networks -- 1.5.2 Exclusive Blockchain Networks -- 1.5.3 Hybrid Blockchain Networks -- 1.5.4 Consortium Networks -- 1.6 Advantages -- 1.6.1 Secure -- 1.6.2 There Will Be No Intervention from Third Parties -- 1.6.3 Safe Transactions -- 1.6.4 Automation -- 1.7 Disadvantages -- 1.7.1 High Implementation Cost -- 1.7.2 Incompetency -- 1.7.3 Private Keys -- 1.7.4 Storage Capacity -- 2 Cloud Computing -- 2.1 What Is Cloud Computing? -- 2.2 Deployment Models in Cloud -- 2.2.1 Public Cloud -- 2.2.2 Private Cloud -- 2.2.3 Hybrid Cloud -- 2.2.4 Community Cloud -- 2.3 Implementations of Cloud Computing -- 2.3.1 Web Based Services -- 2.3.2 Software as a Service -- 2.3.3 Infrastructure as a Service -- 2.3.4 Platform as a Service -- 2.4 Comparison of Cloud Computing Model with Traditional Model -- 2.4.1 Persistency -- 2.4.2 Automation -- 2.4.3 Cost -- 2.4.4 Security -- 2.5 Advantages of Cloud Computing -- 2.5.1 Cost Efficiency -- 2.5.2 Backup and Recovery -- 2.5.3 Integration of Software -- 2.5.4 Information Availability -- 2.5.5 Deployment -- 2.5.6 Easier Scale for Services and Delivery of New Services -- 2.6 Challenges of Cloud Computing -- 2.6.1 Technical Problems -- 2.6.2 Certainty -- 2.6.3 Vulnerable Attacks -- 2.6.4 Suspension -- 2.6.5 Inflexibility -- 2.6.6 Lack of Assistance -- 2.7 Integration of Cloud Computing with Block Chain -- 2.7.1 The Advantages of Combining Cloud and Blockchain Technology -- 2.7.2 Blockchain Support for Cloud Computing.
2.7.3 Deduplication of Data in the Cloud with Blockchain -- 2.7.4 Access Control Based on Blockchain in Cloud -- References -- Analysis and Prediction of Plant Growth in a Cloud-Based Smart Sensor Controlled Environment -- 1 Introduction -- 2 Literature Survey -- 3 IoT in Greenhouse -- 3.1 Architecture -- 3.2 Cloud Implementation -- 3.3 Hardware Components (Fig. 2) -- 4 System Overview -- 4.1 Dataset -- 4.2 Data Preprocessing -- 4.3 LightGBM -- 4.4 Training and Building the Model -- 5 Results and Explanation -- 6 Conclusion -- References -- Cloud-Based IoT Controlled System Model for Plant DiseaseMonitoring -- 1 Introduction -- 2 Literature Survey -- 3 IoT Controlled Device -- 4 Cloud Architecture -- 5 Methodology -- 5.1 HOG Filter -- 6 Experimental Analysis -- 6.1 Analysis Using Artificial Neural Network -- 6.2 Analysis Using Convolutional Neural Network -- 7 Conclusion -- References -- Design and Usage of a Digital E-Pharmacy Application Framework -- 1 Introduction -- 2 Literature Survey -- 3 Utilization of Cloud in Health Care -- 4 Redefining E-Pharmacy Domain -- 5 Impact of Cloud Computing in Pharmacy -- 6 Model Design and Implementation -- 7 Basic Structure of the Cloud Based E-Pharmacy Application -- 8 Security Provided by the Application -- 8.1 XSS Security (Cross Site Scripting) -- 8.2 CSRF Token (Cross Site Request Forgery) -- 8.3 SQL Injection Security -- 8.4 User Upload Security -- 9 Results and Discussion -- 10 Important Features of the Application -- 11 Critical Goals of the Application -- 12 Benefits of the Model -- 13 Summary/Conclusion -- References -- Serverless Data Pipelines for IoT Data Analytics: A Cloud Vendors Perspective and Solutions -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 2 Background -- 2.1 Internet of Things -- 2.2 Serverless Data Pipelines for IoT Data Processing -- 3 Literature Survey.
4 Cloud Service Providers (CSP) and IoT Solutions -- 4.1 Edge Tier -- 4.1.1 Comparison of AWS IoT Greengrass and Azure IoT Edge -- 4.2 Cloud Tier -- 5 Real-Time IoT Application: Predictive Maintenance of Industrial Motor -- 6 Building SDP for Predictive Maintenance Application -- 6.1 Proposed Serverless Data Pipelines -- 6.1.1 Building an Anomaly Detection Model -- 6.2 SDP Using AWS and Microsoft Azure -- 7 Experiments and Results -- 7.1 Performance Metrics -- 7.2 Experimental Setup -- 7.3 Results and Discussions -- 8 Conclusions -- References -- Integration of Predictive Analytics and Cloud Computing for Mental Health Prediction -- 1 Introduction -- 2 Method of Approach -- 2.1 Overview of the Subject -- 2.1.1 Supervised Learning -- 2.1.2 Unsupervised Learning -- 2.2 Selection of Papers -- 2.3 Literature Search Strategy -- 2.4 Study Selection -- 2.5 Data Extraction and Analysis -- 3 Introduction to Mental Health Research -- 3.1 Machine Learning in Big Data -- 3.2 Deep Learning in Healthcare -- 3.3 Natural Language Processing -- 4 The Pipeline of Data Flows from the Sensors to the Algorithmic Approach -- 4.1 Sensor Data -- 4.2 Extraction of Features -- 4.3 Designing the Behavioural Markers -- 4.4 Clinical Target -- 5 Cloud Computing -- 5.1 Architecture of Cloud Computing -- 5.2 Benefits of Cloud Computing in the Healthcare Industry -- 5.3 Cloud Computing as a Solution to Mental Health Issues -- 6 Review of Personal Sensing Research -- 7 Result of the Research -- 7.1 Limitations of the Study Done on the Algorithms to Detect Mental Health -- 7.2 Results Based on iCBT Test -- 8 Discussion -- 9 Conclusion -- References -- Impact of 5G Technologies on Cloud Analytics -- 1 Introduction -- 2 Self-Organizing Next Generation Network Data Analytics in the Cloud -- 2.1 What Is Network Data Analytics? -- 2.2 Benefits of Network Data Analytics.
2.3 The Best Uses of Network Data Analytics -- 2.4 The Near Future -- 2.5 The Opportunities -- 3 Intelligent 5G Network Estimation Techniques in the Cloud -- 3.1 Network Estimation Technique -- 3.2 Literature Review -- 4 5G-cloud Integration: Intelligent Security Protocol and Analytics -- 4.1 Scope -- 4.2 5G Cloud Threat -- 4.3 5G-Cloud Integration -- 4.4 Advantages of Security Capabilities -- 5 5G, Fog and Edge Based Approaches for Predictive Analytics -- 5.1 Introduction -- 5.2 Literature Review -- 6 5G and Beyond in Cloud, Edge, and Fog Computing -- 6.1 Edge Computing -- 6.2 Cloud Computing -- 6.3 5G and Beyond -- 7 AI-Enabled Next Generation 6G Wireless Communication -- 7.1 Computation Efficiency and Accuracy -- 7.2 Hardware Development -- 7.3 Types 6 G Wireless Communication -- 7.4 6G Wireless Access Use Case -- References -- IoT Based ECG-SCG Big Data Analysis Framework for Continuous Cardiac Health Monitoring in Cloud Data Centers -- 1 Introduction -- 2 Related Work -- 3 Proposed Cardiac Big Data Analysis Framework -- 3.1 ECG/SCG Data Collection Framework -- 3.2 Data Processing and Analysis Framework -- 3.3 MapReduce Based Cardiac Big Data Processing Model -- 4 Evaluation Results -- 5 Conclusion and Future Works -- References -- A Workload-Aware Data Placement Scheme for Hadoop-Enabled MapReduce Cloud Data Centers -- 1 Introduction -- 2 Related Works -- 3 Problem Description -- 4 Proposed Protocol -- 4.1 System Model -- 5 Problem Formulation -- 5.1 Network Model -- 5.2 Task Processing Model -- 5.3 Workload Distribution -- 6 Data Locality Problem -- 7 Conclusion and Future Works -- References -- 5G Enabled Smart City Using Cloud Environment -- 1 Introduction -- 2 Technologies Used to Build the Smart City -- 2.1 Edge and Fog Computing -- 2.2 What Price Does 5G Provide for Fog Computing? -- 2.3 Cloud Computing -- 2.4 Internet of Things.
3 SmartCity Architecture.
Record Nr. UNINA-9910635395503321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Predictive analytics in cloud, fog, and edge computing : perspectives and practices of Blockchain, IoT, and 5G / / edited by Hiren Kumar Thakkar [and three others]
Predictive analytics in cloud, fog, and edge computing : perspectives and practices of Blockchain, IoT, and 5G / / edited by Hiren Kumar Thakkar [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (252 pages)
Disciplina 621.38456
Soggetto topico Blockchains (Databases)
5G mobile communication systems
Cloud computing
ISBN 3-031-18034-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgement -- Contents -- Collaboration of IoT and Cloud Computing Towards HealthcareSecurity -- 1 Introduction -- 2 Inspiration -- 3 Related Work and Background -- 4 Cloud Computing Deployment Models -- 4.1 Public Internet -- 4.2 Corporate Cloud -- 4.3 Cloud Hybrid -- 4.4 Cloud Provider -- 5 Utility Computing Service Models -- 5.1 Software as a Service (SaaS) -- 5.2 Infrastructure as a Service (IaaS) -- 5.3 Platform as a Service (PaaS) -- 6 Security Issues -- 7 Threats in Cloud Computing -- 7.1 Compromised Identities and Broken Security -- 7.2 Data Infringement -- 7.3 Hacked Frontier and APIs -- 7.4 Manipulated System Vulnerabilities -- 7.5 Permanent Data Loss -- 7.6 Inadequate Assiduity -- 7.7 Cloud Service Inattention -- 7.8 DoS Attacks -- 7.9 Security Challenges in Cloud Infrastructure -- 7.9.1 Security Challenges -- 7.9.2 Challenges of Deployed Models -- 7.9.3 Resource Pooling -- 7.9.4 Unencrypted Data -- 7.9.5 Identity Management and Authentication -- 7.9.6 Network Issues -- 7.10 Point at Issue in the IoT Health Care Framework -- 7.10.1 Reliability -- 7.10.2 Discretion -- 7.10.3 Solitude -- 7.10.4 Unintended Efforts -- 7.11 Challenges -- 7.11.1 Security -- 7.11.2 Confidentiality -- 7.11.3 Assimilation -- 7.11.4 Business Illustration -- 7.12 Dispensing Refined Patient Supervision -- 7.13 Character of IoT in Healthcare -- 7.14 Conclusion -- 7.15 Future Work -- References -- Robust, Reversible Medical Image Watermarking for Transmission of Medical Images over Cloud in Smart IoT Healthcare -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 EHR Insertion (Embedding) and Retrieval (Extraction) -- 3.2 EHR Encryption and Decryption -- 4 Experimental Results and Discussion -- 5 Conclusions -- References -- The Role of Blockchain in Cloud Computing -- 1 Blockchain -- 1.1 Introduction -- 1.2 Characteristics.
1.2.1 Immutability -- 1.2.2 Distributed -- 1.2.3 Enhanced Security -- 1.2.4 Distributed Ledgers -- 1.2.5 Faster Settlement -- 1.2.6 Working of Blockchain -- 1.3 Major Implementations -- 1.3.1 Cryptocurrencies -- 1.3.2 Smart Contracts -- 1.3.3 Monetary Services -- 1.3.4 Games -- 1.4 Blockchain Types -- 1.5 There Are Mainly 4 Types of Blockchain as Shown in Table 1 -- 1.5.1 Public Blockchain Networks -- 1.5.2 Exclusive Blockchain Networks -- 1.5.3 Hybrid Blockchain Networks -- 1.5.4 Consortium Networks -- 1.6 Advantages -- 1.6.1 Secure -- 1.6.2 There Will Be No Intervention from Third Parties -- 1.6.3 Safe Transactions -- 1.6.4 Automation -- 1.7 Disadvantages -- 1.7.1 High Implementation Cost -- 1.7.2 Incompetency -- 1.7.3 Private Keys -- 1.7.4 Storage Capacity -- 2 Cloud Computing -- 2.1 What Is Cloud Computing? -- 2.2 Deployment Models in Cloud -- 2.2.1 Public Cloud -- 2.2.2 Private Cloud -- 2.2.3 Hybrid Cloud -- 2.2.4 Community Cloud -- 2.3 Implementations of Cloud Computing -- 2.3.1 Web Based Services -- 2.3.2 Software as a Service -- 2.3.3 Infrastructure as a Service -- 2.3.4 Platform as a Service -- 2.4 Comparison of Cloud Computing Model with Traditional Model -- 2.4.1 Persistency -- 2.4.2 Automation -- 2.4.3 Cost -- 2.4.4 Security -- 2.5 Advantages of Cloud Computing -- 2.5.1 Cost Efficiency -- 2.5.2 Backup and Recovery -- 2.5.3 Integration of Software -- 2.5.4 Information Availability -- 2.5.5 Deployment -- 2.5.6 Easier Scale for Services and Delivery of New Services -- 2.6 Challenges of Cloud Computing -- 2.6.1 Technical Problems -- 2.6.2 Certainty -- 2.6.3 Vulnerable Attacks -- 2.6.4 Suspension -- 2.6.5 Inflexibility -- 2.6.6 Lack of Assistance -- 2.7 Integration of Cloud Computing with Block Chain -- 2.7.1 The Advantages of Combining Cloud and Blockchain Technology -- 2.7.2 Blockchain Support for Cloud Computing.
2.7.3 Deduplication of Data in the Cloud with Blockchain -- 2.7.4 Access Control Based on Blockchain in Cloud -- References -- Analysis and Prediction of Plant Growth in a Cloud-Based Smart Sensor Controlled Environment -- 1 Introduction -- 2 Literature Survey -- 3 IoT in Greenhouse -- 3.1 Architecture -- 3.2 Cloud Implementation -- 3.3 Hardware Components (Fig. 2) -- 4 System Overview -- 4.1 Dataset -- 4.2 Data Preprocessing -- 4.3 LightGBM -- 4.4 Training and Building the Model -- 5 Results and Explanation -- 6 Conclusion -- References -- Cloud-Based IoT Controlled System Model for Plant DiseaseMonitoring -- 1 Introduction -- 2 Literature Survey -- 3 IoT Controlled Device -- 4 Cloud Architecture -- 5 Methodology -- 5.1 HOG Filter -- 6 Experimental Analysis -- 6.1 Analysis Using Artificial Neural Network -- 6.2 Analysis Using Convolutional Neural Network -- 7 Conclusion -- References -- Design and Usage of a Digital E-Pharmacy Application Framework -- 1 Introduction -- 2 Literature Survey -- 3 Utilization of Cloud in Health Care -- 4 Redefining E-Pharmacy Domain -- 5 Impact of Cloud Computing in Pharmacy -- 6 Model Design and Implementation -- 7 Basic Structure of the Cloud Based E-Pharmacy Application -- 8 Security Provided by the Application -- 8.1 XSS Security (Cross Site Scripting) -- 8.2 CSRF Token (Cross Site Request Forgery) -- 8.3 SQL Injection Security -- 8.4 User Upload Security -- 9 Results and Discussion -- 10 Important Features of the Application -- 11 Critical Goals of the Application -- 12 Benefits of the Model -- 13 Summary/Conclusion -- References -- Serverless Data Pipelines for IoT Data Analytics: A Cloud Vendors Perspective and Solutions -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 2 Background -- 2.1 Internet of Things -- 2.2 Serverless Data Pipelines for IoT Data Processing -- 3 Literature Survey.
4 Cloud Service Providers (CSP) and IoT Solutions -- 4.1 Edge Tier -- 4.1.1 Comparison of AWS IoT Greengrass and Azure IoT Edge -- 4.2 Cloud Tier -- 5 Real-Time IoT Application: Predictive Maintenance of Industrial Motor -- 6 Building SDP for Predictive Maintenance Application -- 6.1 Proposed Serverless Data Pipelines -- 6.1.1 Building an Anomaly Detection Model -- 6.2 SDP Using AWS and Microsoft Azure -- 7 Experiments and Results -- 7.1 Performance Metrics -- 7.2 Experimental Setup -- 7.3 Results and Discussions -- 8 Conclusions -- References -- Integration of Predictive Analytics and Cloud Computing for Mental Health Prediction -- 1 Introduction -- 2 Method of Approach -- 2.1 Overview of the Subject -- 2.1.1 Supervised Learning -- 2.1.2 Unsupervised Learning -- 2.2 Selection of Papers -- 2.3 Literature Search Strategy -- 2.4 Study Selection -- 2.5 Data Extraction and Analysis -- 3 Introduction to Mental Health Research -- 3.1 Machine Learning in Big Data -- 3.2 Deep Learning in Healthcare -- 3.3 Natural Language Processing -- 4 The Pipeline of Data Flows from the Sensors to the Algorithmic Approach -- 4.1 Sensor Data -- 4.2 Extraction of Features -- 4.3 Designing the Behavioural Markers -- 4.4 Clinical Target -- 5 Cloud Computing -- 5.1 Architecture of Cloud Computing -- 5.2 Benefits of Cloud Computing in the Healthcare Industry -- 5.3 Cloud Computing as a Solution to Mental Health Issues -- 6 Review of Personal Sensing Research -- 7 Result of the Research -- 7.1 Limitations of the Study Done on the Algorithms to Detect Mental Health -- 7.2 Results Based on iCBT Test -- 8 Discussion -- 9 Conclusion -- References -- Impact of 5G Technologies on Cloud Analytics -- 1 Introduction -- 2 Self-Organizing Next Generation Network Data Analytics in the Cloud -- 2.1 What Is Network Data Analytics? -- 2.2 Benefits of Network Data Analytics.
2.3 The Best Uses of Network Data Analytics -- 2.4 The Near Future -- 2.5 The Opportunities -- 3 Intelligent 5G Network Estimation Techniques in the Cloud -- 3.1 Network Estimation Technique -- 3.2 Literature Review -- 4 5G-cloud Integration: Intelligent Security Protocol and Analytics -- 4.1 Scope -- 4.2 5G Cloud Threat -- 4.3 5G-Cloud Integration -- 4.4 Advantages of Security Capabilities -- 5 5G, Fog and Edge Based Approaches for Predictive Analytics -- 5.1 Introduction -- 5.2 Literature Review -- 6 5G and Beyond in Cloud, Edge, and Fog Computing -- 6.1 Edge Computing -- 6.2 Cloud Computing -- 6.3 5G and Beyond -- 7 AI-Enabled Next Generation 6G Wireless Communication -- 7.1 Computation Efficiency and Accuracy -- 7.2 Hardware Development -- 7.3 Types 6 G Wireless Communication -- 7.4 6G Wireless Access Use Case -- References -- IoT Based ECG-SCG Big Data Analysis Framework for Continuous Cardiac Health Monitoring in Cloud Data Centers -- 1 Introduction -- 2 Related Work -- 3 Proposed Cardiac Big Data Analysis Framework -- 3.1 ECG/SCG Data Collection Framework -- 3.2 Data Processing and Analysis Framework -- 3.3 MapReduce Based Cardiac Big Data Processing Model -- 4 Evaluation Results -- 5 Conclusion and Future Works -- References -- A Workload-Aware Data Placement Scheme for Hadoop-Enabled MapReduce Cloud Data Centers -- 1 Introduction -- 2 Related Works -- 3 Problem Description -- 4 Proposed Protocol -- 4.1 System Model -- 5 Problem Formulation -- 5.1 Network Model -- 5.2 Task Processing Model -- 5.3 Workload Distribution -- 6 Data Locality Problem -- 7 Conclusion and Future Works -- References -- 5G Enabled Smart City Using Cloud Environment -- 1 Introduction -- 2 Technologies Used to Build the Smart City -- 2.1 Edge and Fog Computing -- 2.2 What Price Does 5G Provide for Fog Computing? -- 2.3 Cloud Computing -- 2.4 Internet of Things.
3 SmartCity Architecture.
Record Nr. UNISA-996547962603316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Principles and practice of blockchains / / edited by Kevin Daimi, Ioanna Dionysiou, and Nour El Madhoun
Principles and practice of blockchains / / edited by Kevin Daimi, Ioanna Dionysiou, and Nour El Madhoun
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (398 pages)
Disciplina 005.74
Soggetto topico Blockchains (Databases)
ISBN 3-031-10507-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgments -- Contents -- About the Editors -- Part I Blockchain Fundamentals -- Fundamentals of Blockchain Technology -- 1 Introduction -- 2 Blockchain Features and Architecture -- 2.1 Proof of Work (PoW) -- 2.2 Proof of Stake (PoS) -- 2.3 Proof of Burn (PoB) -- 2.4 Proof of Capacity (PoC) -- 2.5 Proof of Elapsed Time (PoET) -- 3 Smart Contracts -- 4 Security Features -- 4.1 Security on Infrastructure -- 4.1.1 Decentralisation -- 4.1.2 Transparency -- 4.1.3 Immutability -- 4.1.4 Consistency -- 4.2 Security on Transactions -- 5 Applications -- 5.1 Electronic Voting -- 5.2 Healthcare Services -- 5.3 Identity Management -- 5.4 Access Control -- 5.5 Decentralised Notaries -- 5.6 Supply Chain Management -- 6 Conclusion and Future Works -- References -- Identification of Illicit Blockchain Transactions Using Hyperparameters Auto-tuning -- 1 Introduction -- 2 Related Work -- 3 Experimental Dataset -- 4 Experimental Setup and Evaluation -- 4.1 Offline Learning -- 4.2 Online Learning -- 4.3 PCA Analysis -- 5 Conclusions -- References -- Multidimensional Blockchain: Construction and Security Analysis -- 1 Introduction -- 2 Robust Distributed Ledgers -- 3 Multidimensional Blockchain -- 4 Multidimensional Blockchain Security Analysis -- 4.1 Security Analysis of Underlying Robust Distributed Ledgers -- 4.2 Intersystem Exchange Security Analysis -- 4.3 Scaling Security Analysis -- 5 Search and Verification Protocol -- 6 Theoretical and Experimental Analysis -- 7 Conclusion -- References -- Blockchain Project Workflow Execution for Trustless Operation -- 1 Introduction -- 2 Literature Review -- 2.1 Blockchain and Workflow Operations -- 2.2 Salient Features of Blockchain -- 2.3 Blockchain Structure -- 2.4 Project Workflow Trustless Operation -- 2.5 Smart Contract and Workflow Project Dynamics.
2.6 Structure of the Smart Contract in Workflow -- 2.7 Smart Contracts and Traditional Contracts -- 2.8 Smart Contract Applications -- 2.9 Advantages of Smart Contracts -- 2.10 Information and Sharing in Inter-organizational Workflows -- 2.11 Blockchain-Smart Contract Workflow Solutions -- 2.12 Project Workflow Execution Layers -- 3 Proposed Methodology -- 4 Results and Discussions -- 4.1 Smart Contracts: Ethereum Platform -- 4.2 Concept of Cryptocurrency -- 4.3 Decentralized Applications (DApps) -- 5 Survey Research on Blockchain Applications -- 5.1 Smart Contract and Blockchain in Food Tracing -- 5.2 Blockchain in Food Traceability: A Systematic Literature Review -- 5.3 Blockchain Technology in Supply Chain -- 5.4 Towards Automated Migration for Blockchain-Based Decentralized Application -- 5.5 Ensure Traceability in European Food Supply Chain by Using a Blockchain System -- 5.6 A Proof-of-Concept of Farmer-to-Consumer Food Traceability on Blockchain for Local Communities -- 5.7 Blockchain and IoT-Based Food Traceability for Smart Agriculture -- 5.8 A Trustworthy Food Resume Traceability System Based on Blockchain Technology -- 5.9 Smart Contract and Blockchain in Food Tracing -- 5.10 Blockchain Technologies and Their Applications in Data Science and Cyber Security -- 5.11 Towards Automated Migration for Blockchain-Based Decentralized Application -- 5.12 Rebuilding Food Supply Chain with the Introduction of Decentralized Credit Mechanism -- 6 Conclusion -- References -- Part II Blockchains in Internet of Things and Mobile Phones -- Protecting Location Privacy in Blockchain-Based Mobile Internet of Things -- 1 Introduction -- 2 Related Work -- 3 System Overview and Design Goals -- 3.1 Blockchain System Model -- 3.2 Malicious Entities -- 3.3 Attacker's Goal and Strategies -- 3.4 Problem Formulation and Design Goals -- 4 The BlockPriv Approach.
5 Scheme Analysis -- 5.1 Privacy Analysis -- 5.1.1 Privacy Bound -- 5.1.2 Obfuscating Paths -- 5.2 Utility Analysis -- 5.2.1 Loss of Utility Bound -- 5.3 Security Analysis -- 5.3.1 Collusion Attack -- 5.3.2 Map Matching Attack -- 5.3.3 Time Reachability-Based Path Reconstruction Attack -- 5.3.4 Transaction Dropping Attack -- 5.3.5 Security Limitations -- 6 Experimental Evaluation -- 6.1 Experimental Settings -- 6.1.1 Dataset Description -- 6.1.2 Simulation Setup -- 6.2 Experiment Results -- 6.2.1 Utility Versus Privacy Level -- 6.2.2 Utility Versus Number of Sensitive Location Types -- 6.2.3 User-Level Correlation Analysis -- 7 Conclusion and Future Direction -- References -- A Blockchain-Based Machine Learning Intrusion Detection System for Internet of Things -- 1 Introduction -- 2 IoT Security Attacks and Their Solutions -- 3 Blockchain of Things (Blockchain with IoT) -- 3.1 Advantages of Blockchain of Things -- 3.2 Disadvantages of Blockchain of Things -- 3.3 Some Related Work of Blockchain of Things -- 4 ML and DL Algorithms in IoT Security -- 5 Combining Technologies (Blockchain, IoT, and ML/DL) for IoT Security -- 5.1 Brief Summary of Our Problem Statement -- 5.2 Our Proposed Approach -- 6 Experimentation and Results -- 7 Conclusions and Future Directions -- References -- ECOM: Epoch Randomness-Based Consensus Committee Configuration for IoT Blockchains -- 1 Introduction -- 2 An Overview of Scaling Blockchain Solutions -- 2.1 Off-Chain Blockchain Solutions -- 2.2 On-Chain Blockchain -- 3 Epoch Randomness and Configuration -- 3.1 Verifiable Random Function (VRF) -- 3.2 Verifiable Secret Sharing (VSS) -- 3.3 Publicly Verifiable Secret Sharing (PVSS) -- 4 Network Traffic Model in Blockchain -- 4.1 Unstructured P2P Network Model -- 4.2 Structured P2P Network Model -- 5 ECOM: An Epoch Randomness-Based Committee Configuration for IoT Blockchains.
5.1 ECOM System Design -- 5.2 Prototype Implementation -- 5.3 Performance Evaluation -- 5.4 Security Analysis -- 6 Conclusions -- References -- Customer Outcome Framework for Blockchain-Based Mobile Phone Applications -- 1 Introduction -- 2 Literature Review -- 2.1 Singapore's Electronic Payment Journey -- 2.2 Blockchain and AI Combination in the Metaverse -- 2.3 Mobile Payment Applications -- 2.4 Personalized Recommendation Systems -- 2.5 Shopping Motivation Using BMPAs -- 2.6 Means-End Chain Theory -- 2.7 Social Identity Theory -- 2.8 Prospect Theory -- 2.9 Utilitarian Value, Hedonic Value, and BMPA Identification -- 2.10 BMPA Trustworthiness, BMPA Identification, and Repeat Customers' BMPA Usage -- 2.11 Perceived Risk -- 2.12 Control Variables and the Research Model -- 3 Discussions -- 3.1 Theoretical Implications -- 3.2 Practical Implications -- 3.3 Limitation -- 4 Conclusions and Future Research -- References -- Part III Blockchains and Healthcare -- A Secure Decentralized Privacy-Preserving Healthcare System Using Blockchain -- 1 Introduction -- 2 Overview and Related Work -- 2.1 Consensus Protocols -- 2.1.1 Proof-of-Work (PoW) -- 2.1.2 Proof-of-Stake (PoS) -- 2.1.3 Delegated Proof-of-Stake (DPoS) -- 2.1.4 Proof-of-Authority (PoA) -- 2.1.5 Access Control Mechanism with Smart Contract for Data Sharing -- 2.2 Smart Contract -- 3 Methodology -- 3.1 System Design -- 3.2 Content Extraction Signature -- 3.2.1 Key Generation GK(k) -- 3.2.2 Signature Generation Algorithm Sig (SK, M, CEAS) -- 3.2.3 Signature Extraction Algorithm Ext(pk,M,σF,X) -- 3.2.4 Signature Verification Algorithm Ver(pk,M,σE) -- 4 Implementation -- 4.1 Front End -- 4.2 EHR Manager -- 4.3 Ethereum Proof-of-Authority -- 4.4 Storing EHR -- 4.5 Sharing of EHR -- 5 Evaluation -- 5.1 Security Assessment -- 5.1.1 Privacy and Sharing -- 5.1.2 Storage Management -- 5.1.3 Data Audit.
6 Conclusion -- References -- An Investigation of Blockchain Technology and Smart Contracts Deployment in Smart Medicine 4.0 -- 1 Introduction -- 1.1 Smart Life -- 1.2 Smart Contracts -- 2 Current Blockchain Technology and Smart Contracts Issues and Challenges -- 2.1 Blockchain and Smart Contracts in a Nutshell -- 2.2 Advantages in Comparison with Non-blockchain Systems -- 2.2.1 Generic Blockchain Advantages -- 2.2.2 Blockchain Advantages for Healthcare Industry -- 2.2.3 Blockchain and Smart Contracts Challenges -- 2.2.4 Security of IoT and IoHT Critical Infrastructure: Blockchain as a Solution -- 2.2.5 Summary -- 2.3 Legislation and Legislative Initiatives Related to Blockchain and Smart Contracts in Different Jurisdictions -- 2.3.1 General Legal Regulation Provisions of Blockchain and Smart Contracts -- 2.3.2 Health Insurance Portability and Accountability Act of 1996 (HIPAA) -- 2.3.3 General Data Protection Regulation (GDPR) -- 2.3.4 Smart Medicine as a Target: The European Union Agency for Cybersecurity (ENISA) Recommendations -- 3 Internet of Health Things Blockchain and Smart Contracts -- 3.1 Attacks on the Healthcare Sector: Defense on the Base of the Blockchain -- 3.2 IoT-Blockchain-Based Monitoring Model and Smart Contract as a Verification Link for Smart Healthcare Purposes -- 3.3 Successful Implementation of the Blockchain and Smart Contracts for Secure HER Sharing in E-Healthcare -- 3.4 Health Records Authorization Process with the Implementation of the Permissioned Blockchain and Smart Contracts: ABAC as an Important Tool for Smart Healthcare -- 3.5 Extended Usage of the Smart Contracts: Functionalities of Smart Contracts -- 3.6 GDPR Insight: Combination of GDPR and Blockchain -- 3.7 Healthcare Data-Trading Market Based on Blockchain -- 3.8 Blockchain-Based Healthcare Monitoring Architecture.
3.9 IoT-Blockchain Ecosystem: Combination of Blockchain and Swarm Exchange Techniques.
Record Nr. UNISA-996546822203316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Principles and practice of blockchains / / edited by Kevin Daimi, Ioanna Dionysiou, and Nour El Madhoun
Principles and practice of blockchains / / edited by Kevin Daimi, Ioanna Dionysiou, and Nour El Madhoun
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (398 pages)
Disciplina 005.74
Soggetto topico Blockchains (Databases)
ISBN 3-031-10507-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgments -- Contents -- About the Editors -- Part I Blockchain Fundamentals -- Fundamentals of Blockchain Technology -- 1 Introduction -- 2 Blockchain Features and Architecture -- 2.1 Proof of Work (PoW) -- 2.2 Proof of Stake (PoS) -- 2.3 Proof of Burn (PoB) -- 2.4 Proof of Capacity (PoC) -- 2.5 Proof of Elapsed Time (PoET) -- 3 Smart Contracts -- 4 Security Features -- 4.1 Security on Infrastructure -- 4.1.1 Decentralisation -- 4.1.2 Transparency -- 4.1.3 Immutability -- 4.1.4 Consistency -- 4.2 Security on Transactions -- 5 Applications -- 5.1 Electronic Voting -- 5.2 Healthcare Services -- 5.3 Identity Management -- 5.4 Access Control -- 5.5 Decentralised Notaries -- 5.6 Supply Chain Management -- 6 Conclusion and Future Works -- References -- Identification of Illicit Blockchain Transactions Using Hyperparameters Auto-tuning -- 1 Introduction -- 2 Related Work -- 3 Experimental Dataset -- 4 Experimental Setup and Evaluation -- 4.1 Offline Learning -- 4.2 Online Learning -- 4.3 PCA Analysis -- 5 Conclusions -- References -- Multidimensional Blockchain: Construction and Security Analysis -- 1 Introduction -- 2 Robust Distributed Ledgers -- 3 Multidimensional Blockchain -- 4 Multidimensional Blockchain Security Analysis -- 4.1 Security Analysis of Underlying Robust Distributed Ledgers -- 4.2 Intersystem Exchange Security Analysis -- 4.3 Scaling Security Analysis -- 5 Search and Verification Protocol -- 6 Theoretical and Experimental Analysis -- 7 Conclusion -- References -- Blockchain Project Workflow Execution for Trustless Operation -- 1 Introduction -- 2 Literature Review -- 2.1 Blockchain and Workflow Operations -- 2.2 Salient Features of Blockchain -- 2.3 Blockchain Structure -- 2.4 Project Workflow Trustless Operation -- 2.5 Smart Contract and Workflow Project Dynamics.
2.6 Structure of the Smart Contract in Workflow -- 2.7 Smart Contracts and Traditional Contracts -- 2.8 Smart Contract Applications -- 2.9 Advantages of Smart Contracts -- 2.10 Information and Sharing in Inter-organizational Workflows -- 2.11 Blockchain-Smart Contract Workflow Solutions -- 2.12 Project Workflow Execution Layers -- 3 Proposed Methodology -- 4 Results and Discussions -- 4.1 Smart Contracts: Ethereum Platform -- 4.2 Concept of Cryptocurrency -- 4.3 Decentralized Applications (DApps) -- 5 Survey Research on Blockchain Applications -- 5.1 Smart Contract and Blockchain in Food Tracing -- 5.2 Blockchain in Food Traceability: A Systematic Literature Review -- 5.3 Blockchain Technology in Supply Chain -- 5.4 Towards Automated Migration for Blockchain-Based Decentralized Application -- 5.5 Ensure Traceability in European Food Supply Chain by Using a Blockchain System -- 5.6 A Proof-of-Concept of Farmer-to-Consumer Food Traceability on Blockchain for Local Communities -- 5.7 Blockchain and IoT-Based Food Traceability for Smart Agriculture -- 5.8 A Trustworthy Food Resume Traceability System Based on Blockchain Technology -- 5.9 Smart Contract and Blockchain in Food Tracing -- 5.10 Blockchain Technologies and Their Applications in Data Science and Cyber Security -- 5.11 Towards Automated Migration for Blockchain-Based Decentralized Application -- 5.12 Rebuilding Food Supply Chain with the Introduction of Decentralized Credit Mechanism -- 6 Conclusion -- References -- Part II Blockchains in Internet of Things and Mobile Phones -- Protecting Location Privacy in Blockchain-Based Mobile Internet of Things -- 1 Introduction -- 2 Related Work -- 3 System Overview and Design Goals -- 3.1 Blockchain System Model -- 3.2 Malicious Entities -- 3.3 Attacker's Goal and Strategies -- 3.4 Problem Formulation and Design Goals -- 4 The BlockPriv Approach.
5 Scheme Analysis -- 5.1 Privacy Analysis -- 5.1.1 Privacy Bound -- 5.1.2 Obfuscating Paths -- 5.2 Utility Analysis -- 5.2.1 Loss of Utility Bound -- 5.3 Security Analysis -- 5.3.1 Collusion Attack -- 5.3.2 Map Matching Attack -- 5.3.3 Time Reachability-Based Path Reconstruction Attack -- 5.3.4 Transaction Dropping Attack -- 5.3.5 Security Limitations -- 6 Experimental Evaluation -- 6.1 Experimental Settings -- 6.1.1 Dataset Description -- 6.1.2 Simulation Setup -- 6.2 Experiment Results -- 6.2.1 Utility Versus Privacy Level -- 6.2.2 Utility Versus Number of Sensitive Location Types -- 6.2.3 User-Level Correlation Analysis -- 7 Conclusion and Future Direction -- References -- A Blockchain-Based Machine Learning Intrusion Detection System for Internet of Things -- 1 Introduction -- 2 IoT Security Attacks and Their Solutions -- 3 Blockchain of Things (Blockchain with IoT) -- 3.1 Advantages of Blockchain of Things -- 3.2 Disadvantages of Blockchain of Things -- 3.3 Some Related Work of Blockchain of Things -- 4 ML and DL Algorithms in IoT Security -- 5 Combining Technologies (Blockchain, IoT, and ML/DL) for IoT Security -- 5.1 Brief Summary of Our Problem Statement -- 5.2 Our Proposed Approach -- 6 Experimentation and Results -- 7 Conclusions and Future Directions -- References -- ECOM: Epoch Randomness-Based Consensus Committee Configuration for IoT Blockchains -- 1 Introduction -- 2 An Overview of Scaling Blockchain Solutions -- 2.1 Off-Chain Blockchain Solutions -- 2.2 On-Chain Blockchain -- 3 Epoch Randomness and Configuration -- 3.1 Verifiable Random Function (VRF) -- 3.2 Verifiable Secret Sharing (VSS) -- 3.3 Publicly Verifiable Secret Sharing (PVSS) -- 4 Network Traffic Model in Blockchain -- 4.1 Unstructured P2P Network Model -- 4.2 Structured P2P Network Model -- 5 ECOM: An Epoch Randomness-Based Committee Configuration for IoT Blockchains.
5.1 ECOM System Design -- 5.2 Prototype Implementation -- 5.3 Performance Evaluation -- 5.4 Security Analysis -- 6 Conclusions -- References -- Customer Outcome Framework for Blockchain-Based Mobile Phone Applications -- 1 Introduction -- 2 Literature Review -- 2.1 Singapore's Electronic Payment Journey -- 2.2 Blockchain and AI Combination in the Metaverse -- 2.3 Mobile Payment Applications -- 2.4 Personalized Recommendation Systems -- 2.5 Shopping Motivation Using BMPAs -- 2.6 Means-End Chain Theory -- 2.7 Social Identity Theory -- 2.8 Prospect Theory -- 2.9 Utilitarian Value, Hedonic Value, and BMPA Identification -- 2.10 BMPA Trustworthiness, BMPA Identification, and Repeat Customers' BMPA Usage -- 2.11 Perceived Risk -- 2.12 Control Variables and the Research Model -- 3 Discussions -- 3.1 Theoretical Implications -- 3.2 Practical Implications -- 3.3 Limitation -- 4 Conclusions and Future Research -- References -- Part III Blockchains and Healthcare -- A Secure Decentralized Privacy-Preserving Healthcare System Using Blockchain -- 1 Introduction -- 2 Overview and Related Work -- 2.1 Consensus Protocols -- 2.1.1 Proof-of-Work (PoW) -- 2.1.2 Proof-of-Stake (PoS) -- 2.1.3 Delegated Proof-of-Stake (DPoS) -- 2.1.4 Proof-of-Authority (PoA) -- 2.1.5 Access Control Mechanism with Smart Contract for Data Sharing -- 2.2 Smart Contract -- 3 Methodology -- 3.1 System Design -- 3.2 Content Extraction Signature -- 3.2.1 Key Generation GK(k) -- 3.2.2 Signature Generation Algorithm Sig (SK, M, CEAS) -- 3.2.3 Signature Extraction Algorithm Ext(pk,M,σF,X) -- 3.2.4 Signature Verification Algorithm Ver(pk,M,σE) -- 4 Implementation -- 4.1 Front End -- 4.2 EHR Manager -- 4.3 Ethereum Proof-of-Authority -- 4.4 Storing EHR -- 4.5 Sharing of EHR -- 5 Evaluation -- 5.1 Security Assessment -- 5.1.1 Privacy and Sharing -- 5.1.2 Storage Management -- 5.1.3 Data Audit.
6 Conclusion -- References -- An Investigation of Blockchain Technology and Smart Contracts Deployment in Smart Medicine 4.0 -- 1 Introduction -- 1.1 Smart Life -- 1.2 Smart Contracts -- 2 Current Blockchain Technology and Smart Contracts Issues and Challenges -- 2.1 Blockchain and Smart Contracts in a Nutshell -- 2.2 Advantages in Comparison with Non-blockchain Systems -- 2.2.1 Generic Blockchain Advantages -- 2.2.2 Blockchain Advantages for Healthcare Industry -- 2.2.3 Blockchain and Smart Contracts Challenges -- 2.2.4 Security of IoT and IoHT Critical Infrastructure: Blockchain as a Solution -- 2.2.5 Summary -- 2.3 Legislation and Legislative Initiatives Related to Blockchain and Smart Contracts in Different Jurisdictions -- 2.3.1 General Legal Regulation Provisions of Blockchain and Smart Contracts -- 2.3.2 Health Insurance Portability and Accountability Act of 1996 (HIPAA) -- 2.3.3 General Data Protection Regulation (GDPR) -- 2.3.4 Smart Medicine as a Target: The European Union Agency for Cybersecurity (ENISA) Recommendations -- 3 Internet of Health Things Blockchain and Smart Contracts -- 3.1 Attacks on the Healthcare Sector: Defense on the Base of the Blockchain -- 3.2 IoT-Blockchain-Based Monitoring Model and Smart Contract as a Verification Link for Smart Healthcare Purposes -- 3.3 Successful Implementation of the Blockchain and Smart Contracts for Secure HER Sharing in E-Healthcare -- 3.4 Health Records Authorization Process with the Implementation of the Permissioned Blockchain and Smart Contracts: ABAC as an Important Tool for Smart Healthcare -- 3.5 Extended Usage of the Smart Contracts: Functionalities of Smart Contracts -- 3.6 GDPR Insight: Combination of GDPR and Blockchain -- 3.7 Healthcare Data-Trading Market Based on Blockchain -- 3.8 Blockchain-Based Healthcare Monitoring Architecture.
3.9 IoT-Blockchain Ecosystem: Combination of Blockchain and Swarm Exchange Techniques.
Record Nr. UNINA-9910767547803321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of International Conference on Network Security and Blockchain Technology : Icnsbt 2023 / / Jyotsna Kumar Mandal [and three others], editors
Proceedings of International Conference on Network Security and Blockchain Technology : Icnsbt 2023 / / Jyotsna Kumar Mandal [and three others], editors
Edizione [First edition.]
Pubbl/distr/stampa Singapore : , : Springer, , [2024]
Descrizione fisica 1 online resource (544 pages)
Disciplina 005.74
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Blockchains (Databases)
ISBN 981-9944-33-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine Learning Based Identification of DDoS Flood Attack in eHealth Cloud Environment -- Machine Learning Based Phishing E-mail Detection using Persuasion Principle and NLP Techniques -- Cryptanalysis and improvement of a mutual authentication scheme for smart grid communications -- Collision Avoidance and Drowsiness Detection System for Drivers -- A New Algorithm for Encryption and Decryption Using AUM Block Sum Labeling -- Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation -- Face Mask Detection Exploiting CNN and MOBILENETV -- Malicious Transaction URL Detection Using Logistic Regression -- Secured Information Communication exploiting Fuzzy weight strategy -- Secure Data Communication Through Improved Multi-Level Pixel Value Ordering using Center-Folding Strategy -- Perseverance of the Audio Data using RNN Implied Matrix Segmentation based Lossless Encoder -- SVD based Watermarking Scheme for Medical Image Authentication -- Watermark based Image Authentication with Coefficient Value Differencing and Histogram Shifting -- IEMS3: An Image Encryption Scheme Using Modified SNOW 3G Algorithm.
Record Nr. UNINA-9910766896703321
Singapore : , : Springer, , [2024]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2021 / / Debasis Giri [and three others], editors
Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2021 / / Debasis Giri [and three others], editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (415 pages)
Disciplina 005.74
Collana Lecture notes in networks and systems
Soggetto topico Blockchains (Databases)
Computer networks - Security measures
Computer security
ISBN 981-19-3182-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910578698103321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui