OALib Journal
  OALib Journal is an all-in-one open access journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721). It accepts a manuscript for the peer-review processing, typesetting, publication and then allocated to one of the 322 subject areas. The article processing charge for publishing in OALib journal is Only $99. For more details, please contact service@oalib.com. Submit now
               Articles    |    Aims & Scope    |    Instructions for Author     |    Editorial Board     |    Publishing Price    |    Indexing             


Go

Aug 25, 2022Open    AccessArticle

Discussion on “Zero-Trust” or “Evidence-Only” Architecture

Xianghao Nan
Recently, the U.S. Federal government and the Department of Defense announced the “Zero Trust” reigniting the debate on the logic of trust. Subject authentication is the core technology of cyber security. The traditional system is based on the reasoning logic of trust. The trust logic is the product of the situation that the authenticity of the subject cannot be proved, and the authenticity of the subject is remedied by a third party’s certificates. However, the authenticity of certificates stil...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1109099


Aug 04, 2022Open    AccessArticle

Information and Communication Technology Literacy in Medical Studies in Fez Morocco

Nada Otmani, Noura Qarmiche, Hind Bourkhime, Mohammed Omari, Imad Chakri, Moncef Maiouak, Ibtissam El Harch, Soumaya Ben Maamar, Bineta Jho Diagne, Nassiba Bahra, Nabil Tachfouti, Samira El Fakir
Objective: Our objective is to evaluate the level of knowledge and competencies in the use of ICT tools and the need for training in medical staff in the faculty of medicine and pharmacy of Fez. Methods: We conducted a cross-sectional survey from May 2021, in the Faculty of Medicine and Pharmacy of Fez in various doctor’s classes: professors, medical residents, interns, and students. The questionnaire was mainly organized into two sections about the level of 1) knowledge and competencies in the ...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1109061


Jul 28, 2022Open    AccessArticle

Design of a Secured Database System Using Blockchain Technology

Ignatius Chukwunwendu Ifedibasia, Moses Okechukwu Onyesolu, Daniel Ugoh
In this paper, a decentralized electronic voting system that provides inputs and outputs information support to admin/users in order to update their voting information while being capable of exhibiting different properties of blockchain security without the need for a third party. In this research, the Object Oriented Analysis and Design Methodology were adopted. The high level model of the proposed system was also designed and displayed in a format easily understandable to the user.
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1109010


Mar 10, 2022Open    AccessArticle

Discussion on Different Authentication Mechanisms of PKI and CPK System

Xianghao Nan
Subject authentication is the core technology of cyber security. There are two existing technologies: one is PKI public key system based on trust logic, another is CPK public key system based on truth logic. In this paper, the different characteristics of trust-based PKI and evidence-based CPK different mechanisms were discussed from Four aspects: decentralized or centralized key generation, trust-based or evidence-based authentication logic, different usages of DSS signature protocol, and funct...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1108460


Jan 27, 2022Open    AccessArticle

Software Implementation of AES-128: Cross-Subkey Side Channel Attack

Fanliang Hu, Junnian Wang, Wan Wang, Feng Ni
The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the number of training traces is restricted such as in the ASCAD database, deep-learning models always suffer from overfitting since the insufficient training data. One data-level solution is called data augmentation, which is to use the additional synthetically modified traces to act as a regul...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1108307


Jan 14, 2022Open    AccessArticle

CPK Public Key and Its Basic Functions

Xianghao Nan
This paper introduces the working principle of CPK (Combined Public Key) and the general method of constructing identifier-based public key, which can not only solve the problem of key distribution, but also solve the authentication problem of identifier claimed by the subject. As basic functions, identifier authentication, identifier password, digital signature and key encryption are introduced. Where Identifier authentication is a new concept, and a separate authentication protocol is formulat...
Open Access Library J.   Vol.9, 2022
Doi:10.4236/oalib.1108287


Dec 30, 2021Open    AccessArticle

Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network

Patrick Dany Bavoua Kenfack, Fabrice Kwefeu Mbakop, Edward Eyong-Ebai
The sustainability of a company depends on the permanent availability of its information system. This reality influences the behavior of companies, which are becoming increasingly mature in their investments in information system security, which is an absolutely vital element. The use of a service called “SYSLOG” to centralize the network event logs that are sent by printers, servers, routers, firewalls, IDS and IPS in an SYSLOG server is a perfect example for network optimization. In this work,...
Open Access Library J.   Vol.8, 2021
Doi:10.4236/oalib.1108000


Nov 15, 2021Open    AccessArticle

GAP Universal One-Step Authentication Protocol

Xianghao Nan
IoT authentication involves not only people, but also things, requiring a universal authentication method. The core authentication technology is the subject authenticity proof, but the traditional proof method based on model reasoning or based on third party trust transferring cannot solve. Therefore, a truth authentication logic based on evidence is created. The Truth Logic is realized by digital signature, and proves the entity authenticity by identifier authentication and ontology authenticat...
Open Access Library J.   Vol.8, 2021
Doi:10.4236/oalib.1108061


Sep 26, 2021Open    AccessArticle

Exploration of Core Technologies of Cyber Security

Xianghao Nan
In order to study the role of key technologies in information security, the main tasks and key technologies defined in different development stages were reviewed in this paper, focusing on exploring the main tasks and core technologies of cyber security. The proof logic of PKI certification system and the digital signature standard DSA were analyzed, subsequently the signature elements are clarified and found that CPK public key could satisfy all the elements, so the evidence-based truth logic o...
Open Access Library J.   Vol.8, 2021
Doi:10.4236/oalib.1107795


Jan 29, 2021Open    AccessArticle

An Efficient Identity-Based Forward Secure Signature Scheme from Lattices

Guang Wu, Ruwei Huang
With the use of a large number of mobile devices, the problem of key leakage becomes more and more serious. In view of the excellent characteristics of lattice cipher and forward-secure digital signature scheme, the construction of identity-based forward-secure digital signature based on lattice technology has become a research hotspot. However, the identity-based forward secure digital signature scheme on the existing grid has the disadvantage of excessive signature length. This paper uses the ...
Open Access Library J.   Vol.8, 2021
Doi:10.4236/oalib.1107126


Go

Contact Us

service@oalib.com

QQ:3279437679