Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
blockchain system
biblio
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 2:50pm
proof-of-work blockchain
honest-majority
Human behavior
modeling analysis
network connectivity
network modeling
node behavior
Peer-to-peer computing
PoW blockchain
Probabilistic logic
honest-but-potentially-colluding
Protocols
pubcrawl
Scalability
security
security impact
security of data
Security Properties
telecommunication security
consensus voting power
Analytical models
bitcoin
blockchain
blockchain forks
blockchain system
central trusted authority
consensus protocol
consensus security
analytical model
Cryptographic Protocols
Cryptography
Data mining
design system
different adversary models
distributed consensus system
electronic money
financial data processing
biblio
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
Cryptography
user authentication
Servers
security
secret key management technology
secret key management issues
Secret key management
public key cryptography
pubcrawl
key management devices
Fuzzy signature
fuzzy set theory
Fuzzy Cryptography
digital signatures
decentralized payments
key management
blockchain technology
blockchain system
biometrics-based digital signature scheme
biometrics fuzzy signature
Biometrics authentification
biometrics (access control)
biometric information
authorisation
authentication
Human behavior
Metrics
Resiliency
Scalability
biblio
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Submitted by grigby1 on Tue, 12/15/2020 - 1:25pm
blockchain designs
trust-corrupting
truly scalable system
system throughput
sharding proposals
security scalability
PolyShard
polynomially coded sharding
performance scalability
node subsets
linearly scaling efficiency
information-theoretic upper bounds
decentralization scalability
coded storage protocol
coded sharding
Cryptography
coding theory
blockchain system
storage efficiency
information theory
linear codes
Compositionality
polynomials
Protocols
security
Resiliency
resilience
Metrics
pubcrawl
security of data
biblio
The Survey on Intellectual Property Based on Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
bitcoin
ip protection
transaction throughput
transaction anonymity
Time delay
Tamper-Resistance
resource consumption
Proof of Stake
optimization mechanisms
encryption algorith
cross-chain
copyrights
copyright
consensus mechanism
blockchain system
cryptocurrencies
optimisation
composability
Industries
internet
blockchain technology
intellectual property
optimization
Resiliency
resilience
policy-based governance
pubcrawl
Distributed databases
blockchain
biblio
Blockchain-Based Management of Video Surveillance Systems
Submitted by aekwall on Mon, 04/13/2020 - 10:27am
video surveillance system
video metadata
trusted internal managers
private DB
internal manager
DRM-applied video player
decryption key
data forgery
blockchain-based management
blockchain system
blockchain network
Hyperledger Fabric
IPFS
Fabrics
authorisation
video surveillance
Streaming media
meta data
distributed ledger
blockchain
Metrics
Peer-to-peer computing
Licenses
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
revoked certificates checking
log-based schemes
Metrics
Monitoring
Protocols
pubcrawl
public key cryptography
query processing
resilience
Resiliency
log servers
Scalability
Security analysis
Servers
SSL connections
SSL Trust Models
system monitoring
telecommunication security
TLS connections
data consistency
blockchain system
blockchain-based public
Certchain
certificate audit service
certificate forward traceability
certificate revocation checking
certificate revocation mechanisms
certification
Cryptographic Protocols
auditing
data privacy
data structure
data structures
DCBF
dependability-rank based consensus protocol
dual counting bloom filter
Electronic mail
Human behavior