Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Consensus algorithm
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
Submitted by aekwall on Mon, 03/29/2021 - 12:08pm
Hash functions
unique ledger
tree-chain
scalable fast blockchain instantiation
parallel chain branches
nonmonetary applications
high transaction delays
hash function output
fast lightweight consensus algorithm
consensus code
Consensus algorithm
computationally expensive validator selection
hash algorithms
Cryptography
Compositionality
Public key
Throughput
pubcrawl
delays
trees (mathematics)
blockchain
Resiliency
IoT applications
Internet of Things (IoT)
security
Internet of Things
biblio
Design and Implementation of a Consensus Algorithm to build Zero Trust Model
Submitted by grigby1 on Thu, 03/04/2021 - 3:04pm
distributed systems
zero trust model
zero trust
trust model
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Human Factors
Acoustic Fingerprints
distributed ledger
Distributed databases
data transfer
Data Security
Consensus algorithm
Conferences
Companies
blockchain
biblio
The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-Hoc Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:55am
pubcrawl
wireless network systems
underutilized spectrum
telecommunication security
spectrum congestion
spectrum bands
signal detection
sensors
security measure
security
Resiliency
resilience
radio spectrums
radio spectrum management
Radio spectrum
Ad hoc networks
network leading interference
legitimate cognitive radios
Interference
data communications
cooperative communication
Consensus algorithm
Cognitive Radio Security
cognitive radio ad-hoc networks
cognitive radio
Cascading style sheets
byzantine attack mitigation scheme
byzantine attack
attack-proof cooperative spectrum sensing
« first
‹ previous
1
2