Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Hashing

Blockchain Technology and Computational Excellence for Society 5.0
The process of converting plaintext into a unique string of letters and numbers. It is not possible to reconstitute your original data from the output it produces.
Published in Chapter:
Blockchain Primer: Introduction to Blockchain Foundations and Implementation
Mohammad Amin Kuhail (Zayed University, UAE), Sujith S. Mathew (Zayed University, UAE), Rawad Hammad (East London University, UK), and Mohamed Bahja (University of Birmingham, UK)
Copyright: © 2022 |Pages: 20
DOI: 10.4018/978-1-7998-8382-1.ch003
Abstract
Blockchain technology has the potential to revolutionize several industries including finance, supply chain and logistics, healthcare, and more. This primer introduces readers to basic development skills to blockchain foundations including blockchain cryptography, the consensus algorithm, and smart contracts. Further, this primer explains stepwise how to implement and deploy basic data stores using blockchain with Python. The primer serves as a succinct introductory guide to blockchain foundations by relying on a case study illustrated with visuals together with instructions on implementation. This primer is intended for educators, students, and technology enthusiasts with foundational computer science and Python development skills.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Database Systems for Big Data Storage and Retrieval
Generating a fixed length output as a unique and shortened representation for a given piece of data. The fixed length output is called the hash code and the algorithm that generates the output is called a hash function .
Full Text Chapter Download: US $37.50 Add to Cart
Biometric Identification Techniques
The transformation of a record into a usually shorter fixed-length value or key that represents the original record. Hashing is used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy Preservation in Smart Grid Environment
The process of transforming a set of characters into a smaller fixed-length key or parameter that uniquely represents the original set of characters.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Terrorism Attack: Types, Effects, and Prevention
Method of converting a string of characters into a shorter fixed length value for easy storage and retrieval.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain-Based Secure Transactions
Hashing is the process of transforming any given key or a string of characters into another value.
Full Text Chapter Download: US $37.50 Add to Cart
Speedy Management of Data Using MapReduce Approach
This is a methodology where the input string is converted to another form.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Evidence Collection and Preservation in Computer Network Forensics
A procedure that ensures data integrity transforms a string into a unique number. Popular algorithms for this purpose include MD5, SHA-1, and SHA-256.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology for the Internet of Things Applications in Apparel Supply Chain Management
Software causes the block header to be “hashed”. Hashing is the process by which a grouping of digital data is converted into a single number, called a hash. The number is unique (effectively a “digital fingerprint” of the source data) and the source data cannot be reverse engineered and recovered from it.
Full Text Chapter Download: US $37.50 Add to Cart
Applications of Secured Blockchain Technology in the Manufacturing Industry
The process by which a grouping of digital data is converted into a single number, called a hash. The number is unique (effectively a “digital fingerprint” of the source data), and the source data cannot be reverse-engineered and recovered from it. In the context of blockchain, what is hashed is the block header.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Cryptography
This is a technique to convert the variable length data into a fixed length identifier called hash.
Full Text Chapter Download: US $37.50 Add to Cart
A Blockchain-Based Approach to Revolutionizing Healthcare
The process of using a cryptographic hash algorithm to encode information, resulting in a comparatively distinct result from data sources of varying sizes. In order to verify the data's integrity, hashing the input data can be used to produce identical outputs. The output will be quite distinct if even the slightest modification is applied to the source data.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR