scispace - formally typeset
C

Charles A. Kamhoua

Researcher at United States Army Research Laboratory

Publications -  231
Citations -  3743

Charles A. Kamhoua is an academic researcher from United States Army Research Laboratory. The author has contributed to research in topics: Game theory & Computer science. The author has an hindex of 23, co-authored 208 publications receiving 2558 citations. Previous affiliations of Charles A. Kamhoua include Raytheon & Washington University in St. Louis.

Papers
More filters
Proceedings ArticleDOI

ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability

TL;DR: This paper designs and implements ProvChain, an architecture to collect and verify cloud data provenance by embedding the provenance data into blockchain transactions, and demonstrates that ProvChain provides security features including tamper-proof provenance, user privacy and reliability with low overhead for the cloud storage applications.
Journal ArticleDOI

Game Theory for Cyber Security and Privacy

TL;DR: This survey demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employgame theory to establish a comprehensive understanding of emergingSecurity and privacy problems in cyberspace and potential solutions.
Journal ArticleDOI

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

TL;DR: This paper systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains, and outlines several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.
Proceedings ArticleDOI

Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack

TL;DR: This paper model the block withholding (BWH) attack in a blockchain cloud considering distinct pool reward mechanisms and discusses blockchain's capability in providing assured data provenance in cloud and present vulnerabilities in blockchain cloud.
Posted Content

Exploring the Attack Surface of Blockchain: A Systematic Overview.

TL;DR: This paper systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains, and outlines several attacks, including selfish mining, the 51% attack, Domain Name System attacks, distributed denial-of-service (DDoS) attacks, consensus delay, orphaned blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks.