Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cryptocurrencies
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 2:05pm
cryptocurrencies
pubcrawl
Human Factors
policy-based governance
resilience
Resiliency
data privacy
Scalability
privacy
Protocols
contracts
Receivers
Public key
privacy leakage
Elliptic curves
smart contract
transaction processing
anonymous improvement scheme
anonymous list
anonymous scheme
atomic exchange
blockchain atomic swap
self-certification
smart contract address information
UTXO unconsumed model
zero-knowledge proof
zero trust
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
Access Control
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
control systems
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
resilience
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
security
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
biblio
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing
Submitted by grigby1 on Tue, 02/23/2021 - 1:26pm
accountable financial transaction processing
bank account
bank data processing
banking service
BDB
blockchain-based distributed banking
centralized banks
composability
contracts
cryptocurrencies
Cryptography
Distributed Banking
distributed banking systems
distributed banking transactions
Distributed databases
distributed financial transaction processing
Distributed Ledger Technology
immutable transactions
Metrics
Monitoring
network accountability
permissioned blockchain
Protocols
pubcrawl
public key infrastructure
resilience
Resiliency
Resistance
smart contract
transaction processing
biblio
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities
Submitted by grigby1 on Wed, 02/10/2021 - 12:12pm
Data mining
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
security
internet
online front-ends
invasive software
bitcoin
malware
cryptojacking
cash money
Chrome Web browser add-on application
Coin Mining
Coinhive
computer resources
cryptocurrency mining
digital currencies
Hidden Cryptocurrency Mining
hidden cryptocurrency mining activities
malicious mining activities
MiNo
biblio
Advanced Behavior-Based Technique for Cryptojacking Malware Detection
Submitted by grigby1 on Wed, 02/10/2021 - 12:11pm
Monitoring
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cryptography
Libraries
malware
malware detection
Browsers
Cybercrime
Ransomware
Multicore processing
behavioral analysis
cryptojacking
malicious mining
biblio
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem
Submitted by grigby1 on Wed, 02/10/2021 - 12:10pm
Cryptography
Data mining
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Ecosystems
privacy
Semantics
bitcoin
Web sites
Hash functions
Web servers
cryptocurrency
cryptojacking
browser-based mining
Case-control study
compromised websites
cryptojacking campaigns
cryptojacking ecosystem
CryptoJacking websites
risk assessment
biblio
Behavior-Based Detection of Cryptojacking Malware
Submitted by grigby1 on Wed, 02/10/2021 - 12:10pm
Data mining
cryptocurrencies
pubcrawl
Human behavior
Metrics
resilience
Resiliency
internet
Computer crime
invasive software
Decision trees
Cybercrime
Ransomware
behavior-based detection
behavioral analysis
browser-based cryptojacking
complex detection technique
CPU load
cryptojacking
Cryptojacking detection
cryptojacking malware
cybercriminals
decision tree algorithm
detection program
executable-type cryptojacking
illegitimate profit
malicious mining
virtual machine environment
biblio
Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
Computer crime
Scalability
encryption
security
Cryptographic Protocols
Resiliency
pubcrawl
bitcoin
Cryptography
cryptocurrencies
digital signatures
public key cryptography
cryptocurrency
Elliptic curves
Computers
verification time
Comparative Analysis
Post-quantum cryptography
Signature Generation
signature verification
public key cryptosystems
bitcoin transaction security
Bitcoin transactions
classical algorithms
creating digital signatures
cryptographic systems security
current day algorithms
ECDSA key generation
Hash-based Signature Schemes
hash-based signatures
MSS Key generation
post-quantum digital Signature algorithms
RSA key generation
time 0.001 s
time 0.002 s
time 0.004 s
time 0.0164 s
time 0.0187 s
time 0.0778 s
time 0.1378 s
time 0.2012 s
time 13.494 s
time 16.29 s
time 17.474 s
time 2.0E-4 s
W-OTS key generation
biblio
Conditional Anonymity enabled Blockchain-based Ad Dissemination in Vehicular Ad-hoc Network
Submitted by grigby1 on Thu, 01/28/2021 - 12:59pm
ad dissemination
advertisement sharing
advertising
anonymity
authenticated users
behavioural privacy leakage
blockchain
blockchain-based ad dissemination
certificate-less cryptography
certification authority
composability
conditional anonymity
cryptocurrencies
Cryptography
data privacy
delays
Distributed databases
fair incentive mechanism
fake ads
Human behavior
in-vehicle service
internal attacker scenarios
malicious users
message authentication
Metrics
monitoring authority
privacy
pubcrawl
resilience
Resiliency
vehicle-to-infrastructure communication
vehicle-to-vehicle communication
vehicular ad hoc networks
Vehicular Ad-hoc Network
vehicular network
zero-knowledge proof of knowledge
ZKPoK
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
security
Scalability
Computational efficiency
data privacy
Hardware
Resiliency
pubcrawl
Cryptography
Metrics
blockchain
Distributed databases
analytic hierarchy process
cryptocurrencies
fuzzy set theory
cryptographic algorithms
AES
financial data processing
asymmetric cryptographic algorithms
ECDSA
experts grading method
FAHP
fuzzy analytic hierarchy process
SHA256
suitable cryptographic algorithm
symmetric cryptographic algorithms
Fuzzy Cryptography
1
2
3
4
5
6
7
next ›
last »