Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
permissioned blockchain
biblio
Detecting Blockchain Security Threats
Submitted by grigby1 on Tue, 04/27/2021 - 2:19pm
insider threat
Organizations
security
Monitoring
blockchain
pubcrawl
resilience
Resiliency
Scalability
information security
Measurement
distributed ledger
permissioned blockchain
Fabrics
security monitoring
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
pubcrawl
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
Identity-of-Things (IDoT)
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
distributed identity management model
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
Access Control
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
biblio
Identity management using permissioned blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
public key cryptography
identity cards
Identity management
identity management capabilities
identity thefts
India
permissioned blockchain
person identity authentication
personal data hashing
privacy
privacy concepts
private key cryptography
pubcrawl
Human behavior
public-private keys
resilience
Resiliency
Scalability
score-card
security
Self-Sovereign Identity
smart cards
smart contracts
unauthorized hands
US Home Land Security
efficient identity management
authorisation
Bitnation
blockchain technology
contracts
cryptocurrencies
data privacy
design information security
Digital India
distributed ledger
Distributed trust model
distribution control
e-Residency
Aadhar-card
Estonia
ethereum
Fabrics
financial data processing
fraud
fraud cases
Government
government agencies
government data processing
hashing algorithms
homeland security enterprise
biblio
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing
Submitted by grigby1 on Tue, 02/23/2021 - 2:26pm
distributed financial transaction processing
transaction processing
smart contract
Resistance
Resiliency
resilience
public key infrastructure
pubcrawl
Protocols
permissioned blockchain
network accountability
Monitoring
Metrics
immutable transactions
Distributed Ledger Technology
accountable financial transaction processing
Distributed databases
distributed banking transactions
distributed banking systems
Distributed Banking
Cryptography
cryptocurrencies
contracts
composability
centralized banks
blockchain-based distributed banking
BDB
banking service
bank data processing
bank account
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
biblio
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
Internet-of-Battlefield Things security
Topology
Scalability
Sawtooth
pubcrawl
Protocols
permissioned blockchain
network topology
network configuration
mission oriented tasks
military technology
military computing
IoBT environment
iobt
Internet-of-Things solutions
Ad hoc networks
Internet of Things
Human Factors
ergonomics
distributed ledger
Distributed databases
data communication
Cybersecurity
Cryptography
centralized communication technology
blockchain-integrated IoBT platform
blockchain usability
blockchain
Bandwidth
biblio
A Blockchain Framework for Ensuring Data Quality in Multi-Organizational Clinical Trials
Submitted by aekwall on Mon, 11/16/2020 - 1:11pm
multi-site trial management
activity-specific private channels
channel-specific smart contracts
clinical trial
data management infrastructure
high-throughput transactions
human subject protection
Institutional Review Board amendments
IRB
data quality
multiorganizational clinical trials
multiple organizations
multisite clinical trials
outsourcing trial management
pharmaceutical companies
pharmaceutical industry
site monitoring
distributed ledger
Resiliency
pubcrawl
composability
Metrics
blockchain
organisational aspects
cryptocurrencies
Distributed databases
data privacy
medical information systems
outsourcing
contracts
smart contract
Outsourced Database Integrity
permissioned blockchain
blockchain network
biblio
Traceability in Permissioned Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Scalability
encryption
Resiliency
pubcrawl
bitcoin
blockchain
cryptocurrencies
blockchain security
fully homomorphic encryption
Traceability
Hidden Markov models
zero knowledge proof
permissioned blockchain
hidden Markov model
permissionless blockchain
biblio
Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets
Submitted by grigby1 on Fri, 08/07/2020 - 3:38pm
Markov based mathematical model
threat surface
Resiliency
resilience
pubcrawl
Private Key Storage
private key leakage
private key cryptography
permissioned blockchain
outline justification
Metrics
Media
Mathematical model
Markov processes
Markov model
Air Gapped Storage
malware
key extraction
Human Factors
Human behavior
Electromagnetics
Distributed databases
cryptocurrencies
composability
Channel Exfiltration
attack surface
Atmospheric modeling
air-gapped blockchain wallets
Air gaps
Air Gapped Wallet
biblio
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms
Submitted by grigby1 on Fri, 08/07/2020 - 3:37pm
permissioned blockchain
Markov
Markov model
Markov processes
mathematical analysis
Mathematical model
Media
Metrics
outline justification
malware
permissioned blockchain platforms
private key leakage
Private Key Storage
pubcrawl
resilience
Resiliency
Scalability
security
composability
Air Gapped Wallet
air gapped wallet schemes
Air gaps
Atmospheric modeling
attack surface
blockchain
blockchain security
Channel Exfiltration
Air Gapped Storage
cryptocurrencies
data privacy
Distributed databases
Electromagnetics
Human behavior
Human Factors
key extraction
1
2
next ›
last »