OALib Journal
  OALib Journal is an all-in-one open access journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721). It accepts a manuscript for the peer-review processing, typesetting, publication and then allocated to one of the 322 subject areas. The article processing charge for publishing in OALib journal is Only $99. For more details, please contact service@oalib.com. Submit now
               Articles    |    Aims & Scope    |    Instructions for Author     |    Editorial Board     |    Publishing Price    |    Indexing             


Nov 28, 2023Open    Access

Cloud Computing Security, Protecting University Information

Anita C. Eluwa
Cybersecurity is the study of protecting information and systems. One of the most secure ways of protecting information online is through cloud services when used appropriately. In St. Mary’s university, cloud computing adaption has rapidly grown and evolved over the years. However, the protection and safety of students and staff’s information is still unsteady, which prompted the evaluation and survey of this research. In this paper, a risk analysis is performed on one of the university’s cloud...
Open Access Library J.   Vol.10, 2023

Jun 16, 2023Open    Access

Drivers of Mobile Payment Acceptance: The Impact of Network Externalities in Nigeria

Qasim M. Ajao, Olukotun Oludamilare, Lanre Sadeeq
The rising popularity of mobile payments can be attributed to the widespread use of smartphones and their applications. Despite its potential to simplify our lives, its adoption in African countries has been limited. This paper aims to enhance our understanding of the critical factors that influence the acceptance of mobile payments in Nigeria by exploring the impact of “network externalities” in addition to conventional technology acceptance factors. It posits that performance expectancy, effor...
Open Access Library J.   Vol.10, 2023

Oct 25, 2022Open    Access

Realization Technology of Digital Currency Hubee

Xianghao Nan
The digital currency Hubee is an equivalent tool for all digital assets to provide a safe and convenient mobility and storage serve. Mobility (payment) or storage (settlement) of digital assets is easy to solve separately, even with traditional technologies, but when to solve both simultaneously, new technologies are needed. Therefore, in this paper, the necessary functions of digital currency are analyzed and discussed. The biggest technical difficulty in the design of digital currency is the a...
Open Access Library J.   Vol.9, 2022

Aug 25, 2022Open    Access

Discussion on “Zero-Trust” or “Evidence-Only” Architecture

Xianghao Nan
Recently, the U.S. Federal government and the Department of Defense announced the “Zero Trust” reigniting the debate on the logic of trust. Subject authentication is the core technology of cyber security. The traditional system is based on the reasoning logic of trust. The trust logic is the product of the situation that the authenticity of the subject cannot be proved, and the authenticity of the subject is remedied by a third party’s certificates. However, the authenticity of certificates stil...
Open Access Library J.   Vol.9, 2022

Aug 04, 2022Open    Access

Information and Communication Technology Literacy in Medical Studies in Fez Morocco

Nada Otmani, Noura Qarmiche, Hind Bourkhime, Mohammed Omari, Imad Chakri, Moncef Maiouak, Ibtissam El Harch, Soumaya Ben Maamar, Bineta Jho Diagne, Nassiba Bahra, Nabil Tachfouti, Samira El Fakir
Objective: Our objective is to evaluate the level of knowledge and competencies in the use of ICT tools and the need for training in medical staff in the faculty of medicine and pharmacy of Fez. Methods: We conducted a cross-sectional survey from May 2021, in the Faculty of Medicine and Pharmacy of Fez in various doctor’s classes: professors, medical residents, interns, and students. The questionnaire was mainly organized into two sections about the level of 1) knowledge and competencies in the ...
Open Access Library J.   Vol.9, 2022

Jul 28, 2022Open    Access

Design of a Secured Database System Using Blockchain Technology

Ignatius Chukwunwendu Ifedibasia, Moses Okechukwu Onyesolu, Daniel Ugoh
In this paper, a decentralized electronic voting system that provides inputs and outputs information support to admin/users in order to update their voting information while being capable of exhibiting different properties of blockchain security without the need for a third party. In this research, the Object Oriented Analysis and Design Methodology were adopted. The high level model of the proposed system was also designed and displayed in a format easily understandable to the user.
Open Access Library J.   Vol.9, 2022

Mar 10, 2022Open    Access

Discussion on Different Authentication Mechanisms of PKI and CPK System

Xianghao Nan
Subject authentication is the core technology of cyber security. There are two existing technologies: one is PKI public key system based on trust logic, another is CPK public key system based on truth logic. In this paper, the different characteristics of trust-based PKI and evidence-based CPK different mechanisms were discussed from Four aspects: decentralized or centralized key generation, trust-based or evidence-based authentication logic, different usages of DSS signature protocol, and funct...
Open Access Library J.   Vol.9, 2022

Jan 27, 2022Open    Access

Software Implementation of AES-128: Cross-Subkey Side Channel Attack

Fanliang Hu, Junnian Wang, Wan Wang, Feng Ni
The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the number of training traces is restricted such as in the ASCAD database, deep-learning models always suffer from overfitting since the insufficient training data. One data-level solution is called data augmentation, which is to use the additional synthetically modified traces to act as a regul...
Open Access Library J.   Vol.9, 2022

Jan 14, 2022Open    Access

CPK Public Key and Its Basic Functions

Xianghao Nan
This paper introduces the working principle of CPK (Combined Public Key) and the general method of constructing identifier-based public key, which can not only solve the problem of key distribution, but also solve the authentication problem of identifier claimed by the subject. As basic functions, identifier authentication, identifier password, digital signature and key encryption are introduced. Where Identifier authentication is a new concept, and a separate authentication protocol is formulat...
Open Access Library J.   Vol.9, 2022

Dec 30, 2021Open    Access

Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network

Patrick Dany Bavoua Kenfack, Fabrice Kwefeu Mbakop, Edward Eyong-Ebai
The sustainability of a company depends on the permanent availability of its information system. This reality influences the behavior of companies, which are becoming increasingly mature in their investments in information system security, which is an absolutely vital element. The use of a service called “SYSLOG” to centralize the network event logs that are sent by printers, servers, routers, firewalls, IDS and IPS in an SYSLOG server is a perfect example for network optimization. In this work,...
Open Access Library J.   Vol.8, 2021


Contact Us