Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
electronic money
biblio
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
proof-of-work blockchain
honest-majority
Human behavior
modeling analysis
network connectivity
network modeling
node behavior
Peer-to-peer computing
PoW blockchain
Probabilistic logic
honest-but-potentially-colluding
Protocols
pubcrawl
Scalability
security
security impact
security of data
Security Properties
telecommunication security
consensus voting power
Analytical models
bitcoin
blockchain
blockchain forks
blockchain system
central trusted authority
consensus protocol
consensus security
analytical model
Cryptographic Protocols
Cryptography
Data mining
design system
different adversary models
distributed consensus system
electronic money
financial data processing
biblio
How to Securely Prune Bitcoin’s Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
financial data processing
velvet fork
Synchronization
snapshots
serious scalability issues
security
securely prune Bitcoin's blockchain
Scalability
pubcrawl
Peer-to-peer computing
Human behavior
bitcoin
electronic money
decentralized cryptocurrency
Cryptography
CoinPrune
bootstrapping
blockchain size
blockchain
block pruning
Bitcoin network
biblio
Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-to-Peer Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
electronic money
telecommunication network topology
security
pubcrawl
proximity-aware extensions
Protocols
propagation delay
physical topology
Peer-to-peer computing
named Master Node
Master Node protocol
logical neighbors
information propagation delay
Human behavior
peer to peer security
Electronic mail
delays
delay overhead
current Bitcoin protocol
clustering
Bitcoin peer-to-peer network
Bitcoin network
bitcoin
Human Factors
Metrics
Resiliency
Scalability
biblio
Understanding Trust, Privacy and Financial Fears in Online Payment
Submitted by aekwall on Mon, 11/23/2020 - 11:38am
online payment decision
Human behavior
human trust
customer concerns
customer fears
customer satisfaction
financial fear perception
financial fears
financial loss
privacy loss
online purchasing environment
online seller
payment page
payment security perception
perceived payment security
purchasing
risk perception
website
trust
Conferences
security
Trusted Computing
pubcrawl
privacy
Web sites
consumer behaviour
uncertainty
data privacy
Data collection
Human Factors
electronic money
online transactions
Decision Making
financial data processing
e-commerce
online payment
biblio
CoDAG: An Efficient and Compacted DAG-Based Blockchain Protocol
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
transaction processing
transaction verification time
transaction demand
linear structure
directed graphs
directed acyclic graph structure
directed acyclic graph
decentralized characteristic
compacted directed acyclic graph
compacted DAG structure
CoDAG
blockchain protocol
navigation
Scalability
electronic money
Throughput
blockchain security
blockchain platforms
ethereum
blockchain
bitcoin
pubcrawl
Resiliency
Protocols
Cryptography
biblio
Cascading Machine Learning to Attack Bitcoin Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
decentralized cryptocurrency
Resiliency
resilience
pubcrawl
pattern classification
multiclass classification performance
Metrics
learning (artificial intelligence)
Human behavior
graph model
entities classification
electronic money
digital assets
anonymity
data privacy
Cryptography
composability
cascading machine
cascading classifiers
blockchain
Bitcoin network
bitcoin entity characterization
bitcoin blockchain data
bitcoin anonymity
Bitcoin analysis
biblio
Challenges in Automation of Test Cases for Mobile Payment Apps
Submitted by aekwall on Mon, 07/27/2020 - 12:20pm
android
iOS Security
test case automation
Software Testing
software development life cycle
Mobile Testing
Mobile Payment Application
mobile based payment application
Automatic testing
Automatic Test Cases
ios
iOS (operating system)
Compositionality
Humanoid robots
Androids
Android (operating system)
security of data
electronic money
Human Factors
smart phones
Mobile Applications
web applications
software engineering
automation
testing
program testing
internet
Metrics
pubcrawl
Resiliency
mobile computing
biblio
Implementation QR Code Biometric Authentication for Online Payment
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
debit card
transaction sample
transaction process
transaction permits
simple transaction payment
QR code scan
online payment
online merchant
low-cost infrastructure
implementation biometric cloud authentication platform
face verification transaction
face biometric encryption
decryption transaction permission
Cryptography
Code Scan QR
biometric
bank implementation QR code biometric authentication payment online
transaction processing
QR codes
QR code
electronic money
cloud server
cyber physical systems
pubcrawl
Resiliency
mobile computing
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
biblio
Blockchain Based Secure Package Delivery via Ridesharing
Submitted by grigby1 on Mon, 03/02/2020 - 1:33pm
security
PBFT
Peer-to-peer computing
possible data leakage
promising service
pubcrawl
Ridesharing
ridesharing systems
Scalability
package delivery
Servers
Tamper resistance
tamper-resistance property
telecommunication security
time 15.0 s to 10.0 min
Transportation
vehicle occupancy
vehicles
delivery service
Blockchain based
blockchain efficiency
blockchain secured ridesharing delivery system
central controller
contracts
Cryptography
data privacy
delays
blockchain
electronic money
fault tolerance
fault tolerant computing
hash-oriented practical byzantine fault tolerance based consensus algorithm
Human behavior
Human Factors
Metrics
1
2
3
next ›
last »