Index
A
Abstract class
Address type
Alternate currencies
Application Bytecode Interface (ABI)
Application design decisions
consensus
data
development stack
smart contracts
stakeholder organization
tokens
transactions
Application themes
data sovereignty
payments
transparency
Arbitration
Arithmetic operations
Assert() function
Assert violation
Asset management tools
Asymmetric key cryptography
Atomic value exchanges
Auditors
Authorization through tx.origin
Automated Market Maker (AMM) mechanism
B
Backward compatible
Beacon chain
Bitcoin
block
block header fields
blocks
coinbase transaction
components
consensus mechanism
design decision
distributed ledger software
economics
fields
hash Merkle root of transactions
inputs and outputs structure
miners
mining node
mining reward
natural forks
network software component
node
permissionless public blockchain
proof-of-work consensus mechanism
script
smart contracts
transaction data structure
transaction life cycle
transactions
values in notional transaction
wallet software component
Bitcoin improvement proposals (BIP)
Blockchain
community
consensus
distributed ledger
implementation categorization
limitations
POW
privacy
provenance
purist perspective
smart contracts
SeeSmart contracts
specific variables
technology integration
Blockchain application
architectural layers
development process
success factors
Blockchain-based solutions
Blockchain-based systems solution
Blockchain Ethereum Classic (ETC)
Block header
Bob’s ping function
Boolean
Borrow cryptocurrency
Browser client
Brute-force search process
Burnability
Business problems
Business process
Business-to-business exchanges
Business use cases
Byte array
Bytecodes
32-Byte Crosschain ID
Byzantine Fault Tolerance (BFT) blockchain
C
CAP theorem
CAP theorem–related design trade-offs
Carbon credit market
Carbon credit token
Central bank digital currency (CBDC)
Centralized ledger
Centralized ownership
Chainlink
ChallengeWithdraw function
checkMerkleTree function
checkNotEqual() function
CLI clients
Client computers
Client nodes
Coding events
Coinbase transaction
Command-line interface (CLI)
Community-based blockchain networks
Community Telegram chat group
Compilation tools
Complexity of blockchain security
constraints of patches and upgradability
decentralized nature of blockchain
high value impact on business
privacy and anonymous nature of blockchain
trustless and permissionless environment
Consensus mechanism
ConsenSys package
Consistency
Consortium-based networks
Constraints
Constructor function
Contract accounts
Contract Bob
Core blockchain layer
Core capabilities of blockchain
Cross-chain contract
Crosschain ID
Crosschain identifier
registration and lookup service
requirements
Crosschain identity service
Crosschain ID registration
Crosschain ID smart contract
Crosschain Interoperability Task Force (CITF)
Crosschain operations
Cryptanalysis
Cryptocurrencies
Crypto exchanges
Cryptographic keys
Cryptography
CryptoKitty
Cryptology
asymmetric/public/private key cryptography
cryptanalysis
cryptography
encryption-decryption process
high-level encryption-decryption process
states of data
strong asymmetric key algorithms
strong symmetric key algorithms
D
Daily transactions
dApp clients
browser client
CLI clients
CLI format
desktop client
GUI format
mobile client
Data at rest
Data in transit
Data in use
Data-related inefficiencies
Data security risks
Data sharing
Data storage location
Data structures
data type
Decentralization
Decentralized applications
Decentralized Autonomous Organization (DAO)
Decentralized exchange (DEX)
Decentralized Insurance Platform
Decentralized Finance project (DeFi)
Delegated proof of stake
Deployment
DepositEvent class
Design trade-offs
Desktop clients
Development blockchain
Development stack
Digital signatures
fool-proof guarantee
hashing
limitation
one-way functions
process
Distributed applications (dApps)
Distributed ledger
block
databases and blockchain
implementation
peer nodes
privacy-preserving
rules
transactions
Distributed systems
CAP theorem
definition
high availability, strong consistency, and network partition tolerance
issues, goals, and approaches
real-world issue
complexity
consistency
failures
scalability
views
Domain name servers (DNS)
Drizzle
Dynamically size array
E
Economic exchange
Economic inefficiencies
Blockchain’s potential to address
data-related inefficiencies
data security risks
fees to third parties
fraud
potential of blockchain capability
privacy trade-offs
regulations and rules constraints
sources
time to settle transactions
Economics, Bitcoin
Emitted event
Encryption-decryption process
Energy consumption
Enterprise businesses
Enterprise Ethereum Alliance (EEA)
Entertainment applications
Enum
ERC20 specification
ERC20 tokens
ERC721 NFT token
ERP software
Ethereum
achievements
Bitcoin UTXOs
blockchain
boot nodes
client nodes
contract accounts
dApp architecture and development tools
distributed applications creation
Ether denominations
externally owned accounts
permissionless public blockchain
risks
SC
scalability and security
Solidity
transactions
transactions types
Ethereum 1.5
Ethereum 2
architecture
beacon chain
migration from Ethereum 1
mining node
POW to POS
running a validator nodes
sharding
uncertainties
Ethereum blockchain
advantages
and infrastructure
security
SeeSecurity
smart contracts
Ethereum blockchain architecture
application layer
components architecture and overview
core blockchain layer
Enterprise components layer
layers
network layer
tooling layer
Ethereum blockchain platform
Ethereum blockchains
Ethereum-compatible blockchains
Ethereum ecosystem projects
DAO
decentralized exchange (DEX)
Decentralized Insurance Platform
Fortmatic
hosted service
KYC and Identity
MetaMask
MyEtherWallet (MEW)
NFT application
Oracle service
smart contract–enabled banking dApp
Stablecoin
Ethereum EVM storage data
Ethereum gas fee
Ethereum gas mechanism
Ethereum improvement proposal (EIP)
Ethereum.js retrieves
Ethereum mainnet (ETH)
EIP-155
and ETC
and Ethereum Classic
plasma smart contract
transactions
Ethereum network
Ethereum public blockchain
Ethereum smart contract development
Ethereum testnet
Ethereum tools for smart contract development
Etherscan
Geth
MetaMask
Remix
tools and components
Truffle
Ethereum virtual machine (EVM)
Etherscan
Ether withdraw operation not protected
Events
defining
emitted
inheritable member
storing location
Exchange of money
Exchange rate
Exchange transactions
Externally owned accounts
F
Fault tolerance
Fault-tolerant distributed system
Filecoin project
Financial services industry
blockchain solutions
capabilities
CBDC
crypto exchanges
DeFi
economic inefficiencies
quintessential third party
redundant work/rework/reconciliation work
themes
Fixed size array
Fortmatic
Founder-directed network
Frequent flier points
Function
crosschain ID
getChainIdFromLegacyId
getChainIdInfo
getChainIdStatus
revoked
smart contract
Function access scopes
Functional security holes
Functional security holes, smart contracts
disabled smart contract
fund deadlock
fund leakage
Orphan smart contract
Function call value is not checked
Function modifier
Function-specific variables
Function visibility error
Fungible tokens
G
Ganache tool
Gas cost
Gas fee consideration
ecosystems
gas consumption
quantitative calculation
Gas station
Geth
Geth client
getMessage function
Gift cards
GitHub location
GitHub storage
H
Halting program operations
Hashed digital signatures
Hashing algorithms
hashMerkleRoot field
Healthcare applications
advocacy organizations
claims processing
clinical trials
consumers interact with clinical providers
economic inefficiencies
healthcare supply chain
provider credentialing
service cost
stakeholders
third-party administrators
Hyperledger
blockchain implementation
ecosystem
frameworks and tools
governance model
Hyperledger Fabric
I
Indirect costs
Information exchange
Information technology (IT)
Institute for Applied Network Security (IANS)
Integer
Integrated development environment (IDE)
Interfaces
Internal functions
Internet
InterWork Alliance (IWA)
J
JavaScript console
JavaScript files
JavaScript scripts
JavaScript VM
JSON RPC
K
Know Your Customers (KYC)
L
Layer 2
mechanisms
performance and scalability
plasma
SeePlasma
rollup
SC
smart contracts
Library
Logical operators
M
Mallory contract
Mapping data structures
Mapping data type
Membership rewards
Memory operations
Merkle tree
binary tree structure
checkMerkleTree function
code snippet
data integrity and processing efficiency
example
leaf nodes
MerkleDemo smart contract
Plasma Cash
plasma MVP
source code
testcasedemo function
MetaMask wallet
Migration from Ethereum 1 to Ethereum 2
Miner credentials
Miner node
Miner software component interfaces
Mintability
Mint event
Mobile client
Money
Bitcoin
challenges/drawbacks
commodities
contract
definition
exchange transactions
medium of exchange
properties
transactions
universally acceptable medium of exchange
msg variable
MyEtherWallet (MEW)
MythX security verification
N
NFT applications
NFT marketplace
NodeKey
Nonfungible tokens (NFTs)
Nonnative tokens
O
One-way functions
OpenSea
Open Systems Interconnection (OSI)
OpenZeppelin package
Optimistic layer 2
Optimistic Virtual Machine (OVM)
Oracle service
Ouroboros
Outdated compilers
Out-of-bound index
Out-of-bound write
P
P2P network layer communication
Payable functions
Peer-to-peer networks
Permissioned blockchains
Permissionless blockchains
Plasma
operators
plasma chains
smart contracts
transaction Merkle tree
SeeMerkle tree
transactions/smart contracts
Plasma blockchain
Plasma Cash
Plasma chains
Plasma MVP
Polkadot
Privacy
Privacy preservation
Privacy-preserving distributed ledgers
Privacy trade-offs
Private keys
Private permissioned blockchain
Private permissionless
Proof of authority (POA)
Proof-of-stake (POS)
Proof-of-work (POW)
Public blockchains
Public key
Public permissioned blockchain
Public permissionless blockchain
Q
Quadratic Arithmetic Program (QAP)
Quantitative analysis
Quantum computing
Quorum
R
Race conditions
Random Number Generator (RNG)
Rank-1 constraint systems (R1CS) format
RCP protocols
Reduce functions
Relational database management systems
Remix
Remix debugger
Remix development tools
Remix plug-in
Remote procedure calls (RPCs)
RETURN opcode
Ripple Labs
Rollup
optimistic layer 2
zk-SNARK
Root blockchain
RPC endpoint
S
S&H green stamps
SC wallet
Securities and Exchange Commission (SEC)
Security
attackable security holes in smart contracts
best practices for smart contracts
SeeSecurity practices, smart contracts
compiler vulnerabilities
data type and data vulnerabilities
arbitrary storage locations
authorization through tx.origin
block values
shadowing state variables
unused variables
variable value overflow/underflow
function vulnerabilities
assert violation
cross-chain contract
delegatecall function
DOS with failed function calls
ether withdraw operation not protected
function call value is not checked
race conditions and transaction order dependence
self-destruction functions
solidity deprecated functions
visibility error
signature vulnerabilities
software development
Security audit
Security practices, smart contracts
blockchain specific security tips
mitigation plans
quantum computing, security impact
readable smart contract logic
review gas consumption
RNG
security breaches and patches
set a maximum amount of asset values
smart contract open source
smart contracts auditing
source code and libraries
well-tested libraries
whitehat
Security vulnerability
Self-confined function
Self-destruction functions
setMessage function
sha256/keccak256
sha256 Solidity function
Sharding nodes
Signature manipulation
Small smart contract
Smart contract
blockchain
for business person
bytecodes
code and explanation
compilation
components
crosschain id
definition
Ethereum
function calling
Solidity
SeeSolidity programming language
for technical person
technical point of view
and web GUI
Smart contract bytecodes
Smart contract development tools
Mythx
solidity debug
debugging smart contract
enabling debugger
launching debugger
source code
solidity test, Remix Plug-in
solidity to UML
dApp project
Remix
stand-alone tools
SSA
Smart contract–enabled banking dApp
Smart contract languages
Smart contracts
attackable security holes
auditing
security practices
SeeSecurity practices, smart contracts
and writing code
Smart wallet
Software application
Software as a Service (SaaS)
sol2uml package
Solano
Solidity
Solidity data types
address type
blockchain specific variables
boolean
byte array
code security and execution efficiency
Dynamically size array
Enum
fixed size array
integer
Mapping type
smart contract functions
Struct
supports and non-supported
Solidity deprecated functions
Solidity programming language
bytecode
comments
constructor function
Ethereum smart contracts
event
function access scope
function modifier
Hello World example
importing file
multiple scopes
security
SeeSecurity
source code
Solidity smart contract programming
Solidity Static Analysis (SSA)
Solidity Unit Test plug-in
Sparse Merkle trees
Special global variables
Stablecoins
Stable RPC node
Stack-based programing language
Stakeholder organizational models
StartWithdraw function
State channel (SC), L2
State channels (SC)
State channels (SC), L2
components
offchain computing
participants
topology and workflow
transactions
wallet
workflow
State variables
Storage
Struct
SubmitPlasmaTxRecord function
Supply chain
Supply chain–oriented transaction
Supply chain applications
Symmetric key cryptography
System designer
T
Target blockchain healthcare applications
testcasedemo function
Testing program
Third-party applications
Third-party logistics (TPL)
Third-party RPC nodes
Token
CCT
cTokens
DeFi projects
distribution
ERC20
ERC20 and ERC721
function
green energy
industries
NFT
in public blockchains
reward
smart contract
supply chain
taxonomy infrastructure and framework
templates
unit
value
Tokens
Token taxonomy framework (TTF)
Traditional computer network architecture
Transaction
Transaction-based analysis
Transaction fees
Transaction logs
Traveler’s checks
Truffle
Truisms
Trust, firms
TTCDiploma smart contract
U
UML diagram
Uniswap
Universal Resource Identifier (URI)
Unspent transaction output (UTXO) format
V
Validation nodes
Value exchange
data role
economy
parties
proprietary data
third parties role
transactions
Value types
View function
W
Wallet software component
Web Client
compile smart contract
deploy smart contract
Ethereum development blockchain
writing
X, Y
0xcert
Z
Zero-Knowledge Succinct Non-interactive Argument of Knowledge (zk-SNARK)
characteristics
define
drinking age
layer 2 rollup solution
in privacy computing
privacy-enhanced crypto computation
proof and verification
R1CS format
value
works
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.157.54