27 Hits in 5.0 sec

ABC: A Cryptocurrency-Focused Threat Modeling Framework [article]

Ghada Almashaqbeh, Allison Bishop, Justin Cappos
2019 arXiv   pre-print
The use cases further attest to the usefulness of ABC's tools for both cryptocurrency-based systems, as well as a cloud native security technology.  ...  This is due, in part, to complex collusion cases and new threat vectors that could be missed by conventional security assessment strategies.  ...  For example, CompuCoin's servers provide a computation outsourcing service and collect payments in return.  ... 
arXiv:1903.03422v2 fatcat:ubuy32d7kff6xiqutssplmpkg4

Blockchain Technologies for the Internet of Things: Research Issues and Challenges

Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke
2018 IEEE Internet of Things Journal  
Then, we provide an overview of the application domains of blockchain technologies in IoT, e.g, Internet of Vehicles, Internet of Energy, Internet of Cloud, Fog computing, etc.  ...  Based on the current survey, we highlight open research challenges and discuss possible future research directions in the blockchain technologies for IoT.  ...  [57] proposed a fair payment scheme for outsourcing computations of Fog devices.  ... 
doi:10.1109/jiot.2018.2882794 fatcat:xt2oh3dmozgrjg3n42xsdgm7f4

Cooperate Delegation of Computation for Rational Party using Zero-determinant Strategy Approach

Duo Zhang, Youliang Tian, Chaoyue Yue, Meimei Fan
2020 IEEE Access  
cloud computing.  ...  Delegating calculation is an important approach to solve the correctness and reliability of task subcontracting and delegating calculation results in cloud computing environment.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1109/access.2020.2971544 fatcat:u4hqn4xiw5hq5pqpgswqopqawm

When Blockchain Meets Auction Models: A Survey, Some Applications, and Challenges [article]

Zeshun Shi, Cees de Laat, Paola Grosso, Zhiming Zhao
2021 arXiv   pre-print
As an essential market process, auctions have been well studied and applied in many business fields due to their efficiency and contributions to fair trade.  ...  In recent years, blockchain has gained widespread attention as an emerging technology for decentralization, transparency, and immutability in advancing online activities over public networks.  ...  To eliminate systemic risks caused by collusion in large-scale data auctions, the authors in [132] introduced a decentralized data auction system that uses an anti-collusion auction algorithm executed  ... 
arXiv:2110.12534v1 fatcat:tpy2cv7sz5dc3dpchnmrniab5e

A survey on game theoretical methods in Human–Machine Networks

Xueqin Liang, Zheng Yan
2017 Future generations computer systems  
, cloud computing [12] , intrusion detection [13] , and so on.  ...  The authors used a CH-based iterative process to compute an optimal strategy for every player based on its beliefs.  ... 
doi:10.1016/j.future.2017.10.051 fatcat:55v7cpi64ndb3apj4ngbkin5ue

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  We propose the security reference architecture (SRA) for blockchains, which adopts a stacked model (similar to the ISO/OSI) describing the nature and hierarchy of various security and privacy aspects.  ...  Blockcloud is an approach that utilizes blockchains for data provenance in cloud computing [241] .  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi

When Blockchain Meets Smart Grids: A Comprehensive Survey [article]

Yihao Guo, Zhiguo Wan, Xiuzhen Cheng
2021 arXiv   pre-print
We also present thorough comparison studies among blockchain-based solutions for smart grids from different perspectives, with the aim to provide insights on integrating blockchain with smart grids for  ...  Compared with traditional centralized approaches, blockchain-based solutions are able to exploit the advantages of blockchain to realize better functionality in smart grids.  ...  management, provenance, healthcare, Internet-of-Things to cloud computing.  ... 
arXiv:2109.14130v1 fatcat:iqdtdkjvffaoxjmuotie4nuqle

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

Ivan Homoliak, Sarad Venugopalan, Daniel Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
2020 IEEE Communications Surveys and Tutorials  
Blockchains are distributed systems, in which security is a critical factor for their success.  ...  to systematize and extend the knowledge about the security and privacy aspects of blockchains and contribute to the standardization of this domain.We propose the security reference architecture (SRA) for  ...  ACKNOWLEDGMENT The authors would like to thank our colleagues Pieter Hartel, Stefanos Leonardos, and Mark van Staalduinen for their valuable feedback.  ... 
doi:10.1109/comst.2020.3033665 fatcat:hcrsvvkb2ffmbdlspshy66wg2y

Foundations, Properties, and Security Applications of Puzzles: A Survey [article]

Isra Mohamed Ali, Maurantonio Caprolu, Roberto Di Pietro
2020 arXiv   pre-print
Overall, puzzles have experienced a renewed interest with the advent of Bitcoin, which uses a CPU-intensive puzzle as proof of work.  ...  Finally, we highlight the features and limitations of each approach, providing a useful guide for the future development of new puzzle schemes.  ...  ACKNOWLEDGMENTS e authors would like to thank the anonymous reviewers for their comments and suggestions, that helped improving the quality of the manuscript. is publication was partially supported by  ... 
arXiv:1904.10164v3 fatcat:xurbif2cxjgp5gtcrq56rtm4qa

Toxicity Analysis and Cry Gene Profiling of Bacillus Thuringiensis Isolated from Western Ghats of Tamil Nadu State, India

A. Ramalakshmi, P. Annakodi, V. Udayasurian, V. Balasubramani
2018 Proceedings of the Indian National Science Academy  
Computing as a discipline is a recent one even though the practice of using mechanical aids for calculation can have various dates based on the perspective of the reader like Blaise Pascal in 1600s, George  ...  The thesis, which had a far-reaching impact on this field, is informally stated below: Any algorithmic problem for which an algorithm can be found in any programming language on any computer (existing  ...  The system is based on cloud technology.  ... 
doi:10.16943/ptinsa/2018/49413 fatcat:2w6rohpbava5zh6m26tsiz7qky

Cryptocurrency and the Myth of the Trustless Transaction

Rebecca M. Bratspies
2018 Social Science Research Network  
If you want fair, cryptocurrency isn't for you.  ...  Kevin Liao & Jonathan Katz, Incentivizing Double-Spend Collusion in Bitcoin, in FINANCIAL CRYPTOGRAPHY BITCOIN WORKSHOP (2017), reupapers/katzbitcoin16.pdf (describing  ...  Most new buyers do not treat their bitcoin as a means of exchange and payment.  ... 
doi:10.2139/ssrn.3141605 fatcat:nplhy3pofjbaxjsf6aojbyckfm

Lightweight and privacy-preserving data aggregation for mobile multimedia security

Sugang Ma, Tiantian Zhang, Axin Wu, Xiangmo Zhao
2019 IEEE Access  
And, the computational efficiency of the client is inefficient. In this paper, a lightweight and privacy-preserving data aggregation for mobile multimedia is proposed.  ...  In the proposed scheme, the terminal calculation is lightweight and there is no trusted third party in our scheme.  ...  Zhang et al. proposed two fair payment schemes for outsourced data security based on the Bitcoin blockchain [19] and the Ethereum blockchain [20] .  ... 
doi:10.1109/access.2019.2935513 fatcat:z5j5iwcgwnf3dofutks6ofi24i

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Arezou Soltani Panah, Ron Van Schyndel, Timos Sellis, Elisa Bertino
2016 IEEE Access  
For multimedia watermarks, invisibility is defined in human terms (that is, in terms of human sensory limitations).  ...  For example, a loose definition of robustness might be in terms of the resilience of a watermark against normal host data operations, and of invisibility as resilience of the data interpretation against  ...  CLOUD COMPUTING In recent years, cloud computing has emerged as one of the most promising computing paradigms.  ... 
doi:10.1109/access.2016.2570812 fatcat:2xxteahvprepzekaqqbbyey7hi

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+93 others)
2017 An Investigation on Biometric Internet Security International Journal of Network Security   unpublished
Due to the Internet revolution in the last decade, each and every work area of society are directly or indirectly depending on computers, highly integrated computer networks and communication systems,  ...  This investigation helps in clear understating of e-security challenges and possible implementation of the identified measurements for the challenges in wide area of network communications.  ...  Acknowledgments The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER  ... 

Pandora's Digital Box: The Promise and Perils of Digital Wallets

Adam J. Levitin
2017 Social Science Research Network  
Merchants are constrained in their ability to refuse or condition payments from digital wallets based on the risks presented because of merchant rules promulgated by credit card networks.  ...  Integration of payments with realtime communications holds out tremendous promise for consumers and merchants alike: the combination, in a single, convenient platform, of search functions, advertising,  ...  data stored in the cloud.  ... 
doi:10.2139/ssrn.2899104 fatcat:5vyrlrnrfbhtnncmv7moziw4mq
« Previous Showing results 1 — 15 out of 27 results