Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
bitcoin
biblio
Traceability in Permissioned Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Scalability
encryption
Resiliency
pubcrawl
bitcoin
blockchain
cryptocurrencies
blockchain security
fully homomorphic encryption
Traceability
Hidden Markov models
zero knowledge proof
permissioned blockchain
hidden Markov model
permissionless blockchain
biblio
Contract-Based Approach for Security Deposit in Blockchain Networks with Shards
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Economics
Sharding
security-deposit based consensus protocol
security of data
security incentive
security deposit
Scalability
Resiliency
pubcrawl
individual rationality
incentive compatibility
hash-puzzle-solving consensus protocol
flexible deposits
beacon chain
economic incentive
Cryptographic Protocols
cryptocurrencies
contracts
contract-based approach
contract theory
consensus protocol
blockchain security
blockchain networks
blockchain
bitcoin
biblio
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
transaction processing
transaction verification time
transaction demand
linear structure
directed graphs
directed acyclic graph structure
directed acyclic graph
decentralized characteristic
compacted directed acyclic graph
compacted DAG structure
CoDAG
blockchain protocol
navigation
Scalability
electronic money
Throughput
blockchain security
blockchain platforms
ethereum
blockchain
bitcoin
pubcrawl
Resiliency
Protocols
Cryptography
biblio
Weighted Based Trustworthiness Ranking in Social Internet of Things by using Soft Set Theory
Submitted by aekwall on Mon, 09/21/2020 - 3:39pm
SIoT
wireless sensor networks
weighted based trustworthiness ranking model
trustworthy relationships
trustworthy node
trusted nodes
Trusted Computing
trust decision making
soft-set theory
soft set theory
social relationship
social networking (online)
Social network services
Social Internet of Things
Computing Theory
set theory
security of data
pubcrawl
Measurement
Internet of Things
interdisciplinary research area
fuzzy set theory
Decision Making
Computer Theory and Trust
Compositionality
composability
bitcoin
trust
biblio
DDoS Attack Detection on Bitcoin Ecosystem using Deep-Learning
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin security
service-level DDoS attacks
network-level data
detection
Deep-learning
DDoS attack detection
DDoS
bitcoin network-level
Bitcoin ecosystem
computer network security
financial data processing
bitcoin
cryptocurrency market
cryptocurrencies
Human behavior
pubcrawl
blockchain technology
Scalability
biblio
Partitioning Attacks on Bitcoin: Colliding Space, Time, and Logic
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin
temporal spatio-temporal
spatial spatio-temporal
peer-to-peer transactions
partitioning
network dynamics
network distribution
logical partitioning attacks
decentralized network architecture
Bitcoin network
attack scenarios
bitcoin security
security of data
Distributed databases
Software
Human behavior
pubcrawl
Peer-to-peer computing
Organizations
blockchain
internet
Scalability
IP networks
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
biblio
TendrilStaller: Block Delay Attack in Bitcoin
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
Distributed databases
TendrilStaller
peer-to-peer network
eclipse attack
countermeasure
blockchain state
block propagation protocol
block propagation
block delay attack
Bitcoin protocol
Bitcoin peer-to-peer network
bitcoin security
bitcoin
IP networks
Security analysis
cryptocurrencies
Human behavior
pubcrawl
Peer-to-peer computing
Cryptographic Protocols
Bandwidth
blockchain
Scalability
delays
Protocols
biblio
Nash Equilibrium of Multiple, Non-Uniform Bitcoin Block Withholding Attackers
Submitted by grigby1 on Fri, 09/04/2020 - 3:59pm
bitcoin security
seemingly malicious behavior
nonuniform Bitcoin mining pools
nonuniform Bitcoin block withholding attackers
Nash equilibrium conditions
Nash Equilibrium
Miner's Dilemma
MATLAB
mathematical analysis
in-depth profit analysis
cryptocurrency miners
BWH attack
blockchain distributed databases
Bitcoin-like systems
Scalability
profitability
bitcoin
cryptocurrency
Distributed databases
game theory
Peer-to-peer computing
cryptocurrencies
Data mining
Human behavior
pubcrawl
Hardware
blockchain
biblio
Front-End IoT Application for the Bitcoin based on Proof of Elapsed Time (PoET)
Submitted by grigby1 on Fri, 09/04/2020 - 3:58pm
key location
complete block
constructive exchanges
elapsed time
front-end applications
front-end IoT application
front-end Web applications
Internet applications
IoT
block-dependent IoT applications
mandatory IoT gadget
neighborhood gadget
PoET
possible designs
registry agreements
remote Bitcoin customers
remote blockchain client
remote server
financial data processing
data privacy
Scalability
internet
blockchain
pubcrawl
Human behavior
cryptocurrencies
bitcoin
Internet of Things
bitcoin security
active exchanges
BC IoT
Bitcoin block chain customer
Bitcoin distributor
Bitcoin store
block block
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »