OALib 期刊
  OALib Journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721)是一本多合一的开源期刊,以同行评审的方式出版发行文章,其所涵盖的研究领域多达311种领域。本刊发表的全部文章均可在期刊网站上免费阅读、下载、引用和传播。单篇文章出版费用为99美元。详情请咨询service@oalib.com 或 QQ: 3279437679 WhatsApp +8615387084133 WeChat 1538708413。现在就去投稿!
               文章    |    目标与领域    |    读者指南    |    编委    |    文章版面费    |    检索             


Go

Feb 20, 2024Open    Access

Replay Attack Prevention in Decentralised Contact Tracing: A Blockchain-Based Approach

Lavanya-Nehan Degambur
Digital contact tracing solutions have aided humanity in the first line of de-fense against the COVID-19 pandemic, but not without major technical drawbacks such as attacks against digital contact tracing technology and loss of privacy and security. The most popularly used digital contact tracing system is the decentralised DP-3T protocol and it suffers from the replay attack. A re-play attack involves taking contact tracing data from one location and re-transmitting it to another location and c...
Open Access Library J.   Vol.11, 2024
Doi:10.4236/oalib.1111179


Nov 28, 2023Open    Access

Cloud Computing Security, Protecting University Information

Anita C. Eluwa
Cybersecurity is the study of protecting information and systems. One of the most secure ways of protecting information online is through cloud services when used appropriately. In St. Mary’s university, cloud computing adaption has rapidly grown and evolved over the years. However, the protection and safety of students and staff’s information is still unsteady, which prompted the evaluation and survey of this research. In this paper, a risk analysis is performed on one of the university’s cloud...
Open Access Library J.   Vol.10, 2023
Doi:10.4236/oalib.1110925


Jun 16, 2023Open    Access

Drivers of Mobile Payment Acceptance: The Impact of Network Externalities in Nigeria

Qasim M. Ajao, Olukotun Oludamilare, Lanre Sadeeq
The rising popularity of mobile payments can be attributed to the widespread use of smartphones and their applications. Despite its potential to simplify our lives, its adoption in African countries has been limited. This paper aims to enhance our understanding of the critical factors that influence the acceptance of mobile payments in Nigeria by exploring the impact of “network externalities” in addition to conventional technology acceptance factors. It posits that performance expectancy, effor...
Open Access Library J.   Vol.10, 2023
Doi:10.4236/oalib.1110240


Oct 25, 2022Open    Access

Realization Technology of Digital Currency Hubee

Xianghao Nan
The digital currency Hubee is an equivalent tool for all digital assets to provide a safe and convenient mobility and storage serve. Mobility (payment) or storage (settlement) of digital assets is easy to solve separately, even with traditional technologies, but when to solve both simultaneously, new technologies are needed. Therefore, in this paper, the necessary functions of digital currency are analyzed and discussed. The biggest technical difficulty in the design of digital currency is the a...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1109324


Aug 25, 2022Open    Access

Discussion on “Zero-Trust” or “Evidence-Only” Architecture

Xianghao Nan
Recently, the U.S. Federal government and the Department of Defense announced the “Zero Trust” reigniting the debate on the logic of trust. Subject authentication is the core technology of cyber security. The traditional system is based on the reasoning logic of trust. The trust logic is the product of the situation that the authenticity of the subject cannot be proved, and the authenticity of the subject is remedied by a third party’s certificates. However, the authenticity of certificates stil...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1109099


Aug 04, 2022Open    Access

Information and Communication Technology Literacy in Medical Studies in Fez Morocco

Nada Otmani, Noura Qarmiche, Hind Bourkhime, Mohammed Omari, Imad Chakri, Moncef Maiouak, Ibtissam El Harch, Soumaya Ben Maamar, Bineta Jho Diagne, Nassiba Bahra, Nabil Tachfouti, Samira El Fakir
Objective: Our objective is to evaluate the level of knowledge and competencies in the use of ICT tools and the need for training in medical staff in the faculty of medicine and pharmacy of Fez. Methods: We conducted a cross-sectional survey from May 2021, in the Faculty of Medicine and Pharmacy of Fez in various doctor’s classes: professors, medical residents, interns, and students. The questionnaire was mainly organized into two sections about the level of 1) knowledge and competencies in the ...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1109061


Jul 28, 2022Open    Access

Design of a Secured Database System Using Blockchain Technology

Ignatius Chukwunwendu Ifedibasia, Moses Okechukwu Onyesolu, Daniel Ugoh
In this paper, a decentralized electronic voting system that provides inputs and outputs information support to admin/users in order to update their voting information while being capable of exhibiting different properties of blockchain security without the need for a third party. In this research, the Object Oriented Analysis and Design Methodology were adopted. The high level model of the proposed system was also designed and displayed in a format easily understandable to the user.
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1109010


Mar 10, 2022Open    Access

Discussion on Different Authentication Mechanisms of PKI and CPK System

Xianghao Nan
Subject authentication is the core technology of cyber security. There are two existing technologies: one is PKI public key system based on trust logic, another is CPK public key system based on truth logic. In this paper, the different characteristics of trust-based PKI and evidence-based CPK different mechanisms were discussed from Four aspects: decentralized or centralized key generation, trust-based or evidence-based authentication logic, different usages of DSS signature protocol, and funct...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1108460


Jan 27, 2022Open    Access

Software Implementation of AES-128: Cross-Subkey Side Channel Attack

Fanliang Hu, Junnian Wang, Wan Wang, Feng Ni
The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the number of training traces is restricted such as in the ASCAD database, deep-learning models always suffer from overfitting since the insufficient training data. One data-level solution is called data augmentation, which is to use the additional synthetically modified traces to act as a regul...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1108307


Jan 14, 2022Open    Access

CPK Public Key and Its Basic Functions

Xianghao Nan
This paper introduces the working principle of CPK (Combined Public Key) and the general method of constructing identifier-based public key, which can not only solve the problem of key distribution, but also solve the authentication problem of identifier claimed by the subject. As basic functions, identifier authentication, identifier password, digital signature and key encryption are introduced. Where Identifier authentication is a new concept, and a separate authentication protocol is formulat...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1108287


Go

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413