Saturday, 13 September 2025

Advancing Blockchain Security Using Graph Theory: A Python Programming Perspective | Chapter 9 | Finite Abelian Groups, Elliptic Curves, Blockchain with Hashing and Graphs

 

This study develops codes for visualizing decentralized graphs through consensus methods, namely mining pool, stake pool, wealth and developer concentrations, as well as simulating topological; Domain Name System (DNS), Distributed Denialof- Service (DDoS), phishing, 51% and eclipse attack types.

 

 

Author(s) Details

Seddik Abdelalim
LMFA, FSAC, University Hassan II of Casablanca, Morocco.

 

Asmaa Cherkaoui
LMFA, FSAC, University Hassan II of Casablanca, Morocco.

 

Abdelkarim Lkoiaza
LMFA, FSAC, University Hassan II of Casablanca, Morocco.

 

Ilias Elmouki
LMFA, FSAC, University Hassan II of Casablanca, Morocco.

 

Noreddine Abghour
LIS Labs, FSAC, University Hassan II of Casablanca, Morocco.

 

Please see the book here:- https://doi.org/10.9734/bpi/mono/978-81-992493-9-4/CH9

No comments:

Post a Comment