Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transaction processing
biblio
Security Issues Seclusion in Bitcoin System
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
Human behavior
User profile
user identity
transaction verification
transaction processing
transaction management
trading
security issues
security
Scalability
pubcrawl
pseudonames
peer-to-peer payment network
Peer-to-peer computing
market
adversarial attacks
exchange trading commodity
exchange
digital currency
data privacy
cryptocurrency
cryptocurrencies
crypto-currency
blockchain
Bitcoin system
Bitcoin privacy
bitcoin
assets
Anonymity and Privacy
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Protocols
zero-knowledge proof
zero trust
UTXO unconsumed model
transaction processing
smart contract address information
smart contract
self-certification
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
anonymous improvement scheme
privacy leakage
privacy
policy-based governance
Human Factors
Elliptic curves
data privacy
cryptocurrencies
contracts
blockchain atomic swap
atomic exchange
anonymous scheme
anonymous list
biblio
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing
Submitted by grigby1 on Tue, 02/23/2021 - 2:26pm
distributed financial transaction processing
transaction processing
smart contract
Resistance
Resiliency
resilience
public key infrastructure
pubcrawl
Protocols
permissioned blockchain
network accountability
Monitoring
Metrics
immutable transactions
Distributed Ledger Technology
accountable financial transaction processing
Distributed databases
distributed banking transactions
distributed banking systems
Distributed Banking
Cryptography
cryptocurrencies
contracts
composability
centralized banks
blockchain-based distributed banking
BDB
banking service
bank data processing
bank account
biblio
Liability-Aware Security Management for 5G
Submitted by grigby1 on Tue, 02/23/2021 - 2:25pm
proof of transit
Trust models
trust and reputation models
transaction processing
telecommunication computing
security-by-contract
Security SLAs (SSLAs)
security of data
Root cause analysis
Resiliency
resilience
reputation models
Remote Attestation
pubcrawl
5G
orchestration decisions
network slicing
network accountability
multiple entities
Metrics
liability-aware security management
Liability
LASM
inherent distribution
composability
accountability mechanism
5G networks
5G mobile communication
biblio
Mobile Transaction Processing for a Distributed War Environment
Submitted by grigby1 on Tue, 10/06/2020 - 2:01pm
resilience
medical units
message transaction technique
Metrics
Microprocessors
military computing
mobile computing
mobile transaction processing
natural environment
optimistic concurrency control protocol
Processing time
Protocols
pubcrawl
Medical services
Resiliency
Sagas
security
serializability
Servers
Shadow paging
timely decisions
top-level commanders
transaction
transaction processing
transaction techniques
wounded soldiers
Databases
ambulance staff
battlefield environment
battlefield need
caching
Compensation Workflow
composability
computer architecture
Concurrency
concurrency control
CPS
cyber physical systems
database management systems
Actionability rules
Decision Making
distributed war environment
field hospital staff
health care
hospitals
incoming injured soldiers
irregular communications
medical authorities
medical information
medical information systems
medical service unit transactional workflow technique
biblio
Access Control for Electronic Health Records with Hybrid Blockchain-Edge Architecture
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
medical information systems
off-chain edge nodes
hyperledger composer fabric blockchain
hybrid blockchain-edge architecture
hybrid architecture
global electronic health record market
EHR privacy
EHR data management
blockchain-based controller
blockchain-based access control logs
access control policies
Access Control List
distributed ledger
transaction processing
Fabrics
edge computing
Scalability
health care
blockchain security
hyperledger
smart contracts
Distributed databases
smart contract
blockchain
pubcrawl
Resiliency
computer architecture
Medical services
data privacy
Access Control
authorisation
attribute-based access control
biblio
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
transaction processing
transaction verification time
transaction demand
linear structure
directed graphs
directed acyclic graph structure
directed acyclic graph
decentralized characteristic
compacted directed acyclic graph
compacted DAG structure
CoDAG
blockchain protocol
navigation
Scalability
electronic money
Throughput
blockchain security
blockchain platforms
ethereum
blockchain
bitcoin
pubcrawl
Resiliency
Protocols
Cryptography
biblio
Decentralized Data Marketplace to Enable Trusted Machine Economy
Submitted by aekwall on Mon, 09/21/2020 - 3:40pm
streaming data
data marketplaces
decentralization
decentralized architecture
decentralized data marketplace
encrypted message channel
Evolutionary Game Theory
matching process
refunding processes
strategic decision-making
Data marketplace
trade records
trading policies
trading process
trusted data streams
trusted machine economy
trustless architecture
verifiable Auth-compliant request
Computer Theory and Trust
data providers
data privacy
data integrity
distributed processing
game theory
computer network management
pubcrawl
composability
Decision Making
Cryptography
Compositionality
transaction processing
financial data processing
distributed ledgers
transaction process
IoT data
contract-oriented interactions
customer experiences
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
biblio
Forensic Analysis of Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
bitcoin security
transaction processing
transaction patterns
suspicious bitcoin addresses
Petri nets
forensic investigation
forensic analysis
Firing
FABT
Bitcoin transactions
bitcoin transaction net
bitcoin transaction data
data privacy
financial data processing
bitcoin
pattern matching
visualization
cryptocurrencies
Data mining
Human behavior
pubcrawl
computer science
Forensics
Scalability
1
2
next ›
last »