Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blockchain
biblio
TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
spectrum databases
Federal Communications Commission
frequency 150.0 MHz
frequency 3.5 GHz
gallium arsenide
seamless spectrum
secondary users
sensitive operational information
Spectrum access system
spectrum availability
FCC regulatory design requirements
spectrum demand
spectrum usage
SU privacy issues
Synthetic aperture sonar
TrustSAS
trustworthy framework
trustworthy spectrum access system
Trustworthy Systems
blockchain technology
data privacy
telecommunication security
Resiliency
pubcrawl
composability
privacy
Peer-to-peer computing
blockchain
Databases
Cryptography
radio spectrum management
cyber physical systems
broadband networks
CBRS band
citizens broadband radio service
cryptographic techniques
dynamic spectrum access system
FCC
biblio
Nodal Authentication of IoT Data Using Blockchain
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
IoT data
Cloud Security
connected nodes
cryptocurrencies
cyber-attacks
data communication
data integrity security
GOST algorithm
home automation
cloud computing security
IoT field
nodal authentication
nodal verification
pervasive systems
self organizing networks
transmitted data
Pervasive Computing Security
Human Factors
data integrity
Internet of Things
industrial applications
security of data
authentication
Scalability
computer architecture
blockchain
Cloud Computing
Cryptography
pubcrawl
Metrics
Resiliency
resilience
Human behavior
IoT
agriculture applications
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
Trust Enhancement Scheme for Cross Domain Authentication of PKI System
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
multiple PKI systems
unified trust service problem
Trusted Computing
trust enhancement scheme
Trust delivery
traditional trusted third party
Scalability
Resiliency
public key infrastructure
public key cryptography
pubcrawl
PKI Trust Models
PKI management domains
PKI (Public Key Infrastructure)
authentication
Metrics
Human behavior
e-government applications
E-Government
Distributed databases
cross-domain authentication
cross-domain
CRL
certificate revocation list
blockchain consensus
blockchain
authorisation
biblio
Towards Improved Trust in Threat Intelligence Sharing using Blockchain and Trusted Computing
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Human Factors
peer to peer security
trust enhancement framework -TITAN
Threat intelligence sharing
sharing effectiveness
sharing architectures
P2P reputation systems
open trust issues
decentralized sharing
decentralized blockchain
cybersecurity attacks
TEE
reputation
Cryptography
Scalability
cyber security
Distributed databases
blockchain
Metrics
Peer-to-peer computing
pubcrawl
Resiliency
Trusted Computing
data integrity
data privacy
Data Security
biblio
A Monitorable Peer-to-Peer File Sharing Mechanism
Submitted by aekwall on Mon, 04/06/2020 - 10:15am
Scalability
peer to peer security
smart contract
peer-to-peer network system
peer-to-peer file sharing mechanism
P2P file sharing system
P2P file sharing network systems
InterPlanetary File System
file deletion
file authentication code
consortium Blockchain
General Data Protection Regulation
IPFS
storage management
Human Factors
security of data
File systems
ethereum
smart contracts
Distributed databases
Data protection
blockchain
Metrics
Peer-to-peer computing
Synchronization
pubcrawl
Resiliency
security
Monitoring
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 10:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
Predictive Proof of Metrics – a New Blockchain Consensus Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 12:18pm
PPoM
predictive security metrics
reputation and reward based approach
reputation
provider prediction engine
Proof of Metrics
predictive proof of metrics
prediction
PPoM based blockchain
machine learning
Metrics
consensus protocol
blockchain ecosystems
blockchain consensus protocol
Cryptographic Protocols
security
pubcrawl
blockchain
biblio
CAG: Compliance Adherence and Governance in Software Delivery Using Blockchain
Submitted by grigby1 on Fri, 04/03/2020 - 12:04pm
SDLC
License verification
Licenses
litigations
metadata
noncomplaint license software
nonconformant behavior
open source components
open-source software components
Policy Based Governance
pubcrawl
public domain software
Libraries
security risks
smart contracts
Software
software delivery
software development life cycle
software development management
software engineering
standard compliances
technical challenges
vulnerability assessment
decentralized CAG
blockchain
blockchain technologies
building software
client industry
collaboration
compliance adherence and governance
compliance specifications
contracts
copyright issues
Crowd Sourcing
cryptocurrencies
auditing
development activities
disparate sources
distributed teams
economic challenges
extraordinary amounts
functional specifications
geographically distributed teams
Global Software Development
legislation
level agreements
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »