Blockchain and Ethereum Smart Contract Solution Development by Unknown
Author:Unknown
Language: eng
Format: epub
Published: 2022-08-23T00:00:00+00:00
Chapter 5 BLOCKChaIN IMpLeMeNtatIONS OVerVIeW: BItCOIN, ethereUM,
aND hYperLeDGer
method or the delegated proof-of-stake method. But what we've done is
by confirming their identity, they have created disincentives for them for
colluding or compromising the blockchain.
This is an exciting area of research within the blockchain and
distributed computing community. There are many more consensus
mechanisms, such as proof of elapsed time and proof of history,
being proposed than the three we have briefly described in this
section. Oyinloye, Teh, Jamil, & Alawida, M. (2021) provide an overview of
alternate consensus protocols.
Ethereum
Part 2 of this book takes a deep dive into Ethereum and Enterprise
Ethereum, explaining how blockchain business applications can be
developed using Ethereum. In this section, we provide a brief overview of
Ethereum and the implementation differences with Bitcoin. Ethereum is
an alternate implementation of blockchain, different from Bitcoin in some
very important ways.
In the previous section, we saw that in Bitcoin, the terms and
conditions underlying transactions had to be very simple. Bitcoin wanted
to keep the smart contract very simple because complicated smart
contracts had risks of high computation costs and a higher likelihood of
software defects.
The founder of Ethereum, Vitalik Buterin,13 who was involved early on in the Bitcoin community, felt that while Bitcoin was great digital money,
the scripting language, Bitcoin Script, that was used to specify smart
contracts was too weak. In addition to value exchange payments facilitated
by Bitcoin, Buterin envisioned a class of decentralized applications
that would be enabled by the features of distributed ledgers, privacy
preservation, consensus, and smart contracts. Buterin outlined a vision
13 https://en.wikipedia.org/wiki/Vitalik_Buterin
187
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6520)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6237)
Machine Learning Security Principles by John Paul Mueller(6206)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(5876)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5844)
Solidity Programming Essentials by Ritesh Modi(4003)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3646)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3375)
Future Crimes by Marc Goodman(3345)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Blockchain Basics by Daniel Drescher(3292)
Learn Computer Forensics - Second Edition by William Oettinger(3141)
Mobile App Reverse Engineering by Abhinav Mishra(2879)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
Incident Response with Threat Intelligence by Roberto MartÃnez(2861)
The Code Book by Simon Singh(2823)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2779)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2689)
