SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Yoon CH, Kang JM. Journal of Engineering and Applied Sciences 2018; 13(3): 696-699.

Copyright

(Copyright © 2018)

DOI

10.3923/jeasci.2018.696.699

PMID

unavailable

Abstract

The block chain technology started with security technology. But it will bring a revolution in every area of society. A block chain is a continuously growing list of records, called blocks which are linked and secured using cryptography. Each block typically contains a cryptographic hash pointer as a link to a previous block, a timestamp and transaction data. Information such as cyber gambling, suicide prevention and fake news which are cyber threats can be managed by the information sharing exchange algorithm and forgery prevention technology of the block chain. This technology cannot access and modify the final information written on the ledger as well as it provides a source technology that cannot be manipulated by any hacking, theoretically. This study is expected to contribute to the strengthening of the block chain technology to solve the validity of the consortium block chain and the cyber vulnerable area. © Medwell Journals, 2018.


Language: en

Keywords

Suicide prevention; Korea; Security technology; Consortium block chain; Cryptographic hash pointer; Cyber gambling; Cyber vulnerable area

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print