280
Index
Blockchain for Government, 133–137
Blockchain for IoT Security, 57–69
Blockchain.gov, 133, 136–137
Blockchain.gov.in, 134–135
Blockchain in Digital Forensics, 235–245
Blockchain in healthcare applications, 170
Blockchain in Oil and Gas Industry, 181–198
Blockchain IoT, 33
Blockchain land registry system, 82–83
Blockchain layer, 29
Blockchain ledger, 8, 31, 44, 48, 100–101,
105, 173
Blockchain mechanism, 90, 156
Blockchain network, 5, 82, 130, 157, 164, 169,
173, 214, 261, 264, 270
blockchain technology, 1–275
use, 14, 25, 49, 128
Blockchain Technology Fundamentals, 181, 183
Blockchain technology trends in Vietnam,
212, 214
Blockchain transactions, 8, 46, 171, 177,
194, 208
Blocks, new, 2, 28, 37, 168, 195, 240–241, 260
Blood Bank Management System, 133
Bloomberg New Energy Finance (BNEF), 112
BNEF (Bloomberg New Energy Finance), 112
BTC, 24, 251
BTCB (Bitcoin BEP2), 24
C
Capital markets, 91, 222, 228–229
CBDCs (Central Bank Digital Currencies),
222, 225
Central authority, 2, 15, 19, 61, 81, 106, 165,
184, 235
Central Bank Digital Currencies (CBDCs),
222, 225
Central banks (CBs), 16, 91, 105, 214, 223–224
Centre of Excellence (CoE), 133–138
Centre of excellence in blockchain technology,
133–137
Chain of custody (CoC), 241–243
Challenges, 33, 62, 66–69, 78–79, 99–100, 110,
120–121, 134–136, 192–193, 216,
237–238, 245, 275
emerging, 138
CISTI (Conference on Information Systems and
Technologies), 51
Cloud security, 232
Cloud storage, 46–47, 171, 178, 244
blockchain-based distributed, 244–245
CoC (chain of custody), 241–243
CoE (Centre of Excellence), 133–138
CoE in blockchain technology, 133, 138
Common Security Challenges, 38–43
Components of Blockchain, 74
Confidentiality, 15, 21, 30, 32–33, 50, 60, 80,
171–172, 244–245
Congressional Research Service (CRS), 105
Connectivity, 113, 140, 264, 271
Consensus Algorithm Algorithm, 187
Consensus algorithms, 37, 47, 68, 167–168, 181,
183–184, 186–187
Consensus protocols, 15, 64–66, 75, 260,
263–264, 273, 275
Contracts, 7, 31, 119, 165, 173, 184, 196, 225, 243
Counteracting Actions on Common Security
Challenges, 38–43
Covid-19 pandemic, 25, 214
Credit, 79, 229
Cronbach Alpha, 95
Crowd-financing, 115
Crowdfunding, 115, 158
Crowdsourcing sybil detection, 54
CRS (Congressional Research Service), 105
Cryptocurrencies, 1–4, 5–8, 13–25, 77, 88–92,
95–107, 111, 158, 169–170, 221–225,
233, 247–249, 261
use, 22–23, 97, 100
Cryptocurrencies in Zimbabwe, 88, 105
Cryptocurrency benefits, 91
Cryptocurrency ecosystems, 90, 106
Cryptocurrency exchanges, 19–20, 103–104,
106, 159
Cryptocurrency mining, 100, 177
Cryptocurrency system, 21, 102, 104–105
Cryptocurrency technologies, 11, 22
Cryptocurrency transactions, 209
Cryptocurrency users, 92–93, 105–106
Cryptography, 15, 76, 97, 131, 181, 187, 224,
231, 247
Cryptography hash algorithm, 260
Cryptography techniques, 39, 224
Cryptography technology, 174
Cryptology, 20, 25
Crypto-wallets, 10
CTF (counter-terrorism financing), 231
Current IoT systems, 44
Cyberattacks, 28, 99, 140, 232
Cybersecurity, 140, 231
Cybersecurity Attacks, 232
D
DAG (directed acyclic graph), 39, 261–262,
271, 275
DAG data structure, 264, 274
Data accuracy, 80
Data analytics
intelligent, 263
real-time, 113, 263