Similar presentations:
Blockchain-Technology
1.
Blockchain TechnologyLoshakov Maksim
Voronezh State University, Faculty of Computer Science
4 course 17 group
2.
IntroductionStructure
Abilities
Applications
3.
IntroductionDecentralization
Cryptography
No single organization controls the system, so data cannot be
Adds security, making blockchain resistant to unauthorized
easily manipulated.
changes.
4.
S tructureB locks
Has h
Chain Connection
Contain transactions and a unique hash.
Each block stores the hash of the previous block.
Creates a system where changing data is extremely
difficult.
S ecurity
Immutability
If someone modifies a block, the hash changes and
Requires enormous computing power to rebuild,
entire chain becomes invalid.
making blockchain highly secure.
5.
AbilitiesTransaction Verification
Smart Contracts
Verify transactions without banks or intermediaries using special algorithms.
Programs that automatically execute actions when conditions are met.
Digital Identity
Data Protection
Users have more control over their digital identity.
Protects personal data from unauthorized access.
6.
ApplicationsFinance & Cryptocurrency
Logistics & Supply Chain
Healthcare & Government
Bitcoin and other cryptocurrencies use
Track goods and prevent counterfeiting.
Protect medical records, voting systems,
blockchain for secure transactions.
and safe storage of public records.
7.
Thank you for your attention.8.
Questions & Contactmaksim.loshakov@vsu.ac.uk
/in/maksimloshakov