The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Consequent Formation in Security With Blockchain in Digital Transformation
Abstract
Blockchain technology makes use of a centralized, peer-to-peer (P2P) network of databases, also called nodes, to validate and record digital transactions between individual users located anywhere across the globe. These transactions often take place through the exchange of cryptocurrencies such as bitcoins, Ethereum, and Ripple, etc. The security and transparency that is inherently present in digital transactions place blockchain technology in high demand across various industrial applications. Each node updates its database in real-time as and when transactions occur. The transaction gets authorized only when a majority of the nodes in the network validate the transaction. Once the verification is complete, a block, consisting of hash and keys, is generated for each new transaction and is linked to previous transactions in every database. Every node updates its database with the new block. A hacker would have to break down every node in the system to commit fraud. Blockchain could play a major role in maintaining the cyber security of digital transactions in the future.
Related Content
Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini.
© 2024.
14 pages.
|
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
30 pages.
|
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan.
© 2024.
19 pages.
|
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi.
© 2024.
14 pages.
|
Meryeme Bououchma, Brahim Herrou.
© 2024.
14 pages.
|
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim.
© 2024.
16 pages.
|
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly.
© 2024.
10 pages.
|
|
|