scholarly journals Replicating the Kuperee authentication server for increased security and reliability

Author(s):  
Thomas Hardjono ◽  
Jennifer Seberry
2012 ◽  
Vol 132 (4) ◽  
pp. 200-203
Author(s):  
Masayuki NAGAO ◽  
Muneaki KURIMOTO ◽  
Risyun KIN ◽  
Tomohiro KAWASHIMA ◽  
Yoshinobu MURAKAMI

2021 ◽  
Author(s):  
Aymeric Amelot ◽  
Angelo Nataloni ◽  
Patrick François ◽  
Ann-Rose Cook ◽  
Jean-Paul Lejeune ◽  
...  

2021 ◽  
Vol 8 (4) ◽  
pp. 848-865
Author(s):  
Qing-Hua Zhu ◽  
Huan Tang ◽  
Jia-Jie Huang ◽  
Yan Hou

2021 ◽  
Vol 21 (3) ◽  
pp. 1-33
Author(s):  
Qianmu Li ◽  
Shunmei Meng ◽  
Xiaonan Sang ◽  
Hanrui Zhang ◽  
Shoujin Wang ◽  
...  

Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing . At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing . Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.


2021 ◽  
pp. 1-26
Author(s):  
Yangguang Tian ◽  
Yingjiu Li ◽  
Robert H. Deng ◽  
Binanda Sengupta ◽  
Guomin Yang

In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes provide biometrics reusability (aka. reusable fuzzy signature). We define formal security models for the proposed construction, and we prove that it achieves user authenticity and user privacy. The proposed construction ensures: 1) a user’s biometrics can be securely reused in remote user authentication; 2) a third party having access to the communication channel between a user and the authentication server cannot identify the user.


Author(s):  
Wei Hu ◽  
Lingjuan Wu ◽  
Yu Tai ◽  
Jing Tan ◽  
Jiliang Zhang

Author(s):  
Mahmood A. Rashid ◽  
Krishneel Deo ◽  
Divnesh Prasad ◽  
Kunal Singh ◽  
Sarvesh Chand ◽  
...  

Abstract Blockchain is an emerging technology framework for creating and storing transaction in distributed ledgers with a high degree of security and reliability. In this paper, we present a blockchain-based platform to create and store contracts in between students and their higher education sponsors facilitated by intermediary brokers denoted as fundraisers. The sponsorship might be in any form, such as scholarship, donation, or loan. The fund will be arranged and managed by a group of competitive fundraisers who will hold the distributed ledgers and act as the miners in the blockchain network.


Author(s):  
Xingwang Li ◽  
Huang Mengyan ◽  
Yuanwei Liu ◽  
Varun G Menon ◽  
Anand Paul ◽  
...  

2021 ◽  
Vol 13 (7) ◽  
pp. 3710
Author(s):  
Nijolė Batarlienė ◽  
Maksimas Meleniakas

A claim can be understood as a negative result of the performance of a contract, as it is necessary to fulfill the obligation and/or indemnify (freight damage claim, for example). Today’s claims management faces a variety of problems, such as inefficient claims postings, possible data forgery, and a very lengthy claims resolution process. All these problems can be solved by using a synthesis of innovative tools, e.g., a blockchain system, game theory, and statistical methods. Theoretical possibilities and practical examples regarding solving claims management problems were identified by analyzing various scientific sources. However, it remained unclear whether these methods could interact with each other, complicate the existing claims settlement process or not, or whether a synthesis of such measures would be viable. Therefore, a qualitative study was conducted and answers to the above questions were found. The research revealed that 75% of international Lithuanian logistics companies can apply the synthesis of these methods in claims management and solutions. Using the concordance coefficient formula, the value of W was calculated. This coefficient indicated that the opinions of the experts who participated in the study were somewhat similar. The value of the actual χ2 distribution was also calculated. The result obtained shows that the experts’ opinions were somewhat harmonized and that their compatibility was not accidental. The use of blockchain system synthesis in combination with game theory and statistical methods could help international logistics companies to reduce their costs, speed up the management process, and increase data security and reliability while ensuring structured one-stop claims management.


Sign in / Sign up

Export Citation Format

Share Document