|
Go
Nov 28, 2023Open Access
Cybersecurity is the study of protecting information and systems. One of the most secure ways of protecting information online is through cloud services when used appropriately. In St. Mary’s university, cloud computing adaption has rapidly grown and evolved over the years. However, the protection and safety of students and staff’s information is still unsteady, which prompted the evaluation and survey of this research. In this paper, a risk analysis is performed on one of the university’s cloud...
Jun 16, 2023Open Access
The rising popularity of mobile payments can be attributed to the widespread use of smartphones and their applications. Despite its potential to simplify our lives, its adoption in African countries has been limited. This paper aims to enhance our understanding of the critical factors that influence the acceptance of mobile payments in Nigeria by exploring the impact of “network externalities” in addition to conventional technology acceptance factors. It posits that performance expectancy, effor...
Oct 25, 2022Open Access
The digital currency Hubee is an equivalent tool for all digital assets to provide a safe and convenient mobility and storage serve. Mobility (payment) or storage (settlement) of digital assets is easy to solve separately, even with traditional technologies, but when to solve both simultaneously, new technologies are needed. Therefore, in this paper, the necessary functions of digital currency are analyzed and discussed. The biggest technical difficulty in the design of digital currency is the a...
Aug 25, 2022Open Access
Recently, the U.S. Federal government and the Department of Defense announced the “Zero Trust” reigniting the debate on the logic of trust. Subject authentication is the core technology of cyber security. The traditional system is based on the reasoning logic of trust. The trust logic is the product of the situation that the authenticity of the subject cannot be proved, and the authenticity of the subject is remedied by a third party’s certificates. However, the authenticity of certificates stil...
Aug 04, 2022Open Access
Objective: Our objective is to evaluate the level of knowledge and competencies in the use of ICT tools and the need for training in medical staff in the faculty of medicine and pharmacy of Fez. Methods: We conducted a cross-sectional survey from May 2021, in the Faculty of Medicine and Pharmacy of Fez in various doctor’s classes: professors, medical residents, interns, and students. The questionnaire was mainly organized into two sections about the level of 1) knowledge and competencies in the ...
Jul 28, 2022Open Access
In this paper, a decentralized electronic voting system that provides inputs and outputs information support to admin/users in order to update their voting information while being capable of exhibiting different properties of blockchain security without the need for a third party. In this research, the Object Oriented Analysis and Design Methodology were adopted. The high level model of the proposed system was also designed and displayed in a format easily understandable to the user.
Mar 10, 2022Open Access
Subject authentication is the core technology of cyber security. There are two existing technologies: one is PKI public key system based on trust logic, another is CPK public key system based on truth logic. In this paper, the different characteristics of trust-based PKI and evidence-based CPK different mechanisms were discussed from Four aspects: decentralized or centralized key generation, trust-based or evidence-based authentication logic, different usages of DSS signature protocol, and funct...
Jan 27, 2022Open Access
The majority of recently demonstrated Deep-Learning Side-Channel Attacks (DLSCAs) use neural networks trained on a segment of traces containing operations only related to the target subkey. However, when the number of training traces is restricted such as in the ASCAD database, deep-learning models always suffer from overfitting since the insufficient training data. One data-level solution is called data augmentation, which is to use the additional synthetically modified traces to act as a regul...
Jan 14, 2022Open Access
This paper introduces the working principle of CPK (Combined Public Key) and the general method of constructing identifier-based public key, which can not only solve the problem of key distribution, but also solve the authentication problem of identifier claimed by the subject. As basic functions, identifier authentication, identifier password, digital signature and key encryption are introduced. Where Identifier authentication is a new concept, and a separate authentication protocol is formulat...
Dec 30, 2021Open Access
The sustainability of a company depends on the permanent availability of its information system. This reality influences the behavior of companies, which are becoming increasingly mature in their investments in information system security, which is an absolutely vital element. The use of a service called “SYSLOG” to centralize the network event logs that are sent by printers, servers, routers, firewalls, IDS and IPS in an SYSLOG server is a perfect example for network optimization. In this work,...
Go
|
|
|