Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptocurrency
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
biblio
A Theoretical Model for Fork Analysis in the Bitcoin Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
fork branches
Theoretical modeling
theoretical cryptography
random processes
pubcrawl
Protocols
probability
peer-to-peer network
Peer-to-peer computing
network simulator OMNET
network protocols
network bandwidth
Nakamoto consensus
historical Bitcoin data
graph theory
fork occurrence probability
bitcoin
fork analysis
Erdös-Rényi random graph construction
Cryptography
cryptocurrency
cryptocurrencies
computational complexity
Compositionality
composability
blockchain networks
Blockchain fork
block selection rules
block propagation delay
Bitcoin network
Bitcoin consensus
biblio
Enhanced Cryptocurrency Security by Time-Based Token Multi-Factor Authentication Algorithm
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
security enhancement
wallets
transaction processing
time-based token multifactor authentication algorithm
time-based onetime password technique
single level password authentication
multifactor authentication algorithm
MFA token
MFA security scheme
Cryptocurrency security
multifactor authentication
Human Factors
security
cryptocurrency
password
cryptocurrencies
authentication
Computer hacking
Metrics
bitcoin
pubcrawl
Resiliency
authorisation
Computer crime
biblio
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
Human behavior
shamir secret sharing
Self-Sovereign Identity
secure management
Scalability
resilience
pubcrawl
Protocols
proof-of-concept digital wallet
practical key recovery model
password
Online banking
key recovery
identity management services
Identity management
Hyperledger Indy distributed ledger technology
authorisation
financial data processing
distributed ledger
digital wallet
digital identity management
decentralized key recovery solution
data privacy
Data models
Cryptography
cryptographic keys
cryptocurrency
cryptocurrencies
credentials
Computational modeling
blockchain
biblio
The Gap Game
Submitted by grigby1 on Mon, 12/16/2019 - 3:53pm
blockchains
centralization
Control Theory
cryptocurrency
Cyber Physical System
cyber physical systems
game theory
Human behavior
mining gap
privacy
pubcrawl
resilience
Resiliency
Scalability
biblio
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
Ransomware Injection
denial of service
exploitation
extortion
footprinting
intrusion detection and prevention systems
Locker
malicious
patch management
privilege escalation
ransomware attack
ransomware impact
cyber attack
Remote Terminal Units
rootkit
security pre-processor
social engineering
Stuxnet
supervisory control and data acquisition
tactics
techniques and procedures
Vulnerability
WannaCry
cyber physical systems
critical infrastructure
critical infrastructures
Industrial Control Systems
SCADA systems
cyber-physical systems
Resiliency
pubcrawl
composability
Ransomware
Metrics
Cybersecurity
invasive software
information security
cryptocurrency
RSA
Virtual private networks
command injection attacks
advanced encryption standard
command and control server
communication technologies
critical national infrastructure
crypto
biblio
Blockchain: A Tale of Peer to Peer Security
Submitted by grigby1 on Tue, 11/26/2019 - 3:38pm
Metrics
virtual money
survey
smart contracts
shared public ledger
security
Scalability
Resiliency
resilience
pubcrawl
Peer-to-peer computing
Peer-To-Peer
peer to peer security
bitcoin
Internet of Things
internet
Human Factors
human factor
Human behavior
Distributed databases
decentralization
cryptocurrency
cryptocurrencies
blockchain technology
blockchain
Bitcoin cryptocurrency
biblio
A Parallel Proof of Work to Improve Transaction Speed and Scalability in Blockchain Systems
Submitted by grigby1 on Fri, 06/28/2019 - 10:37am
nonce
transactions
transaction verification process
transaction speed
solo mining
software engineering
scalable verification
Scalability
reward system
Resiliency
resilience
pubcrawl
Proof of Work
parallel processing
parallel mining
bitcoin
Metrics
financial sector
financial data processing
distributed ledger
distributed consensus
Data mining
cryptocurrency
cryptocurrencies
Compositionality
blockchain systems
blockchain
Bitcoin mining
Bitcoin cryptocurrency
biblio
CAPTCHA: Machine or Human Solvers? A Game-Theoretical Analysis
Submitted by aekwall on Mon, 04/01/2019 - 10:07am
CAPTCHA solvers
welfare-improving CAPTCHA business model
ubiquitous defense
traditional wisdom
open Web resources
Machine Solver
human solvers
Human Solver
Games
game-theoretical analysis
game theoretical framework
equilibrium analysis
cryptocurrency
Complexity theory
cheap labor
CAPTCHA system
security of data
bitcoins
automatic programs
CAPTCHA
captchas
computer security
Economics
Web sites
Computer crime
blockchain
composability
pubcrawl
Human behavior
game theory
Servers
biblio
Multi-mode Cryptocurrency Systems
Submitted by aekwall on Mon, 04/01/2019 - 10:04am
pubcrawl
blockchain
blockchain security
cryptocurrency
Cryptographic Protocols
« first
‹ previous
1
2
3
4
5
6
next ›
last »