Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blockchain
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
Data Transmission
trusted hardware
physically unclonable function
data analysis methods
blockchain ledger
authenticated encryption method
AI technology
data trustworthiness
Trusted Execution Environment
artificial intelligence technology
TEE
IoT device
digital signatures
Artificial Intelligence
smart cities
IoT
Relays
trustworthiness
secure protocol
data analysis
blockchain
composability
pubcrawl
Trusted Computing
Protocols
Cryptographic Protocols
Internet of Things
encryption
Servers
computer network security
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:33pm
contracts
trustworthiness-protection system
trustworthiness management
trustworthiness gap
trusted corporations
multiple-domain business partners
malicious falsification attacks
Isolated data islands
global trustworthiness
data trustworthiness
cloud-based prototype
blockchain-based approach
Prototypes
edge computing
Cloud Computing
Virtual machining
ethereum
trustworthiness
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Trusted Computing
Organizations
data privacy
authorisation
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
biblio
Malware Containment in Cloud
Submitted by grigby1 on Wed, 12/02/2020 - 2:14pm
graph neural networks
Trusted Computing
trust
smart contracts
pubcrawl
protection mechanisms
Privacy-invasive software
malware
invasive software
hyperledger
Human Factors
Human behavior
high risk trust assumptions
graph theory
blockchain
graph analytics
Dominance Frontier
Distributed databases
decentralized malware containment
Cryptography
contracts
containment process
Containment
Computing Theory
cloud computing environments
Cloud Computing
business processes
biblio
Interledger for the Industrial Internet of Things
Submitted by grigby1 on Tue, 12/01/2020 - 2:01pm
information exchange
socio-economic effects
smart grid security
pubcrawl
production engineering computing
manufacturing systems
ledger technology
Internet-of-Things devices
Internet of Things
Information systems
blockchain
Industrial Internet of Things
industrial internet
industrial information systems
human trust
Human behavior
hierarchical information flow
Distributed Ledger Technology
distributed ledger technologies
biblio
Decentralized Labor Record System Based on Wavelet Consensus Protocol
Submitted by grigby1 on Tue, 12/01/2020 - 2:01pm
Human behavior
wavelet consensus protocol
wavelet blockchain platform
Turing complete smart contracts platform
smart contracts
recruitment
pubcrawl
Portfolios
labour resources
labor record
labor market problems
job market
internet
human trust
blockchain
employment data
employment conditions
Employment
directed graphs
directed acyclic graph system
decentralized labor record system
contracts
consensus protocol
Companies
blockchain solutions
blockchain based system
blockchain based labor record systems
biblio
DeepRing: Protecting Deep Neural Network With Blockchain
Submitted by grigby1 on Tue, 12/01/2020 - 2:00pm
DeepRing
technical perspectives
Public key
pubcrawl
optimizers
object detection
neural nets
machine learning
learning (artificial intelligence)
learned parameters
human trust
human intervention
Human behavior
face recognition
appropriate loss functions
Deep Neural Network
deep learning based architectures
decryption algorithms
cybersecurity industry
Cryptography
cryptographic hash
computer vision applications
computer vision
computer architecture
commercial perspectives
centralized authority
blockchain
authorisation
biblio
Trust Beyond Computation Alone: Human Aspects of Trust in Blockchain Technologies
Submitted by grigby1 on Tue, 12/01/2020 - 1:59pm
Human Aspects
Trusted Computing
trust
transaction transparency
software engineers
software engineering
pubcrawl
institutional aspects
Immutability
human trust
Human behavior
bitcoin
Guidelines
Distributed databases
Cryptography
cryptographic verifiability
cryptocurrency
computational trust
blockchain-based systems
blockchain technologies
blockchain
biblio
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
data miners
Compositionality
Incentive mechanism
Shapley value
diseases
Medical diagnostic imaging
blockchain-based medical data sharing
computational process
cooperation model
medical information systems
disease diagnosis
incentive schemes
medical data sharing
Shapley value revenue distribution
topological relationships
Intelligent Data Security
Intelligent Data and Security
Resiliency
Scalability
data owners
Big Data
data privacy
security
game theory
Data models
learning (artificial intelligence)
security of data
pubcrawl
blockchain
Business
machine learning techniques
cryptocurrencies
Distributed databases
Predictive models
biblio
Crypto trust point (cTp) for secure data sharing among intelligent vehicles
Submitted by aekwall on Mon, 11/23/2020 - 11:22am
IVs communication environment
crypto trust point
CTP
illegitimate vehicles behavior
information communication
Intelligent vehicle technology
Intelligent vehicles
intelligent vehicles communication
IV communication
IV data security
communication channel
legitimate vehicles behavior
rewarding thereby building trust
successful communication
Traditional Security approaches
Trust point mechanism
Vehicle communication
Intelligent Data Security
Intelligent Data and Security
trust
Scalability
Cryptography
telecommunication security
security
Resiliency
pubcrawl
vehicular ad hoc networks
blockchain
traffic engineering computing
Distributed databases
Reliability
security vulnerabilities
Compositionality
data accuracy
secure data
Insurance
communication data
« first
‹ previous
…
28
29
30
31
32
33
34
35
36
…
next ›
last »