Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blockchain technology
biblio
A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Permissioned blockchain Network
medical care providers
medical data items
medical information systems
medical record sharing
Medical services
patient care
patient care-cycle
patient data
patient Emergency relevant medical data
patient visits
patient walk
Peer-to-peer computing
hospitals
prehospital death rates
pubcrawl
Scalability
Scalable blockchain
scalable data source
Scalable Security
secure data source
security of data
Servers
trauma care
trauma centers
emergency medical care
blockchain
blockchain technology
confidentiality
continuous recording system
data audibility
data authentication
data privacy
data scalability
Data Security
distributed ledger
electronic data interchange
annual mortality rate
Emergency medical services
emergency patient death rate
emergency services
emergency-relevant medical data
Fabrics
file transfer methods
health care
health care delivery system
healthcare providers
healthcare settings
high quality prehospital care
biblio
Development of Platform for Confirming and Storing Supply Data Using Blockchain Technology
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
resilience
supply data storage
supply chains
supply chain security
supply chain management
supplies
smart contract
Servers
security
Scalability
Resiliency
blockchain
reliable information storage
pubcrawl
platform
Peer-to-peer computing
Human behavior
Distributed databases
decentralized applications
data
Cryptography
blockchain technology
biblio
Blockchain Technology in Supply Chain Management: Preliminary Study
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
product supply information
trust
transport history
supply chains
supply chain security
supply chain management
Scalability
Resiliency
resilience
pubcrawl
blockchain
product lifecycle
product life cycle management
industrial sectors
industrial plants
Human behavior
Distributed databases
decentralization
cryptocurrencies
blockchain technology
biblio
Preventing Sybil Attack in Blockchain Using Distributed Behavior Monitoring of Miners
Submitted by grigby1 on Mon, 03/02/2020 - 1:38pm
preventing Sybil attack
virtual nodes
traditional attacks
sybil attacks
Sybil attack
supply chain management etc
supply chain management
security
robust identity management
Resiliency
resilience
pubcrawl
pseudonymous identities
Behavior monitoring
Metrics
genuine nodes
Fake user accounts
distributed behavior
Digital transaction
data privacy
Cryptography
computer network security
composability
blockchain test bed
blockchain technology
blockchain
biblio
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
Virtual private networks
virtual private networks connections
trustless two-factor authentication
server authentication
security component
secure web service
secure shell protocol
OpenSSH server
blockchain platform
authentication systems
authentication request
authentication purpose
two factor authentication
secret information
Human Factors
security of data
blockchain technology
password
smart contracts
message authentication
authentication
web services
internet
blockchain
bitcoin
pubcrawl
Trusted Party
Cryptographic Protocols
telecommunication security
Servers
biblio
Will Blockchain Technology Become a Reality in Sensor Networks?
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
telecommunication network routing
sensor networks
security features
resource-constrained wireless sensor network
private communication blockchain framework
memory storage
load balancing multihop routing shares
LBMH routing shares
control overhead reduction
constant bit rate
computation power
cluster heads
cluster head
battery life
blockchain technology
sensor security
telecommunication security
resource allocation
blockchain
Metrics
Computational modeling
sensor nodes
Peer-to-peer computing
Routing
wireless sensor networks
batteries
composability
pubcrawl
Human behavior
Resiliency
security
biblio
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication
Submitted by grigby1 on Tue, 01/21/2020 - 11:35am
personally identifiable information
Identity Ecosystem
identity ecosystem model
Identity management
identity management services
identity management solutions
identity theft
identity verification document
organizational information
identity
PII options
privacy
Privacy Policy
pubcrawl
resilience
Scalability
secure identity solution
data privacy
authentication choices
blockchain
blockchain attestations
blockchain identity solutions
blockchain technology
blockchain-based identity solution
Cryptography
Data models
authentication
decentralized ledger system
Distributed databases
Ecosystems
fraud
fraud stories
Guidelines
Human behavior
biblio
Analysis of Identity Management Systems Using Blockchain Technology
Submitted by grigby1 on Tue, 01/21/2020 - 11:35am
internet
User control
uPort
Sovrin
ShoCard
Self-Sovereign Identity
security challenges
Scalability
resilience
pubcrawl
privacy
Peer-to-peer computing
authorisation
identity management systems
Identity management
Human behavior
Distributed databases
Digital identity
data privacy
Cryptography
blockchain technology
blockchain infrastructures
blockchain
Biological system modeling
biblio
A Collaborative DDoS Mitigation Solution Based on Ethereum Smart Contract and RNN-LSTM
Submitted by aekwall on Wed, 12/18/2019 - 2:24pm
mitigation technique
effective DDoS defence
ethereum
ethereum smart contract
hardware resources
Human behavior
individual DDoS attack class
learning (artificial intelligence)
Lightning
Metrics
distributed denial-of-service
pubcrawl
recurrent neural nets
resilience
Resiliency
RNN-LSTM
signalling DDoS system
smart contracts
telecommunication signalling
telecommunication traffic
computer network security
autonomous systems
blockchain
blockchain technology
collaboration
collaborative DDoS mitigation solution
collaborative protection mitigation
complex configuration
composability
Computer crime
attack traffic flow
coordinated DDoS mitigation approaches
cryptocurrencies
DDoS attack mitigation
ddos mitigation
deep learning
Deep learning DDoS detection system
defence capabilities
defence mechanisms
defence systems
biblio
IoT Security Model and Performance Evaluation: A Blockchain Approach
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
model construction
Throughput
theoretical data support
System performance
security risks
security problems
security of data
security model
Resiliency
resilience
Public key
pubcrawl
Predictive Metrics
performance evaluation
Packaging
blockchain
Metrics
IoT security model
InterPlanetary File System
Internet of Things
distributed large capacity storage
cyber-physical systems
cyber-physical system
Cryptography
concurrency (computers)
Concurrency
composability
blockchain-based security model
blockchain technology
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »