Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Distributed databases
biblio
Reducing Processing Delay and Node Load Using Push-Based Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:31pm
information-centric networking
specific content
returns data
push-type communication method
push-based information-centric networking
pull-type communication method
packet processing delay time
node load
contents deliver
content distribution method
faces
edge node
Information Centric Networks
named data networking
Scalability
ICN
delays
Load modeling
Routing protocols
network traffic
telecommunication network routing
Distributed databases
internet
Routing
pubcrawl
Resiliency
telecommunication traffic
Servers
biblio
Decentralized Identity and Trust Management Framework for Internet of Things
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
IOTA Tangle
web of trust approach
Trusted Computing
trusted authority
Trust Management Framework
Trust framework
sensors
self sovereign identity
self sovereign identities
Scalability
Resiliency
resilience
quantifiable trust
pubcrawl
proprietary environments
permissionless environment
web of trust
IoT devices
Internet of Things devices
Internet of Things
IDMS
identity management system
Identity management
Human behavior
enclosed environments
DLT's network
Distributed Ledger Technology
Distributed databases
decentralized Identity
automatic trust rating
authorisation
arbitrary identities
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
pubcrawl
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
Identity-of-Things (IDoT)
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
distributed identity management model
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
Access Control
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
biblio
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 2:22pm
SSI
pubcrawl
public domain software
resilience
Resiliency
Scalability
Self-Sovereign Identity
Servers
smart contracts
Open Source Software
SSI IDM system
standards
uPort
uPort identity management system
uPort open-source identity management system
user-centric data platform
Verifiable Credential
blockchain
Mobile Applications
IdM
identity management systems
identity management system
Identity management
Human behavior
ethereum
Distributed databases
digital services
DID
Decentralized IDentifier
decentralized application
Decentralized App
DApp
Cryptography
biblio
Risks Identification in the Exploitation of a Geographically Distributed Cloud Infrastructure for Storing Personal Data
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
Scalability
natural person
Object recognition
payment information records
personal data
personal data records
privacy
processing
pubcrawl
Risk
risk Identification
risk management
models
security
security of data
Servers
social engineering techniques
storage management
stored resources
storing personal data
system
Task Analysis
technical project
unsecured service
Data protection
augumented reality
Big Data
Cloud Computing
cloud services
cloud storage administrators
Companies
confidential information leaks
controller
cyber incidents
data leak
data privacy
auditing storage
data storage subsystem
data subject GDPR
digital twin
Distributed databases
expert systems
geographically distributed cloud infrastructure
geographically distributed company
high-loaded infocommunications systems
Human Factors
information quality
Kaspersky Lab
biblio
Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
remote patient monitoring
Medical services
patient care
patient monitoring
patients care
Peer-to-peer computing
privacy
private medical data
pubcrawl
medical information systems
Safety
safety mechanism
Scalability
security
Skin
skincare monitoring
telemedicine
health care
cloud
Cloud Computing
Cryptography
Data protection
Data Transmission
distributed architecture
Distributed databases
expert systems
blockchain
Human Factors
Internet of Things
IoT based skin monitoring system
IoT based skin surveillance system
IoT devices
IoT monitoring
medical care
biblio
Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN
Submitted by aekwall on Mon, 03/29/2021 - 11:50am
game theory-based incentive mechanism
data plane
programmable network
Load management
software defined networking (SDN)
communication requirements
controller consortium blockchain
controller load balancing
cryptographic currency balance coin
game theoretic security
game-theoretic consensus
incentive controllers
incentive safe load balancing
load balance
multicontrollers
Pricing
proof-of-balance
secure load
resource allocation
Scalability
Cryptography
game theory
computer architecture
software defined networking
Resiliency
pubcrawl
blockchain
computer network security
Distributed databases
quality of service
Security analysis
Games
Human Factors
Predictive Metrics
SDN architecture
biblio
A distributed biometric authentication scheme based on blockchain
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
homomorphically encrypted form
wearable computers
usability
smart contracts
sensitive users
sensitive biometric data
secure authentication
Scalability
Resiliency
pubcrawl
privacy
nonencrypted form
modern computing systems
Metrics
message authentication
biometric encryption
Homomorphic encryption
enhanced usability
encryption
Distributed databases
distributed biometric authentication
Cryptography
cautious handling
blockchain
biometrics (access control)
biometric templates
biometric
authorisation
authentication
biblio
A Decentralized, Privacy-preserving and Crowdsourcing-based Approach to Medical Research
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
medical computing
ZK-SNARK
zero-knowledge proof
zero trust
zero knowledge argument of knowledge
verifiable computation
Trusted Computing
smart contracts
Scalability
Resiliency
resilience
pubcrawl
privacy
policy-based governance
mutual trust
medical research
blockchain
machine learning
Human Factors
health data privacy
faces
distributed processing
Distributed databases
decentralized platform
data privacy
cybernetics
Cryptography
crowdsourcing platform
crowdsourcing
commitment schemes
commit-and-prove
blockchains
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »