Security analysis on block chain using the Ecc and sha algorithms

ISSN: 22783075
0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

This paper thinks about blockchain innovation-which is getting solid consideration from the business and furthermore being connected in numerous fields. Passwords assume an imperative job in day by day life in different figuring applications and assume a basic job in online confirmation. The fundamental go for utilizing passwords is to limit unapproved clients to get to the framework. Blockchain, as a new age technology, provides the necessary tools to ensure data integrity and data protection using some encryption. Smaller transaction size and higher transaction efficiency are the essential requirements of the blockchain.

Cite

CITATION STYLE

APA

Aruna, B., Ajay Prakash, A., & Srinija, M. S. (2019). Security analysis on block chain using the Ecc and sha algorithms. International Journal of Innovative Technology and Exploring Engineering, 8(8), 1996–2001.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free