OALib Journal
  OALib Journal is an all-in-one open access journal (ISSN Print: 2333-9705, ISSN Online: 2333-9721). It accepts a manuscript for the peer-review processing, typesetting, publication and then allocated to one of the 322 subject areas. The article processing charge for publishing in OALib journal is Only $99. For more details, please contact service@oalib.com. Submit now
               Articles    |    Aims & Scope    |    Instructions for Author     |    Editorial Board     |    Publishing Price    |    Indexing             


Jan 14, 2022Open    AccessArticle

CPK Public Key and Its Basic Functions

Xianghao Nan
This paper introduces the working principle of CPK (Combined Public Key) and the general method of constructing identifier-based public key, which can not only solve the problem of key distribution, but also solve the authentication problem of identifier claimed by the subject. As basic functions, identifier authentication, identifier password, digital signature and key encryption are introduced. Where Identifier authentication is a new concept, and a separate authentication protocol is formulat...
Open Access Library J. Vol.9, 2022

Dec 30, 2021Open    AccessArticle

Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network

Patrick Dany Bavoua Kenfack, Fabrice Kwefeu Mbakop, Edward Eyong-Ebai
The sustainability of a company depends on the permanent availability of its information system. This reality influences the behavior of companies, which are becoming increasingly mature in their investments in information system security, which is an absolutely vital element. The use of a service called “SYSLOG” to centralize the network event logs that are sent by printers, servers, routers, firewalls, IDS and IPS in an SYSLOG server is a perfect example for network optimization. In this work,...
Open Access Library J. Vol.8, 2021

Nov 15, 2021Open    AccessArticle

GAP Universal One-Step Authentication Protocol

Xianghao Nan
IoT authentication involves not only people, but also things, requiring a universal authentication method. The core authentication technology is the subject authenticity proof, but the traditional proof method based on model reasoning or based on third party trust transferring cannot solve. Therefore, a truth authentication logic based on evidence is created. The Truth Logic is realized by digital signature, and proves the entity authenticity by identifier authentication and ontology authenticat...
Open Access Library J. Vol.8, 2021

Sep 26, 2021Open    AccessArticle

Exploration of Core Technologies of Cyber Security

Xianghao Nan
In order to study the role of key technologies in information security, the main tasks and key technologies defined in different development stages were reviewed in this paper, focusing on exploring the main tasks and core technologies of cyber security. The proof logic of PKI certification system and the digital signature standard DSA were analyzed, subsequently the signature elements are clarified and found that CPK public key could satisfy all the elements, so the evidence-based truth logic o...
Open Access Library J. Vol.8, 2021

Jan 29, 2021Open    AccessArticle

An Efficient Identity-Based Forward Secure Signature Scheme from Lattices

Guang Wu, Ruwei Huang
With the use of a large number of mobile devices, the problem of key leakage becomes more and more serious. In view of the excellent characteristics of lattice cipher and forward-secure digital signature scheme, the construction of identity-based forward-secure digital signature based on lattice technology has become a research hotspot. However, the identity-based forward secure digital signature scheme on the existing grid has the disadvantage of excessive signature length. This paper uses the ...
Open Access Library J. Vol.8, 2021

Sep 01, 2020Open    AccessArticle

A Smart Robot Training Data Acquisition and Learning Process Recording System Based on Blockchain

Kun Wang, Chen Yang, Tao Wang
The Internet of Things and artificial intelligence have developed rapidly in recent decades, and intelligent robots have been used in various fields of production and life. There are many requirements for the functions, performance and intelligence of smart robots. Many researchers are committed to how intelligent robots can learn more efficiently and develop new functions. How to obtain the learning data while protecting the privacy of users and how to record the learning process are two major ...
Open Access Library J. Vol.7, 2020

Jul 30, 2020Open    AccessArticle

An Enhanced Web Base Certificate Verification System

Izuchukwu Chijioke Emele, Stanley Ikechukwu Oguoma, Kanayo Kizito Uka, Emeka Christian Nwaoha
The objective of this work is to design and implement an enhanced wed-based certificate verification system that will assist schools and co-operate organizations to confirm the originality of students’ certificate by displaying certificate details, and format with owner’s image. This work was motivated by the level of certificate forgery, time wastage and the stress encountered while processing this manually. The system adopted the object oriented and design methodology (OOADM) while the program...
Open Access Library J. Vol.7, 2020

Apr 12, 2018Open    AccessArticle

Analysis and Reflection on the Utilization of Foreign Academic E-Book—An Empirical Study Based on 367 Users of a University

Jiayin Liu, Chen Chen
Based on the form of questionnaire, this paper explores the use of foreign academic e-books by teachers and students in a certain school from a subjective view. 367 Users’ behavior, habits and needs were analyzed. Based on the results of the analysis, four suggestions are put forward to improve the overall utilization: Promote the localization of interface, pay attention to users’ advice while
Open Access Library J. Vol.5, 2018

Mar 19, 2018Open    AccessArticle

Securisation of an IPv6 Address Obtaining with SLAAC in Home Networks

S. Y. Massamba, S. A. R. R. Cheikh
In this article, we present a new method based on the securisation of an IPv6 (Internet Protocol version 6) address obtaining with the SLAAC (Stateless Address Autoconfiguration) method in the domestic network. The particularity of our domestic network is the presence of several Multihoming Internet service providers. The peripherals of the Home Network domain, especially routers are in charge of the re
Open Access Library J. Vol.5, 2018

Oct 11, 2016Open    AccessArticle

Tightly-Secure Authenticated Key Exchange without NAXOS’ Approach Based on Decision Linear Problem

Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang
Design Secure Authenticated Key Exchange (AKE) protocol without NAXOS approach is remaining as an open problem. NAXOS approach [4] is used to hide the ephemeral secret key from an adversary even if the adversary in somehow may obtain the ephemeral secret key. Using NAXOS approach will cause two main drawbacks: (i) leaking of the static secret key which will be utilized in computing the exponent of the ephemeral public key; (ii) ma
Open Access Library J. Vol.3, 2016


Contact Us