Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transaction processing
biblio
Trust Degree Calculation Method Based on Trust Blockchain Node
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
blockchain network node mobility
peer to peer security
trustworthiness calculation method
trust value evaluation indicators
trust degree calculation method
Trust calculation
trust blockchain node
Trust blockchain
transaction delay
P2P network trust value calculation
node working state
node transaction
node behavior information
delays
decentralized P2P network
computer network security
blockchain network node diversity
blockchain network environment security
trusted node
transaction processing
Human Factors
Scalability
Metrics
trusted nodes
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
Cryptography
biblio
Implementation QR Code Biometric Authentication for Online Payment
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
debit card
transaction sample
transaction process
transaction permits
simple transaction payment
QR code scan
online payment
online merchant
low-cost infrastructure
implementation biometric cloud authentication platform
face verification transaction
face biometric encryption
decryption transaction permission
Cryptography
Code Scan QR
biometric
bank implementation QR code biometric authentication payment online
transaction processing
QR codes
QR code
electronic money
cloud server
cyber physical systems
pubcrawl
Resiliency
mobile computing
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
biblio
Enhanced Cryptocurrency Security by Time-Based Token Multi-Factor Authentication Algorithm
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
security enhancement
wallets
transaction processing
time-based token multifactor authentication algorithm
time-based onetime password technique
single level password authentication
multifactor authentication algorithm
MFA token
MFA security scheme
Cryptocurrency security
multifactor authentication
Human Factors
security
cryptocurrency
password
cryptocurrencies
authentication
Computer hacking
Metrics
bitcoin
pubcrawl
Resiliency
authorisation
Computer crime
biblio
Have the security flaws surrounding BITCOIN effected the currency's value?
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
Scalability
Human Factors
market value
Online banking
peer to peer transactions
Peer-to-peer computing
private key
Protocols
pubcrawl
human factor
security breech
security flaws
security of data
statistical analysis
statistical data analysis
transaction processing
volatile currency
data analysis
Bitcoin protocol
bitcoin security
Bitcoin services
blockchain
Companies
complex public address
Crypto Currency Digital Security
currency value
bitcoin
decentralized virtual currency
digital currency
digital security environment
electronic money
financial data processing
Fluctuations
Human behavior
biblio
Fault Tolerance in a Cloud of Databases Environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
malicious transactions
Wireless communication
transaction-based applications
transaction serialization
transaction processing
transaction
serializability security
serializability
security of data
running transaction continuity
Resiliency
pubcrawl
Monitoring
Cloud Computing
intrusion tolerant scheme
intrusion tolerance
Fault tolerant systems
fault tolerant computing
fault tolerance
disk drives
Database systems
database management systems
database cloud
compromised system
composability
Cloud of databases environment
biblio
An Intrusion Tolerance Scheme for a Cloud of Databases Environment
Submitted by grigby1 on Thu, 12/28/2017 - 1:21pm
malicious activity
XML
Wireless communication
transaction serializability
transaction processing
transaction dependency graph
subtransactions
serializability
security of data
security
Safety
running system serialization
Resiliency
pubcrawl
processing node
malicious transactions
CDC
intrusion tolerance scheme
intrusion tolerance
graph theory
estimation
dependency
Decision Making
databases environment cloud
Databases
database management systems
Data models
concurrent access
composability
Cloud of databases environment
Cloud Computing
biblio
Low-Overhead Asynchronous Checkpointing in Main-Memory Database Systems
Submitted by grigby1 on Tue, 05/16/2017 - 12:44pm
checkpointing
consistency
logging
main-memory
pubcrawl
recorvery
Resiliency
System recovery
transaction processing
« first
‹ previous
1
2