Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
Articles 1 - 4 of 4
Full-Text Articles in Business
Privateex: Privacy Preserving Exchange Of Crypto-Assets On Blockchain, Lei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi
Privateex: Privacy Preserving Exchange Of Crypto-Assets On Blockchain, Lei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi
Computer Science Faculty Publications and Presentations
Bitcoin introduces a new type of cryptocurrency that does not rely on a central system to maintain transactions. Inspired by the success of Bitcoin, all types of alt cryptocurrencies were invented in recent years. Some of the new cryptocurrencies focus on privacy enhancement, where transaction information such as value and sender/receiver identity can be hidden, such as Zcash and Monero. However, there are few schemes to support multiple types of cryptocurrencies/assets and offer privacy enhancement at the same time. The major challenge for a multiple asset system is that it needs to support two-way assets exchange between participants besides one-way …
Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi
Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi
Computer Science Faculty Publications and Presentations
It is predicted that more than 20 billion IoT devices will be deployed worldwide by 2020. These devices form the critical infrastructure to support a variety of important applications such as smart city, smart grid, and industrial internet. To guarantee that these applications work properly, it is imperative to authenticate these devices and data generated from them. Although digital signatures can be applied for these purposes, the scale of the overall system and the limited computation capability of IoT devices pose two big challenges. In order to overcome these obstacles, we propose DIoTA, a novel decentralized ledger-based authentication framework for …
Phishing Websites Detection Using Machine Learning, Arun D. Kulkarni, Leonard L. Brown, Iii
Phishing Websites Detection Using Machine Learning, Arun D. Kulkarni, Leonard L. Brown, Iii
Computer Science Faculty Publications and Presentations
Tremendous resources are spent by organizations guarding against and recovering from cybersecurity attacks by online hackers who gain access to sensitive and valuable user data. Many cyber infiltrations are accomplished through phishing attacks where users are tricked into interacting with web pages that appear to be legitimate. In order to successfully fool a human user, these pages are designed to look like legitimate ones. Since humans are so susceptible to being tricked, automated methods of differentiating between phishing websites and their authentic counterparts are needed as an extra line of defense. The aim of this research is to develop these …
A New Product Anti-Counterfeiting Blockchain Using A Truly Decentralized Dynamic Consensus Protocol, Naif Alzahrani, Nirupama Bulusu
A New Product Anti-Counterfeiting Blockchain Using A Truly Decentralized Dynamic Consensus Protocol, Naif Alzahrani, Nirupama Bulusu
Computer Science Faculty Publications and Presentations
The growth of counterfeit goods has plagued the international community for decades. Nowadays, the battle against counterfeiting remains a significant challenge. Most of the current anti‐counterfeiting systems are centralized. Motivated by the evolution of blockchain technology, we propose (Block‐Supply), a decentralized anti‐counterfeiting supply chain that exploits NFC and blockchain technologies. This paper also proposes a new truly decentralized consensus protocol that, unlike most of the existing protocols, does not require PoW and randomly employs a different set of different size of validators each time a new block is proposed. Our protocol utilizes a game theoretical model to analyze the risk …