P Senthil Pandian, S Valli Mayil, P Murugan, M Suresh
{"title":"Analysis of blockchain in its standard, development and solicitation","authors":"P Senthil Pandian, S Valli Mayil, P Murugan, M Suresh","doi":"10.30574/gjeta.2024.18.1.0014","DOIUrl":null,"url":null,"abstract":"The purpose of the article is to expand knowledge about the applications block chains described in the scientific literature. Blockchain is a decentralized management technology transactions and data, introduced in 2008, whose first use was the famous crypto currency Bitcoin. Diversity possible applications of blockchain technology i In , the initial state of research in this field was stimulated interests and publications on this topic. The built-in features of this technology ensure security and anonymity and data integrity create interesting areas of research, particularly from the perspective of technical challenges and limitations. Security features of many important systems in many industries rely on what is known as “Safety Through”. Ambiguity (Berentsen,2020) in security technology. Research in this direction aims to keep security mechanisms and system implementation in a complete state anonymity. However, the main disadvantage of this method is the problem with is that if we find out, the entire system could collapse Security mechanism. A fact that will become known later several studies show that this practice is becoming virtually impossible with the use of revolutionary blockchain technology.","PeriodicalId":402125,"journal":{"name":"Global Journal of Engineering and Technology Advances","volume":"5 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global Journal of Engineering and Technology Advances","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30574/gjeta.2024.18.1.0014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The purpose of the article is to expand knowledge about the applications block chains described in the scientific literature. Blockchain is a decentralized management technology transactions and data, introduced in 2008, whose first use was the famous crypto currency Bitcoin. Diversity possible applications of blockchain technology i In , the initial state of research in this field was stimulated interests and publications on this topic. The built-in features of this technology ensure security and anonymity and data integrity create interesting areas of research, particularly from the perspective of technical challenges and limitations. Security features of many important systems in many industries rely on what is known as “Safety Through”. Ambiguity (Berentsen,2020) in security technology. Research in this direction aims to keep security mechanisms and system implementation in a complete state anonymity. However, the main disadvantage of this method is the problem with is that if we find out, the entire system could collapse Security mechanism. A fact that will become known later several studies show that this practice is becoming virtually impossible with the use of revolutionary blockchain technology.
本文旨在扩展科学文献中描述的区块链应用知识。区块链是一种去中心化的交易和数据管理技术,于2008年问世,其首次应用是著名的加密货币比特币。区块链技术可能应用的多样性 i 在,该领域研究的初始状态激发了人们对这一主题的兴趣并发表了相关论文。该技术的内置功能确保了安全性、匿名性和数据完整性,从而创造了有趣的研究领域,尤其是从技术挑战和限制的角度来看。许多行业的许多重要系统的安全功能都依赖于所谓的 "安全穿越"。安全技术中的模糊性(Berentsen,2020 年)。该方向的研究旨在使安全机制和系统实施保持完全的匿名状态。但是,这种方法的主要缺点是,如果我们发现了这个问题,整个系统的安全机制就会崩溃。后来的一些研究表明,随着革命性区块链技术的使用,这种做法几乎变得不可能。