Normal view MARC view ISBD view

Bitcoin and Blockchain : History and Current Applications.

By: Panda, Sandeep Kumar.
Contributor(s): Elngar, Ahmed A | Balas, Valentina Emilia | Kayed, Mohammed.
Series: Publisher: Milton : Taylor & Francis Group, 2020Copyright date: ©2021Description: 297 p.Content type: text Media type: computer Carrier type: online resourceISBN: 9780367901004.Genre/Form: Print books.
Contents:
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Bitcoin: A P2P Digital Currency -- 1.1 Introduction -- 1.2 Digital Currencies before Bitcoin -- 1.2.1 Blinded Cash -- 1.2.2 Web-Based Money -- 1.2.3 B-Money -- 1.2.4 Bit Gold -- 1.2.5 Hashcash -- 1.3 Bitcoin in a Nutshell -- 1.4 Transaction -- 1.4.1 Construct a Transaction -- 1.4.2 Getting the Right Input -- 1.4.3 Creating the Output -- 1.5 Timestamp Server -- 1.6 Proof of Work -- 1.7 Bitcoin Development Environment -- 1.7.1 Bitcoin Core Implementation -- 1.7.2 Wallet Setup and Encryption -- 1.8 Keys, Wallets, and Addresses -- 1.8.1 Digital Signature -- 1.8.2 Keys -- 1.8.3 Wallets -- 1.8.4 Addresses -- 1.9 Security Attacks on Bitcoin System and Countermeasures -- 1.9.1 Major Security Attacks -- 1.9.1.1 Double Spending -- 1.9.1.2 Mining Pool Attacks -- 1.9.1.3 Client-Side Security Threat -- 1.9.1.4 Bitcoin Network Attacks -- 1.9.2 Minor Attacks -- 1.9.2.1 Sybil Attack -- 1.9.2.2 Eclipse Attack -- 1.9.2.3 Tampering -- 1.10 Privacy and Anonymity in Bitcoin -- 1.11 Reclaiming Disk Space -- 1.12 Conclusion -- References -- Chapter 2 Exploring the Bitcoin Network -- 2.1 Introduction -- 2.2 P2P Network -- 2.3 Summary of Bitcoin System -- 2.4 Bitcoin Nodes -- 2.5 Experimenting with the Bitcoin Network -- 2.6 Joining and Conserving the Network -- 2.7 Transaction and Block Propagation -- 2.8 Deanonymization -- 2.9 Botnets -- 2.10 Bitcoin-Inspired Network Applications -- 2.11 Bitcoin Network Attacks -- 2.12 Securing Bitcoin Networks -- Conclusion -- References -- Chapter 3 Blockchain Technology: The Trust-Free Systems -- 3.1 Introduction -- 3.2 History -- 3.3 Overview of Blockchain Technology -- 3.3.1 Structure of a Block -- 3.3.2 The Genesis Block -- 3.4 Types of Blockchain -- 3.4.1 Public Blockchain.
3.4.2 Private Blockchain -- 3.4.3 Consortium Blockchain -- 3.5 Properties of Blockchain -- 3.5.1 Decentralized -- 3.5.2 Transparent -- 3.5.3 Immutable -- 3.5.4 Persistency -- 3.5.5 Anonymity -- 3.5.6 Auditability -- 3.6 Transactions and Digital Signature -- 3.7 Merkle Tree -- 3.8 SHA-256 -- 3.9 How Blockchain Works -- 3.10 Blockchain Open-Source Implementation -- 3.10.1 Bitcoin -- 3.10.2 Ethereum -- 3.10.3 Hyperledger -- 3.10.4 Corda -- 3.11 Testnet -- 3.11.1 Continuous Development -- 3.11.2 Prevents Disruptions -- 3.12 Payment Verification -- 3.13 Benefits and Challenges -- 3.13.1 Benefits -- 3.13.1.1 Decentralization -- 3.13.2 Transparent and Anonymous -- 3.13.3 Less Transaction Fee and No Taxes -- 3.13.4 Theft Resistance -- 3.13.5 Scalability -- 3.13.6 High Energy Consumption -- 3.13.7 Selfish Mining -- 3.13.8 Privacy Leakage -- Conclusion -- References -- Chapter 4 Consensus and Mining in a Nutshell -- 4.1 Background -- 4.2 Proof-of-X (PoX) Schemes -- 4.2.1 Reaching Consensus - The Issue of Byzantine Generals -- 4.2.2 Proof of Work - The Question of Monopoly -- 4.2.3 Proof of Stake - Resolving Incentive Problem -- 4.2.4 Proof of Activity - Promote Active Involvement -- 4.2.5 Proof of Elapsed Time -- 4.2.6 Tendermint -- 4.2.7 Federated BFT -- 4.3 Performance and Scalability in Consensus Algorithms -- Conclusion -- References -- Chapter 5 Blockchain: Introduction to the Technology behind Shared I nfor mation -- 5.1 Introduction to the Blockchain Technology -- 5.1.1 Blockchain: Types of Blockchain -- 5.1.2 Public Blockchain -- 5.1.3 Private Blockchain -- 5.2 Issues with the Conventional System: Trust at Stake -- 5.3 Fixing the Issues with the Conventional System: The White Paper by Nakamoto -- 5.3.1 Empowering Participants by Decentralizing the Architecture -- 5.3.2 Authentication of Blocks through Consensus Algorithm.
5.3.3 Enhanced Security Characteristics -- 5.4 Confidentiality Provisions: Encryption and Decryption -- 5.5 Self-Sustainable Architecture: Incentivization to Miners -- 5.6 Security Features: Digital Signature -- 5.6.1 Hashing -- 5.6.2 Consolidating Multiple Hash Signatures -- 5.7 Road Ahead -- 5.7.1 Impact on Existing Industry: A New Wave of Technological Revolution -- 5.7.2 Impact on Existing Industry: Doomed to Fail -- 5.8 Applications of Blockchain Technology -- 5.8.1 Product Authentication -- 5.8.2 Creative Industry and Academics -- 5.8.3 Voting and Governance -- 5.8.4 Storage and Movement of Assets -- 5.8.5 Link Service Provider Directly with Customers -- 5.8.6 Blood Group and/or Organ Donor List -- 5.8.7 Arresting Distribution Leakages -- Conclusion -- References -- Chapter 6 Growth of Financial Transaction toward Bitcoin and Blockchain Technology -- 6.1 Overview of the Blockchain -- 6.2 Astonishing Worldwide Financial Crisis of 2007-2008 -- 6.2.1 Special Effects of the 2008 Financial Crisis on India -- 6.2.2 Influence on the Stock Market -- 6.2.3 Influence on India's Trade -- 6.2.4 Influence on Exports from India -- 6.2.5 Influence on Handloom Segment, Jewels Export, and Tourism in India -- 6.2.6 Conversation Ratio Devaluation -- 6.2.7 India's Information Technology and Business Process Outsourcing Sector -- 6.2.8 Foreign Institutional Investors and Foreign Direct Investment -- 6.3 Causes of Crisis -- 6.3.1 The Starting Concepts of Bitcoin (1998-2009) -- 6.3.2 Bitcoin-A Peer-to-Peer Electronic Cash System (2008) -- 6.3.3 The Beginning of Bitcoin Software (2009) -- 6.3.4 The First Bitcoin Value (2010) -- 6.3.5 Arise of Rival Cryptocurrencies (2011) -- 6.3.6 Bitcoin Value Bangs (2013) -- 6.3.7 Various Scams and Thefts (2014) -- 6.3.8 Ethereum and ICOs (2016) -- 6.3.9 A Hype in Bitcoin Touches 10,000 USD (2017).
6.3.10 Bitcoin Payment Started by Online Payment Firm (2018) -- 6.4 Current Status of Bitcoin (2019) -- 6.5 Preliminaries of Bitcoin Mining -- 6.6 Aspects of Bitcoin and Blockchain -- 6.7 List of Cryptocurrency Future Scenarios -- 6.7.1 Possibilities -- 6.7.2 FedCoin: An Alternate Central Banks Mull Future of Cryptocurrency -- 6.7.3 Is This Called as Bitcoin Crash or Cryptocurrency Revolution? -- 6.7.4 Potential System Risks by Bitcoin -- 6.8 Impressions of Bitcoin on Economy, Banking, and Finance -- 6.8.1 Dark Web Power -- 6.8.2 Speculations -- 6.8.3 Politicization of Currency -- 6.8.4 Apprehension among the Central Banks -- 6.8.5 Emergence of New Markets -- 6.9 Cybersecurity Aspects of Blockchain Technology -- 6.10 Blockchain and Bitcoin Cybersecurity Risks -- 6.10.1 Is Blockchain Fail-Safe? -- 6.10.2 Cybersecurity Plays a Key Role in Today's Market -- Conclusion -- References -- Chapter 7 A Brief Overview of Blockchain Algorithm and Its Impact upon Cloud-Connected Environment -- 7.1 Introduction -- 7.2 Overview of Blockchain Algorithm -- 7.3 Types of Algorithms in Blockchain -- 7.3.1 Consensus Algorithms -- 7.3.1.1 Consensus Algorithm -- 7.3.1.2 Consensus Algorithm Versus Protocol -- 7.3.2 Different Types of Consensus Algorithms -- 7.3.2.1 Proof of Work (PoW) -- 7.3.2.2 Proof of Stake (PoS) -- 7.4 Mining Algorithms -- 7.5 Traceability Chain Algorithms -- 7.6 Byzantine Fault Tolerance (BFT) -- 7.7 Choosing the Right Algorithm -- 7.7.1 Blockchain (Non-Proof of Work) -- 7.7.2 State of the Art of Blockchain -- 7.8 Cloud storage -- 7.8.1 Blockchain in Cloud Storage -- 7.8.2 The Risks of Cloud Computing Are Increasing -- Conclusion and Future Scope -- References -- Chapter 8 Solidity Essentials -- 8.1 Introduction -- 8.2 Environment Setup -- 8.3 Getting Started -- 8.4 Value and Operator Types -- 8.4.1 Value Types -- 8.4.2 Variable Types.
8.4.2.1 State Variables -- 8.4.2.2 Local Variables -- 8.4.2.3 Global Variables -- 8.4.2.4 Rules for Naming Solidity Variables -- 8.4.3 Operator Types -- 8.4.3.1 Arithmetic Operators -- 8.4.3.2 Comparison Operators -- 8.4.3.3 Logical Operators -- 8.4.3.4 Assignment Operators -- 8.4.3.5 Conditional Operator (?: (conditional)) -- 8.5 Control Structures -- 8.5.1 Loop -- 8.5.2 Decision-Making -- 8.6 Data Structures -- 8.6.1 Array -- 8.6.1.1 Fixed Array -- 8.6.1.2 Dynamic Array -- 8.6.1.3 Array Properties -- 8.6.2 Mapping -- 8.6.2.1 Mapping Gotchas -- 8.6.3 Struct -- 8.6.4 Enum -- 8.6.4.1 Enum Gotchas -- 8.6.5 Strings -- 8.7 Function -- 8.7.1 Function Definition -- 8.7.2 Function Call -- 8.7.3 Function Parameters -- 8.7.4 Return Statement -- 8.7.5 Function Modifiers -- 8.7.6 Function Types -- 8.7.7 Fallback Function -- 8.7.8 Function Overloading -- 8.7.9 Cryptographic Functions -- 8.8 Contracts -- 8.8.1 Constructor -- 8.8.2 State Variables -- 8.8.3 Function -- 8.9 Events -- 8.10 Error Handling -- Conclusion -- References -- Chapter 9 Installing Frameworks, Deploying, and Testing Smart Contracts in Ethereum Platform -- 9.1 Introduction -- 9.2 Gas and Transaction -- 9.2.1 Transaction Consensus -- 9.3 Smart Contract Account -- 9.3.1 Smart Contract Structure -- 9.4 Deployment of the Contract in Ethereum Rinkeby Test Network -- 9.5 Web3 Library -- 9.5.1 Ganache Module -- 9.5.2 Fetching Accounts from Ganache -- 9.5.3 Asynchronous Method for Fetching Accounts -- 9.6 Metamask extension -- 9.6.1 Infura -- 9.7 Testing with Mocha Framework -- 9.8 Design of a Smart Contract -- 9.8.1 Deciding Variables and Functions for Smart Contract -- 9.8.2 Entering the Lottery Contract -- 9.8.3 Validation with "require" Statement -- 9.9 Pseudo Random Number Generator -- 9.9.1 Methodology Used for Pseudo Random Number Generator -- 9.9.2 Selecting the Winner.
9.9.3 Sending Ether from Contract.
    average rating: 0.0 (0 votes)
Current location Call number Status Date due Barcode Item holds
On Shelf HG1710 .B58 2021 (Browse shelf) Available AU00000000017112
Total holds: 0

Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Bitcoin: A P2P Digital Currency -- 1.1 Introduction -- 1.2 Digital Currencies before Bitcoin -- 1.2.1 Blinded Cash -- 1.2.2 Web-Based Money -- 1.2.3 B-Money -- 1.2.4 Bit Gold -- 1.2.5 Hashcash -- 1.3 Bitcoin in a Nutshell -- 1.4 Transaction -- 1.4.1 Construct a Transaction -- 1.4.2 Getting the Right Input -- 1.4.3 Creating the Output -- 1.5 Timestamp Server -- 1.6 Proof of Work -- 1.7 Bitcoin Development Environment -- 1.7.1 Bitcoin Core Implementation -- 1.7.2 Wallet Setup and Encryption -- 1.8 Keys, Wallets, and Addresses -- 1.8.1 Digital Signature -- 1.8.2 Keys -- 1.8.3 Wallets -- 1.8.4 Addresses -- 1.9 Security Attacks on Bitcoin System and Countermeasures -- 1.9.1 Major Security Attacks -- 1.9.1.1 Double Spending -- 1.9.1.2 Mining Pool Attacks -- 1.9.1.3 Client-Side Security Threat -- 1.9.1.4 Bitcoin Network Attacks -- 1.9.2 Minor Attacks -- 1.9.2.1 Sybil Attack -- 1.9.2.2 Eclipse Attack -- 1.9.2.3 Tampering -- 1.10 Privacy and Anonymity in Bitcoin -- 1.11 Reclaiming Disk Space -- 1.12 Conclusion -- References -- Chapter 2 Exploring the Bitcoin Network -- 2.1 Introduction -- 2.2 P2P Network -- 2.3 Summary of Bitcoin System -- 2.4 Bitcoin Nodes -- 2.5 Experimenting with the Bitcoin Network -- 2.6 Joining and Conserving the Network -- 2.7 Transaction and Block Propagation -- 2.8 Deanonymization -- 2.9 Botnets -- 2.10 Bitcoin-Inspired Network Applications -- 2.11 Bitcoin Network Attacks -- 2.12 Securing Bitcoin Networks -- Conclusion -- References -- Chapter 3 Blockchain Technology: The Trust-Free Systems -- 3.1 Introduction -- 3.2 History -- 3.3 Overview of Blockchain Technology -- 3.3.1 Structure of a Block -- 3.3.2 The Genesis Block -- 3.4 Types of Blockchain -- 3.4.1 Public Blockchain.

3.4.2 Private Blockchain -- 3.4.3 Consortium Blockchain -- 3.5 Properties of Blockchain -- 3.5.1 Decentralized -- 3.5.2 Transparent -- 3.5.3 Immutable -- 3.5.4 Persistency -- 3.5.5 Anonymity -- 3.5.6 Auditability -- 3.6 Transactions and Digital Signature -- 3.7 Merkle Tree -- 3.8 SHA-256 -- 3.9 How Blockchain Works -- 3.10 Blockchain Open-Source Implementation -- 3.10.1 Bitcoin -- 3.10.2 Ethereum -- 3.10.3 Hyperledger -- 3.10.4 Corda -- 3.11 Testnet -- 3.11.1 Continuous Development -- 3.11.2 Prevents Disruptions -- 3.12 Payment Verification -- 3.13 Benefits and Challenges -- 3.13.1 Benefits -- 3.13.1.1 Decentralization -- 3.13.2 Transparent and Anonymous -- 3.13.3 Less Transaction Fee and No Taxes -- 3.13.4 Theft Resistance -- 3.13.5 Scalability -- 3.13.6 High Energy Consumption -- 3.13.7 Selfish Mining -- 3.13.8 Privacy Leakage -- Conclusion -- References -- Chapter 4 Consensus and Mining in a Nutshell -- 4.1 Background -- 4.2 Proof-of-X (PoX) Schemes -- 4.2.1 Reaching Consensus - The Issue of Byzantine Generals -- 4.2.2 Proof of Work - The Question of Monopoly -- 4.2.3 Proof of Stake - Resolving Incentive Problem -- 4.2.4 Proof of Activity - Promote Active Involvement -- 4.2.5 Proof of Elapsed Time -- 4.2.6 Tendermint -- 4.2.7 Federated BFT -- 4.3 Performance and Scalability in Consensus Algorithms -- Conclusion -- References -- Chapter 5 Blockchain: Introduction to the Technology behind Shared I nfor mation -- 5.1 Introduction to the Blockchain Technology -- 5.1.1 Blockchain: Types of Blockchain -- 5.1.2 Public Blockchain -- 5.1.3 Private Blockchain -- 5.2 Issues with the Conventional System: Trust at Stake -- 5.3 Fixing the Issues with the Conventional System: The White Paper by Nakamoto -- 5.3.1 Empowering Participants by Decentralizing the Architecture -- 5.3.2 Authentication of Blocks through Consensus Algorithm.

5.3.3 Enhanced Security Characteristics -- 5.4 Confidentiality Provisions: Encryption and Decryption -- 5.5 Self-Sustainable Architecture: Incentivization to Miners -- 5.6 Security Features: Digital Signature -- 5.6.1 Hashing -- 5.6.2 Consolidating Multiple Hash Signatures -- 5.7 Road Ahead -- 5.7.1 Impact on Existing Industry: A New Wave of Technological Revolution -- 5.7.2 Impact on Existing Industry: Doomed to Fail -- 5.8 Applications of Blockchain Technology -- 5.8.1 Product Authentication -- 5.8.2 Creative Industry and Academics -- 5.8.3 Voting and Governance -- 5.8.4 Storage and Movement of Assets -- 5.8.5 Link Service Provider Directly with Customers -- 5.8.6 Blood Group and/or Organ Donor List -- 5.8.7 Arresting Distribution Leakages -- Conclusion -- References -- Chapter 6 Growth of Financial Transaction toward Bitcoin and Blockchain Technology -- 6.1 Overview of the Blockchain -- 6.2 Astonishing Worldwide Financial Crisis of 2007-2008 -- 6.2.1 Special Effects of the 2008 Financial Crisis on India -- 6.2.2 Influence on the Stock Market -- 6.2.3 Influence on India's Trade -- 6.2.4 Influence on Exports from India -- 6.2.5 Influence on Handloom Segment, Jewels Export, and Tourism in India -- 6.2.6 Conversation Ratio Devaluation -- 6.2.7 India's Information Technology and Business Process Outsourcing Sector -- 6.2.8 Foreign Institutional Investors and Foreign Direct Investment -- 6.3 Causes of Crisis -- 6.3.1 The Starting Concepts of Bitcoin (1998-2009) -- 6.3.2 Bitcoin-A Peer-to-Peer Electronic Cash System (2008) -- 6.3.3 The Beginning of Bitcoin Software (2009) -- 6.3.4 The First Bitcoin Value (2010) -- 6.3.5 Arise of Rival Cryptocurrencies (2011) -- 6.3.6 Bitcoin Value Bangs (2013) -- 6.3.7 Various Scams and Thefts (2014) -- 6.3.8 Ethereum and ICOs (2016) -- 6.3.9 A Hype in Bitcoin Touches 10,000 USD (2017).

6.3.10 Bitcoin Payment Started by Online Payment Firm (2018) -- 6.4 Current Status of Bitcoin (2019) -- 6.5 Preliminaries of Bitcoin Mining -- 6.6 Aspects of Bitcoin and Blockchain -- 6.7 List of Cryptocurrency Future Scenarios -- 6.7.1 Possibilities -- 6.7.2 FedCoin: An Alternate Central Banks Mull Future of Cryptocurrency -- 6.7.3 Is This Called as Bitcoin Crash or Cryptocurrency Revolution? -- 6.7.4 Potential System Risks by Bitcoin -- 6.8 Impressions of Bitcoin on Economy, Banking, and Finance -- 6.8.1 Dark Web Power -- 6.8.2 Speculations -- 6.8.3 Politicization of Currency -- 6.8.4 Apprehension among the Central Banks -- 6.8.5 Emergence of New Markets -- 6.9 Cybersecurity Aspects of Blockchain Technology -- 6.10 Blockchain and Bitcoin Cybersecurity Risks -- 6.10.1 Is Blockchain Fail-Safe? -- 6.10.2 Cybersecurity Plays a Key Role in Today's Market -- Conclusion -- References -- Chapter 7 A Brief Overview of Blockchain Algorithm and Its Impact upon Cloud-Connected Environment -- 7.1 Introduction -- 7.2 Overview of Blockchain Algorithm -- 7.3 Types of Algorithms in Blockchain -- 7.3.1 Consensus Algorithms -- 7.3.1.1 Consensus Algorithm -- 7.3.1.2 Consensus Algorithm Versus Protocol -- 7.3.2 Different Types of Consensus Algorithms -- 7.3.2.1 Proof of Work (PoW) -- 7.3.2.2 Proof of Stake (PoS) -- 7.4 Mining Algorithms -- 7.5 Traceability Chain Algorithms -- 7.6 Byzantine Fault Tolerance (BFT) -- 7.7 Choosing the Right Algorithm -- 7.7.1 Blockchain (Non-Proof of Work) -- 7.7.2 State of the Art of Blockchain -- 7.8 Cloud storage -- 7.8.1 Blockchain in Cloud Storage -- 7.8.2 The Risks of Cloud Computing Are Increasing -- Conclusion and Future Scope -- References -- Chapter 8 Solidity Essentials -- 8.1 Introduction -- 8.2 Environment Setup -- 8.3 Getting Started -- 8.4 Value and Operator Types -- 8.4.1 Value Types -- 8.4.2 Variable Types.

8.4.2.1 State Variables -- 8.4.2.2 Local Variables -- 8.4.2.3 Global Variables -- 8.4.2.4 Rules for Naming Solidity Variables -- 8.4.3 Operator Types -- 8.4.3.1 Arithmetic Operators -- 8.4.3.2 Comparison Operators -- 8.4.3.3 Logical Operators -- 8.4.3.4 Assignment Operators -- 8.4.3.5 Conditional Operator (?: (conditional)) -- 8.5 Control Structures -- 8.5.1 Loop -- 8.5.2 Decision-Making -- 8.6 Data Structures -- 8.6.1 Array -- 8.6.1.1 Fixed Array -- 8.6.1.2 Dynamic Array -- 8.6.1.3 Array Properties -- 8.6.2 Mapping -- 8.6.2.1 Mapping Gotchas -- 8.6.3 Struct -- 8.6.4 Enum -- 8.6.4.1 Enum Gotchas -- 8.6.5 Strings -- 8.7 Function -- 8.7.1 Function Definition -- 8.7.2 Function Call -- 8.7.3 Function Parameters -- 8.7.4 Return Statement -- 8.7.5 Function Modifiers -- 8.7.6 Function Types -- 8.7.7 Fallback Function -- 8.7.8 Function Overloading -- 8.7.9 Cryptographic Functions -- 8.8 Contracts -- 8.8.1 Constructor -- 8.8.2 State Variables -- 8.8.3 Function -- 8.9 Events -- 8.10 Error Handling -- Conclusion -- References -- Chapter 9 Installing Frameworks, Deploying, and Testing Smart Contracts in Ethereum Platform -- 9.1 Introduction -- 9.2 Gas and Transaction -- 9.2.1 Transaction Consensus -- 9.3 Smart Contract Account -- 9.3.1 Smart Contract Structure -- 9.4 Deployment of the Contract in Ethereum Rinkeby Test Network -- 9.5 Web3 Library -- 9.5.1 Ganache Module -- 9.5.2 Fetching Accounts from Ganache -- 9.5.3 Asynchronous Method for Fetching Accounts -- 9.6 Metamask extension -- 9.6.1 Infura -- 9.7 Testing with Mocha Framework -- 9.8 Design of a Smart Contract -- 9.8.1 Deciding Variables and Functions for Smart Contract -- 9.8.2 Entering the Lottery Contract -- 9.8.3 Validation with "require" Statement -- 9.9 Pseudo Random Number Generator -- 9.9.1 Methodology Used for Pseudo Random Number Generator -- 9.9.2 Selecting the Winner.

9.9.3 Sending Ether from Contract.

Access restricted to authorised ANU users only. ANU/ANV.

eBook access via Internet.

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu