ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Blockchain Technology for Secure Social Media Computing

دانلود کتاب فناوری بلاک چین برای محاسبات رسانه های اجتماعی ایمن

Blockchain Technology for Secure Social Media Computing

مشخصات کتاب

Blockchain Technology for Secure Social Media Computing

ویرایش:  
نویسندگان: , ,   
سری:  
ISBN (شابک) : 9781839535437, 9781839535444 
ناشر: The Institution of Engineering and Technology 
سال نشر: 2023 
تعداد صفحات: 265 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 8 Mb 

قیمت کتاب (تومان) : 33,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Blockchain Technology for Secure Social Media Computing به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری بلاک چین برای محاسبات رسانه های اجتماعی ایمن نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Contents
Preface
Foreword
About the editors
1 The blockchain technologies in online social media: insights, technologies, and applications
	Abstract
	1.1 Introduction
	1.2 Blockchain-based social media: insights from literature
	1.3 Blockchain: a facilitator for social media
		1.3.1 Freedom of expression and information privacy
		1.3.2 Permanency of saving user content
		1.3.3 Content producers to acquire money for generating and sharing owned content
	1.4 Blockchain-based OSM proposals
		1.4.1 SteemIt
		1.4.2 SocialX
		1.4.3 Sapien
		1.4.4 Hyperspace
	1.5 Summary and open problems
	1.6 Conclusion
	References
2 Blockchain-based security for social media computing
	Abstract
	2.1 Introduction
		2.1.1 Basics of blockchain
		2.1.2 Blockchain in social media
	2.2 Expanding and protecting freedom of speech
	2.3 Verifying the online user’s identity
	2.4 Security with blockchain in app-payments
		2.4.1 Blockchain advantages for app-payment security
		2.4.2 Blockchain disadvantages for app-payment security
	2.5 Authenticating legitimacy of social network content
		2.5.1 Fake news detection by knowledge-based approach
		2.5.2 Fake news detection by style-based approach
		2.5.3 Fake news detection by propagation-based approach
		2.5.4 Fake news detection by source-based approach
	2.6 Finding verified online shopping marketplace
		2.6.1 Verification steps for online marketplace
		2.6.2 Cryptographic negotiation protocol modelling criteria for online marketplace
		2.6.3 Verifying intermediates policies
		2.6.4 Role of online business-to-business marketplace in trust formation
	2.7 Conclusion
	References
3 Emerging trends with social network – design, models and handling
	Abstract
	3.1 Introduction
		3.1.1 Types of SNs
		3.1.2 SN analysis
	3.2 Social networking challenges
		3.2.1 SN open challenges
		3.2.2 Research-related challenges
	3.3 Social networking models
		3.3.1 Static SN model
		3.3.2 Dynamic SN model
		3.3.3 Static vs. dynamic SN
	3.4 Social media fraud information handling and detection
		3.4.1 Fraud detection
		3.4.2 Fraud prevention
	3.5 SNs design factors
	3.6 SN threats and challenges
		3.6.1 Security challenges
		3.6.2 Promising security solutions
	3.7 Security perspectives in social networking
		3.7.1 Risk perspective
		3.7.2 Student perspective
		3.7.3 Company perspective
		3.7.4 Trust perspective
		3.7.5 Information sharing perspective
		3.7.6 Cyber-crime perspective
	3.8 Conclusion
	References
4 Social networking: challenges, security issues, and emerging trends
	Abstract
	4.1 Introduction
	4.2 Challenging aspects of social networking
		4.2.1 Privacy
		4.2.2 Access for those with disabilities
		4.2.3 Cyber security
		4.2.4 Commercial advertising
		4.2.5 Terms of agreements
		4.2.6 Data protection
		4.2.7 Optimizing transparency
		4.2.8 Fake profile detection
		4.2.9 Understanding phishing risks
	4.3 Network models: static and dynamic
	4.4 Fake news detection and its prevention
		4.4.1 Content based
		4.4.2 Social context based
		4.4.3 Fake news prevention
	4.5 Factors that affect the design of social networks
		4.5.1 The perception of social networking platform characteristics
		4.5.2 The reasons that people use the Internet
		4.5.3 Concerns about privacy
		4.5.4 Level of innovation
		4.5.5 Age
		4.5.6 Gender
	4.6 Security challenges and promising solutions in social networking
		4.6.1 Multimedia social threats
		4.6.2 Privacy-related threat
		4.6.3 Traditional network and information security threats
	4.7 Conclusion
	References
5 Social media computing: tools and deployment platform for smart contract
	Abstract
	5.1 Introduction
	5.2 What is blockchain
	5.3 Hashing algorithm
	5.4 Solidity
		5.4.1 Smart contract
		5.4.2 Compilation of smart contract
		5.4.3 Mainnet vs. Testnet
		5.4.4 Variables
		5.4.5 Function
		5.4.6 Constructor
		5.4.7 Arrays in Solidity
		5.4.8 Loops in Solidity
		5.4.9 IF-ELSE statement in Solidity
		5.4.10 Visibility in Solidity
	5.5 BCOSN framework
		5.5.1 Blockchain layer
		5.5.2 Application layer
		5.5.3 Storage layer
	5.6 Limitations of BCOSN
	5.7 Conclusions
	References
6 Privacy provisioning on blockchain transactions of decentralized social media
	Abstract
	6.1 Introduction
	6.2 Blockchain concepts
	6.3 Privacy issues in blockchain
		6.3.1 Transaction linkability
		6.3.2 Recovery and management of private-keys
		6.3.3 Nefarious smart contracts
		6.3.4 Privacy of on-chain data and non-erasable data
		6.3.5 Cryptographic-privacy performance
		6.3.6 Malicious-curious TTPs
	6.4 Review of blockchain privacy provisioning solutions
		6.4.1 Key privacy provisioning approaches in blockchain
		6.4.2 Anonymization methods for data
		6.4.3 Methods for data protection
	6.5 Analysis of privacy provisioning strategies
		6.5.1 SMPC
		6.5.2 Identity data anonymization
		6.5.3 Transaction data anonymization
		6.5.4 On-chain data protection
	6.6 Conclusions
	References
7 Blockchain-based knowledge graph for high-impact scientific collaboration networks
	Abstract
	7.1 Introduction
	7.2 Background
		7.2.1 Related works
		7.2.2 Blockchain
		7.2.3 Semantic technology and knowledge graph
		7.2.4 Resource description framework
		7.2.5 Knowledge graph on the blockchain network
	7.3 Methodology
		7.3.1 Knowledge graphs for managing efficient crowdsourcing in collaboration
		7.3.2 Construction of the blockchain networks
		7.3.3 Agent-based modelling and collective intelligence for knowledge extraction and knowledge integration
		7.3.4 Data integration and protection on blockchain
	7.4 Scenarios and use cases
		7.4.1 Using blockchain and knowledge-driven application
in international collaboration of grant application in
pharmaceutical research
		7.4.2 EHR data integration and collective diagnosis modeling through blockchain protected network for scientific collaboration
		7.4.3 Computational knowledge sharing in the research of material science
	7.5 Conclusion
	References
8 5G multimedia communication and blockchain technology: emerging potential and challenges
	Abstract
	8.1 Introduction
	8.2 Integration BC trust in 5G mobile networks
		8.2.1 5G network architecture
		8.2.2 Drivers for BC integration
	8.3 Social network multimedia platforms
		8.3.1 High-quality multimedia content
		8.3.2 AR immersive communication
	8.4 Concluding remarks
	References
9 IoT-based system for intellectual property protection in social media using blockchain
	Abstract
	9.1 Introduction
		9.1.1 Blockchain technology’s importance for IoT
		9.1.2 Examples of how they can be combined are:
	9.2 Key aspects of blockchain security
	9.3 Design of an IoT and blockchain-based framework to secure intellectual property
	9.4 Future of blockchain in IoT ecosystem
	9.5 Conclusions
	References
10 Blockchain architecture for social opinion vote-cast system
	Abstract
	10.1 Introduction
	10.2 Background
		10.2.1 Characteristics of blockchain architecture
		10.2.2 Essential components of the blockchain architecture
	10.3 Literature survey
		10.3.1 Dalia et al. [11]
		10.3.2 Shahandashti and Hao
		10.3.3 Kiayias and Yung
		10.3.4 Chaum et al.
		10.3.5 McCorry et al.
		10.3.6 Bell et al.
	10.4 Analyzing existing blockchain implementation
		10.4.1 Exonum
		10.4.2 Quorum
		10.4.3 Geth
	10.5 Analyses of existing voting systems and requirements
		10.5.1 Shortcoming of existing voting systems
		10.5.2 Requirement for the proposed voting system
	10.6 Analysis of existing voting solutions
		10.6.1 FollowMyVote
		10.6.2 Estonian e-Voting system
		10.6.3 Civitas
	10.7 Proposed system
		10.7.1 Defining blocks in voting system
		10.7.2 System structure
		10.7.3 Smart contract
		10.7.4 Voting registration
		10.7.5 Tallying votes
	10.8 Conclusion
	Acknowledgement
	References
11 Blockchain technology for next-generation society: current trends and future opportunities for smart era
	Abstract
	11.1 Introduction to blockchain
	11.2 Related work
	11.3 Evolution and timeline of blockchain
		11.3.1 Phase 1 of blockchain evolution
		11.3.2 Phase 2 of blockchain evolution
		11.3.3 Phase 3 of blockchain evolution
	11.4 Blockchain in IoT and other computing platforms
	11.5 Characteristics of blockchain over other technologies
	11.6 Types of blockchain and comparisons
	11.7 Types of consensus algorithms
		11.7.1 Types
	11.8 Applications and use cases of blockchain
	11.9 Attacks and threats
	11.10 Challenges and future trends
	11.11 Conclusion
	References
12 Blockchain technologies in healthcare social media computing: trends and opportunities
	Abstract
	12.1 Introduction
	12.2 Contemporary aspects of blockchain technology
	12.3 Need of blockchain in social sectors
		12.3.1 Blockchain impact on social computing
	12.4 Blockchain technology in the healthcare industry
		12.4.1 Capabilities of blockchain technology in healthcare
		12.4.2 Healthcare security through blockchain
	12.5 Healthcare social media computing architecture
	12.6 Discussion
	12.7 Conclusion
	References
13 Conclusion and wrap-up
Further Reading
Index
Back Cover




نظرات کاربران