Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
contracts
biblio
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
LN community
wormhole attack
sensitive payment information
security vulnerabilities
security
Scalability
Receivers
quantitative analysis
pubcrawl
privacy
permissionless decentralized cryptocurrencies
payment channel networks
network-wide DoS attack costs
multihop payment protocols
anonymity
Lightning Network
Lightning
Human behavior
denial-of-service attacks
data privacy
Cryptographic Protocols
cryptocurrencies
contracts
concurrent payments
computer network security
channel capacity
bitcoin
anonymity issues
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Protocols
zero-knowledge proof
zero trust
UTXO unconsumed model
transaction processing
smart contract address information
smart contract
self-certification
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
anonymous improvement scheme
privacy leakage
privacy
policy-based governance
Human Factors
Elliptic curves
data privacy
cryptocurrencies
contracts
blockchain atomic swap
atomic exchange
anonymous scheme
anonymous list
biblio
Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology
Submitted by grigby1 on Thu, 03/04/2021 - 2:56pm
proactive defense operations
defense
defense perspectives
increases security awareness
invasive software
knowledge-sharing platform
legacy security defense mechanisms
malware campaigns
open-source permissioned blockchain platform
Peer-to-peer computing
potential attacks
proactive defense
cyber-attacks
pubcrawl
resilience
SDN
SDN networks
secure distributed model
software defined networking
sophisticated threats
tamper-proof record-keeping
Zero day attacks
zero-day
Collaborative DDoS Mitigation
Resiliency
Metrics
Human behavior
blacklisting
blockchain
blockchain application
blockchain technology
collaboration
collaborative cyber attack defense
collaborative DDoS attack mitigation
threat mitigation
Collaborative Defense
composability
Computer crime
computer network management
computer network security
contracts
Cryptography
cyber threat intelligence
cyber threat intelligence plays
cyber threat intelligence sharing
biblio
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing
Submitted by grigby1 on Tue, 02/23/2021 - 2:26pm
distributed financial transaction processing
transaction processing
smart contract
Resistance
Resiliency
resilience
public key infrastructure
pubcrawl
Protocols
permissioned blockchain
network accountability
Monitoring
Metrics
immutable transactions
Distributed Ledger Technology
accountable financial transaction processing
Distributed databases
distributed banking transactions
distributed banking systems
Distributed Banking
Cryptography
cryptocurrencies
contracts
composability
centralized banks
blockchain-based distributed banking
BDB
banking service
bank data processing
bank account
biblio
Data Provenance Assurance for Cloud Storage Using Blockchain
Submitted by grigby1 on Tue, 02/23/2021 - 2:26pm
Metrics
data record operations
Digital Forensics
Distributed databases
ethereum
Ethereum blockchain
Forensics
IPFS
metadata
Data Provenances
network accountability
privacy
pubcrawl
resilience
Resiliency
SLA-violations
storage management
storage privacy
cloud-based data provenance
AWS S3 storage
blockchain network
Cloud Computing
cloud data object
cloud forensics
cloud infrastructures
cloud storage
cloud storage forensics
AWS S3
composability
confidential files
contracts
Cryptography
data accountability
data integrity
data privacy
data provenance assurance
biblio
Auditable secure network overlays for multi-domain distributed applications
Submitted by grigby1 on Tue, 02/23/2021 - 2:23pm
Metrics
Virtual private networks
software stack
Resiliency
resilience
Public key
pubcrawl
Prototypes
overlay networks
overlay network
organisational boundaries
operational infrastructure
network accountability
multidomain overlay network
multidomain distributed applications
actionable contracts
marketplace
internet
digital data market place infrastructure
data sharing
Data processing
Data collection
Cryptography
contracts
computer network security
composability
communication fabric
auditing
auditable secure network overlays
actors
biblio
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI
Submitted by aekwall on Mon, 02/01/2021 - 11:40am
Public key
digital trust
ethereum
Ethereum blockchain
human interaction
human trust
Internet of Things
PKI model
Protocols
pubcrawl
digital certificates
public key cryptography
public key infrastructure
Public Key Infrastructure model
Servers
trust
trust concerns
trust enhancement
trusted Certificate Authority
automation issue
Resiliency
Scalability
Human behavior
Metrics
ACME
ACME protocol
authorisation
Automated Certificate Management Environment
PKI Trust Models
blockchain
blockchain technology
certificate authority
certificate issuance automation protocol
certification
contracts
conventional security models
current trust issues
biblio
I Can Get Some Satisfaction: Fuzzy Ontologies for Partial Agreements in Blockchain Smart Contracts
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
Semantics
Fuzzy Cryptography
partial agreement
Pareto-optimal solutions
Fuzzy sets
fuzzy ontology reasoning task
fuzzy ontologies
blockchain smart contracts
best satisfiability degree
Pareto optimisation
blockchain systems
fuzzy reasoning
Ethereum blockchain
inference mechanisms
Scalability
cognition
contracts
smart contracts
fuzzy set theory
cryptocurrencies
ontologies (artificial intelligence)
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Ontologies
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:33pm
contracts
trustworthiness-protection system
trustworthiness management
trustworthiness gap
trusted corporations
multiple-domain business partners
malicious falsification attacks
Isolated data islands
global trustworthiness
data trustworthiness
cloud-based prototype
blockchain-based approach
Prototypes
edge computing
Cloud Computing
Virtual machining
ethereum
trustworthiness
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Trusted Computing
Organizations
data privacy
authorisation
biblio
Design of Trusted B2B Market Platforms using Permissioned Blockchains and Game Theory
Submitted by grigby1 on Wed, 12/02/2020 - 2:15pm
secure B2B collaboration
Human behavior
Human Factors
insert
online business-to-business collaboration platforms
permissioned blockchain
privacy
privacy preservation
private B2B collaboration
pubcrawl
Games
smart contracts
Strategic Agents
style
styling
trust
trusted B2B market platforms
trusted collaboration
Trusted Computing
cryptographic regulation protocols
blockchain
business data processing
business sensitive information
collaboration
competitive agents
component
Computing Theory
contracts
Cryptographic Protocols
adequate transparency
data privacy
deep business logic
electronic commerce
enterprise buyers
enterprise sellers
formatting
game theoretic modeling
game theory
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »