Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Business

Privateex: Privacy Preserving Exchange Of Crypto-Assets On Blockchain, Lei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi Mar 2020

Privateex: Privacy Preserving Exchange Of Crypto-Assets On Blockchain, Lei Xu, Lin Chen, Zhimin Gao, Keshav Kasichainula, Miguel Fernandez, Bogdan Carbunar, Weidong Shi

Computer Science Faculty Publications and Presentations

Bitcoin introduces a new type of cryptocurrency that does not rely on a central system to maintain transactions. Inspired by the success of Bitcoin, all types of alt cryptocurrencies were invented in recent years. Some of the new cryptocurrencies focus on privacy enhancement, where transaction information such as value and sender/receiver identity can be hidden, such as Zcash and Monero. However, there are few schemes to support multiple types of cryptocurrencies/assets and offer privacy enhancement at the same time. The major challenge for a multiple asset system is that it needs to support two-way assets exchange between participants besides one-way …


Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi Jan 2020

Diota: Decentralized Ledger Based Framework For Data Authenticity Protection In Iot Systems, Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Taeweon Suh, Weidong Shi

Computer Science Faculty Publications and Presentations

It is predicted that more than 20 billion IoT devices will be deployed worldwide by 2020. These devices form the critical infrastructure to support a variety of important applications such as smart city, smart grid, and industrial internet. To guarantee that these applications work properly, it is imperative to authenticate these devices and data generated from them. Although digital signatures can be applied for these purposes, the scale of the overall system and the limited computation capability of IoT devices pose two big challenges. In order to overcome these obstacles, we propose DIoTA, a novel decentralized ledger-based authentication framework for …


Phishing Websites Detection Using Machine Learning, Arun D. Kulkarni, Leonard L. Brown, Iii Aug 2019

Phishing Websites Detection Using Machine Learning, Arun D. Kulkarni, Leonard L. Brown, Iii

Computer Science Faculty Publications and Presentations

Tremendous resources are spent by organizations guarding against and recovering from cybersecurity attacks by online hackers who gain access to sensitive and valuable user data. Many cyber infiltrations are accomplished through phishing attacks where users are tricked into interacting with web pages that appear to be legitimate. In order to successfully fool a human user, these pages are designed to look like legitimate ones. Since humans are so susceptible to being tricked, automated methods of differentiating between phishing websites and their authentic counterparts are needed as an extra line of defense. The aim of this research is to develop these …


A New Product Anti-Counterfeiting Blockchain Using A Truly Decentralized Dynamic Consensus Protocol, Naif Alzahrani, Nirupama Bulusu Mar 2019

A New Product Anti-Counterfeiting Blockchain Using A Truly Decentralized Dynamic Consensus Protocol, Naif Alzahrani, Nirupama Bulusu

Computer Science Faculty Publications and Presentations

The growth of counterfeit goods has plagued the international community for decades. Nowadays, the battle against counterfeiting remains a significant challenge. Most of the current anti‐counterfeiting systems are centralized. Motivated by the evolution of blockchain technology, we propose (Block‐Supply), a decentralized anti‐counterfeiting supply chain that exploits NFC and blockchain technologies. This paper also proposes a new truly decentralized consensus protocol that, unlike most of the existing protocols, does not require PoW and randomly employs a different set of different size of validators each time a new block is proposed. Our protocol utilizes a game theoretical model to analyze the risk …