Chapter Blockchain Applications in Cybersecurity
Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure i...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
InTechOpen
2019
|
Subjects: | |
Online Access: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | oapen_2024_20_500_12657_49299 | ||
005 | 20210602 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20210602s2019 xx |||||o ||| 0|eng d | ||
020 | |a intechopen.90061 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5772/intechopen.90061 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UTC |2 bicssc | |
100 | 1 | |a Gómez, Eneko |4 auth | |
700 | 1 | |a de Diego, Santiago |4 auth | |
700 | 1 | |a Lage, Oscar |4 auth | |
700 | 1 | |a Urkizu, Borja |4 auth | |
700 | 1 | |a Gutiérrez, Iván |4 auth | |
245 | 1 | 0 | |a Chapter Blockchain Applications in Cybersecurity |
260 | |b InTechOpen |c 2019 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Blockchain has been widely known thanks to Bitcoin and the cryptocurrencies. In this chapter, we analyze different aspects that relate to the application of blockchain with techniques commonly used in the field of cybersecurity. Beginning by introducing the use of blockchain technology as a secure infrastructure, the document delves into how blockchain can be useful to achieve several security requirements, common to most applications. The document has been focused on some specific cybersecurity disciplines to maintain simplicity: backup and recovery, threat intelligence and content delivery networks. As illustrated, some projects and initiatives are in the process of joining these two fields to provide solutions to existing problems. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Cloud computing |2 bicssc | |
653 | |a blockchain, DLT, trust, cybersecurity, IoT, IIoT | ||
773 | 1 | 0 | |7 nnaa |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/id/67960bb7-6a6c-4c74-b687-82d456bac464/70087.pdf |7 0 |z OAPEN Library: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/handle/20.500.12657/49299 |7 0 |z OAPEN Library: description of the publication |