Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
bitcoin
biblio
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Submitted by grigby1 on Tue, 03/09/2021 - 1:48pm
LN community
wormhole attack
sensitive payment information
security vulnerabilities
security
Scalability
Receivers
quantitative analysis
pubcrawl
privacy
permissionless decentralized cryptocurrencies
payment channel networks
network-wide DoS attack costs
multihop payment protocols
anonymity
Lightning Network
Lightning
Human behavior
denial-of-service attacks
data privacy
Cryptographic Protocols
cryptocurrencies
contracts
concurrent payments
computer network security
channel capacity
bitcoin
anonymity issues
biblio
From Hodl to Heist: Analysis of Cyber Security Threats to Bitcoin Exchanges
Submitted by grigby1 on Tue, 03/09/2021 - 1:48pm
cyber threat intelligence
security
Scalability
pubcrawl
Organizations
monetary value
market capitalization
Human behavior
financial data processing
exchange breach
Ecosystems
attacks
cyber security threats
cyber security breaches
cyber security
cryptocurrency exchanges
cryptocurrencies
Computer crime
Bitcoin market value
Bitcoin exchange platforms
bitcoin
biblio
Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network
Submitted by grigby1 on Tue, 03/09/2021 - 1:48pm
electronic money
telecommunication network topology
security
pubcrawl
proximity-aware extensions
Protocols
propagation delay
physical topology
Peer-to-peer computing
named Master Node
Master Node protocol
logical neighbors
information propagation delay
Human behavior
peer to peer security
Electronic mail
delays
delay overhead
current Bitcoin protocol
clustering
Bitcoin peer-to-peer network
Bitcoin network
bitcoin
Human Factors
Metrics
Resiliency
Scalability
biblio
Malicious Qr-Code Threats and Vulnerability of Blockchain
Submitted by grigby1 on Wed, 02/10/2021 - 12:21pm
information security
XML
security
Scalability
Resiliency
resilience
QR-code attack
QR-Code
pubcrawl
Payloads
QR codes
Human behavior
Generators
fuzzing
Cyber-security
cross-site scripting
Cross Site Scripting
command injection attacks
blockchain
bitcoin
biblio
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities
Submitted by grigby1 on Wed, 02/10/2021 - 12:12pm
hidden cryptocurrency mining activities
security
Resiliency
resilience
pubcrawl
online front-ends
MiNo
Metrics
malware
malicious mining activities
invasive software
internet
Human behavior
Web Browser Security
Hidden Cryptocurrency Mining
digital currencies
Data mining
cryptojacking
cryptocurrency mining
cryptocurrencies
computer resources
Coinhive
Coin Mining
Chrome Web browser add-on application
cash money
bitcoin
biblio
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem
Submitted by grigby1 on Wed, 02/10/2021 - 12:10pm
Web sites
risk assessment
CryptoJacking websites
cryptojacking ecosystem
cryptojacking campaigns
compromised websites
Case-control study
browser-based mining
cryptojacking
cryptocurrency
Web servers
Hash functions
Cryptography
bitcoin
Semantics
privacy
Ecosystems
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
Data mining
biblio
Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
time 0.0164 s
pubcrawl
public key cryptography
public key cryptosystems
Resiliency
RSA key generation
Scalability
Signature Generation
signature verification
time 0.001 s
time 0.002 s
time 0.004 s
post-quantum digital Signature algorithms
time 0.0187 s
time 0.0778 s
time 0.1378 s
time 0.2012 s
time 13.494 s
time 16.29 s
time 17.474 s
time 2.0E-4 s
verification time
W-OTS key generation
cryptographic systems security
security
bitcoin transaction security
Bitcoin transactions
classical algorithms
Comparative Analysis
Computer crime
Computers
creating digital signatures
cryptocurrencies
cryptocurrency
Cryptographic Protocols
bitcoin
Cryptography
current day algorithms
digital signatures
ECDSA key generation
Elliptic curves
encryption
Hash-based Signature Schemes
hash-based signatures
MSS Key generation
Post-quantum cryptography
biblio
Trust Beyond Computation Alone: Human Aspects of Trust in Blockchain Technologies
Submitted by grigby1 on Tue, 12/01/2020 - 12:59pm
Human Aspects
Trusted Computing
trust
transaction transparency
software engineers
software engineering
pubcrawl
institutional aspects
Immutability
human trust
Human behavior
bitcoin
Guidelines
Distributed databases
Cryptography
cryptographic verifiability
cryptocurrency
computational trust
blockchain-based systems
blockchain technologies
blockchain
biblio
Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain
Submitted by grigby1 on Mon, 11/02/2020 - 11:30am
industrial property
time interval
Servers
secure time-stamping schemes
Resistance
Resiliency
resilience
pubcrawl
policy-based governance
patents
patentable ideas
intellectual property systems
intellectual property security
bitcoin
file protection
earliest creation time
digital investigations
digital files
Cryptography
composability
Cloud Computing
Chronos
chain quality
blockchain-based time-stamping scheme
blockchain-based storage
blockchain
biblio
BlockSee: Blockchain for IoT Video Surveillance in Smart Cities
Submitted by aekwall on Mon, 09/28/2020 - 11:09am
jointly provides validation
video surveillance
video frames
video cameras
urban environments
Urban areas
smart cities
pubcrawl
privacy issues
privacy
physical manipulations
observed scene
multiple video-flows
mechanical settings
malicious users
bitcoin
IoT video surveillance
Internet of Things
Human Factors
Human behavior
heterogeneous owners
distributed city-wide monitoring systems
data privacy
cyber physical systems
CPS Privacy
contracts
Cameras
camera settings
BlockSee
blockchain-based video surveillance system
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »