1,582
views
0
recommends
+1 Recommend
1 collections
    8
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Optimizing Blockchain for data integrity in Cyber Physical Systems

      Published
      proceedings-article
      1 , 1 , 1
      5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)
      ICS & SCADA Cyber Security Research
      29 - 30 August 2018
      Blockchain, Cyber-Physical Systems, Security, Data Integrity, Logging
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            August 2018
            August 2018
            : 74-83
            Affiliations
            [1 ]KIOS Center of Excellence, Department of Electrical and Computer Engineering, University of Cyprus
            Article
            10.14236/ewic/ICS2018.9
            440ae647-4de4-445c-bc67-8bc60be242a0
            © Koumidis et al. Published by BCS Learning and Development Ltd. Proceedings of ICS & SCADA 2018

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            5th International Symposium for ICS & SCADA Cyber Security Research 2018
            ICS-CSR 2018
            5
            University of Hamburg, Germany
            29 - 30 August 2018
            Electronic Workshops in Computing (eWiC)
            ICS & SCADA Cyber Security Research
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/ICS2018.9
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Security,Cyber-Physical Systems,Logging,Blockchain,Data Integrity

            REFERENCES

            1. 2005 Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing IACR Cryptology ePrint Archive

            2. 2015 NIST Special Publication 800-82: Guide to Industrial Control Systems (ICS) Security

            3. 2017 Decentralized User-Centric Access Control using PubSub over Blockchain abs/1710.00110

            4. 2017 Towards Blockchain-based Auditable Storage and Sharing of IoT Data Proceedings of the 2017 on Cloud Computing Security Workshop

            5. ,, 2017 Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds 26th USENIX Security Symposium

            6. Ittay Eyal and Emin Gn Sirery 2014 How to Disincentivize Large Bitcoin Mining Pools http://hackingdistributed.com/2014/06/18/how-to-disincentivize-large-bitcoin-mining-pools/

            7. 2008 Bitcoin: A Peer-to-Peer Electronic Cash System” May 2008

            8. . (1992 ricing via processing or combatting junk mail Lecture Notes in Computer Science 740

            9. 2017 Distributed ledger technology: Beyond block chain UK Government Office for Science

            10. 2016 Blockchains and Smart Contracts for the Internet of Things IEEE Access

            11. 2016 NIST SP 800-160 systems security engineering: Considerations for a multidisciplinary approach in the engineering of trustworthy secure systems Nat. Inst. Standards Technol., US Dept. Commerce Gaithersburg, MD, US

            12. 2017 SMART POOL: Practical Decentralized Pooled Mining IIACR Cryptology ePrint Archive

            13. 2016 Optimizing Governed Blockchains for Financial Process Authentications http://arxiv.org/abs/1612.00407

            14. 2014 Industrial Control System Network Traffic Data sets to Facilitate Intrusion Detection System Research Critical Infrastructure Protection VIII

            15. 2011 A Control System Testbed to Validate Critical Infrastructure Protection Concepts International Journal of Critical Infrastructure Protection

            16. 2003 Forward-security in private-key cryptography Proc. Topics Cryptol

            17. 1997 Forward-security in private-key cryptography

            Comments

            Comment on this article