Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blockchain technology
biblio
Blockchain: A Tale of Peer to Peer Security
Submitted by grigby1 on Tue, 11/26/2019 - 2:38pm
Metrics
virtual money
survey
smart contracts
shared public ledger
security
Scalability
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Peer-To-Peer
peer to peer security
bitcoin
Internet of Things
internet
Human Factors
human factor
Human behavior
Distributed databases
decentralization
cryptocurrency
cryptocurrencies
blockchain technology
blockchain
Bitcoin cryptocurrency
biblio
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control
Submitted by grigby1 on Thu, 09/26/2019 - 9:43am
decentralized safety administration
Security analysis
Secure File Sharing
Safety
Resiliency
resilience
pubcrawl
Peer-to-peer computing
outsourcing data
outsourcing
Metrics
Human Factors
Human behavior
fine-grained data access control
encryption
Distributed databases
Access Control
Data Security
data integrity
Cryptography
CP-ABE
composability
cloud storage
cloud service provider
cloud server
Cloud Computing
ciphertext-policy attribute based encryption
blockchains
blockchain-based secure cloud file sharing scheme
blockchain technology
blockchain
authorisation
biblio
A security architecture of VANET based on blockchain and mobile edge computing
Submitted by aekwall on Mon, 04/01/2019 - 9:04am
Network Security Architecture
Vehicular Ad-hoc Network
vehicular ad hoc networks
VANET data
VANET
trusted central entity
service layer
security of data
security architecture
security
Resiliency
pubcrawl
perception layer
blockchain
Mobile Edge Computing
mobile computing
edge computing layer
edge computing
edge cloud services
Distributed databases
Data Security
computer architecture
Cloud Computing
blockchain technology
blockchain security
biblio
Towards Blockchain-Based Scalable and Trustworthy File Sharing
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
ensures confidentiality
Writing
Trustworthy Systems
trustworthy file sharing
Trusted Computing
scalable key management mechanism
revoked users
Resiliency
resilience
pubcrawl
proxy re-encryption based design
Peer-to-peer computing
malicious behaviour
files integrity
file organisation
file encryption keys
Access Control
encryption
encrypted file sharing
distributed proxies
distributed ledgers
distributed access control
data management
cyber physical systems
Cryptography
cryptocurrency
composability
blockchain- based file storage systems
blockchain technology
Bandwidth
authorisation
auditable information
biblio
Alice in Blockchains: Surprising Security Pitfalls in PoW and PoS Blockchain Systems
Submitted by grigby1 on Wed, 11/14/2018 - 12:19pm
human misbehavior
vulnerabilities
software defects
security pitfalls
security
Scalability
pubcrawl
privacy
PoW blockchain systems
PoW
PoS blockchain systems
PoS
nonfinancial applications
mathematical basis
bitcoin
Human Factors
Hacking
Governance
financial data processing
expert systems
electronic money
ecosystem issues
Cryptography
contracts
Companies
blockchain technology
blockchain
Bitcoin exchanges
biblio
Blockchain: Solving the Privacy and Research Availability Tradeoff for EHR Data: A New Disruptive Technology in Health Data Management
Submitted by grigby1 on Wed, 11/14/2018 - 12:19pm
policy maker institutions
health system developers
Human Factors
law regulations
lifelong recorded patient health data
Medical services
multisignature data access
patient data
patient privacy
Health information ecosystem
policy makers
population health management
privacy
privacy data
protective principles
pubcrawl
Scalability
secure data storing
defensive data hiding attitude
blockchain
blockchain technology
Business
cryptographically secured data storage
Cryptography
data availability
data privacy
data structures
American HIPAA regulation
disruptive technology
EHR
EHR data
electronic health records
ethical problems
expert systems
health data management
Health data storage
biblio
Big Data Model of Security Sharing Based on Blockchain
Submitted by grigby1 on Thu, 08/23/2018 - 10:37am
Industries
trust issue
smart contract
security sharing
security of data
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
industry development
Big Data
Government
data size
data sharing
data safe circulation
data resources
Data models
contracts
blockchain technology
blockchain security
blockchain
Big Data sharing model
biblio
Beyond the Hype: On Using Blockchains in Trust Management for Authentication
Submitted by grigby1 on Mon, 03/26/2018 - 11:55am
PKI Trust Models
web of trust
ubiquitous system
ubiquitous computing
Trusted Computing
Trust Management for authentication
Trust management
TM systems
Resiliency
resilience
Public key
pubcrawl
attacks and defences
Organizations
open distributed ledgers
online interactions security
ODL
interactive systems
formal modeling
Electronic mail
composability
blockchain technology
bitcoin
authentication
biblio
Securing user identity and transactions symbiotically: IoT meets blockchain
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
permissioned blockchain
user identity
transactions symbiotically
standards
security of data
security
Scalability
Robustness
Resiliency
Public key
pubcrawl
Protocols
privacy
Permissioned Blockchains
attribute management
performance evaluation
IoT
Internet of Things
Identity management
Human behavior
History
embedded devices
Distributed Identity Management
device identity
data privacy
Cryptography
blockchain technology
blockchain
biblio
Identity management using blockchain for cognitive cellular networks
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
pubcrawl
integrated circuits
network signaling traffic
opportunistic network access technologies
Performance
privacy
privacy-enhancing user identity management system
Protocols
pseudonymous identities
Identity management
radio spectrum management
Resiliency
Scalability
spectrum crunch
telecommunication network management
telecommunication security
telecommunication signalling
telecommunication traffic
Cloud Computing
assertion
authentication
authorization
blockchain
blockchain technology
Cellular networks
cellular radio
cloud-centric cognitive cellular networks
accounting
cognitive cellular network blockchain
cognitive radio
contracts
Cryptography
dynamic spectrum access
end-to-end management
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »