789 resultados para electronic commerce security
Resumo:
A secure protocol for electronic, sealed-bid, single item auctions is presented. The protocol caters to both first and second price (Vickrey) auctions and provides full price flexibility. Both computational and communication cost are linear with the number of bidders and utilize only standard cryptographic primitives. The protocol strictly divides knowledge of the bidder's identity and their actual bids between, respectively, a registration authority and an auctioneer, who are assumed not to collude but may be separately corrupt. This assures strong bidder-anonymity, though only weak bid privacy. The protocol is structured in two phases, each involving only off-line communication. Registration, requiring the use of the public key infrastructure, is simultaneous with hash-sealed bid-commitment and generates a receipt to the bidder containing a pseudonym. This phase is followed by encrypted bid-submission. Both phases involve the registration authority acting as a communication conduit but the actual message size is quite small. It is argued that this structure guarantees non-repudiation by both the winner and the auctioneer. Second price correctness is enforced either by observing the absence of registration of the claimed second-price bid or, where registered but lower than the actual second price, is subject to cooperation by the second price bidder - presumably motivated through self-interest. The use of the registration authority in other contexts is also considered with a view to developing an architecture for efficient secure multiparty transactions
Resumo:
To harness safe operation of Web-based systems in Web environments, we propose an SSPA (Server-based SHA-1 Page-digest Algorithm) to verify the integrity of Web contents before the server issues an HTTP response to a user request. In addition to standard security measures, our Java implementation of the SSPA, which is called the Dynamic Security Surveillance Agent (DSSA), provides further security in terms of content integrity to Web-based systems. Its function is to prevent the display of Web contents that have been altered through the malicious acts of attackers and intruders on client machines. This is to protect the reputation of organisations from cyber-attacks and to ensure the safe operation of Web systems by dynamically monitoring the integrity of a Web site's content on demand. We discuss our findings in terms of the applicability and practicality of the proposed system. We also discuss its time metrics, specifically in relation to its computational overhead at the Web server, as well as the overall latency from the clients' point of view, using different Internet access methods. The SSPA, our DSSA implementation, some experimental results and related work are all discussed
Resumo:
The highly unusual structural and electronic properties of the α-phase of (Si1-xCx)3N4 are determined by density functional theory (DFT) calculations using the Generalized Gradient Approximation (GGA). The electronic properties of α-(Si 1-xCx)3N4 are found to be very close to those of α-C3N4. The bandgap of α-(Si 1-xCx)3N4 significantly decreases as C atoms are substituted by Si atoms (in most cases, smaller than that of either α-Si3N4 or α-C3N4) and attains a minimum when the ratio of C to Si is close to 2. On the other hand, the bulk modulus of α-(Si1-xCx)3N 4 is found to be closer to that of α-Si3N 4 than of α-C3N4. Plasma-assisted synthesis experiments of CNx and SiCN films are performed to verify the accuracy of the DFT calculations. TEM measurements confirm the calculated lattice constants, and FT-IR/XPS analysis confirms the formation and lengths of C-N and Si-N bonds. The results of DFT calculations are also in a remarkable agreement with the experiments of other authors.
Resumo:
The electronic transport in both intrinsic and acid-treated single-walled carbon nanotube networks containing more than 90% semiconducting nanotubes is investigated using temperature-dependent resistance measurements. The semiconducting behavior observed in the intrinsic network is attributed to the three-dimensional electron hopping mechanism. In contrast, the chemical doping mechanism in the acid-treated network is found to be responsible for the revealed metal-like linear resistivity dependence in a broad temperature range. This effective method to control the electrical conductivity of single-walled carbon nanotube networks is promising for future nanoscale electronics, thermometry, and bolometry. © 2010 American Institute of Physics.
Resumo:
Structural stability, electronic, and optical properties of InN under high pressure are studied using the first-principles calculations. The lattice constants and electronic band structure are found consistent with the available experimental and theoretical values. The pressure of the wurtzite-to-rocksalt structural transition is 13.4 GPa, which is in an excellent agreement with the most recent experimental values. The optical characteristics reproduce the experimental data thus justifying the feasibility of our theoretical predictions of the optical properties of InN at high pressures.
Resumo:
This paper reports on ab initio numerical simulations of the effect of Co and Cu dopings on the electronic structure and optical properties of ZnO, pursued to develop diluted magnetic semiconductors vitally needed for spintronic applications. The simulations are based upon the Perdew-Burke-Enzerh generalized gradient approximation on the density functional theory. It is revealed that the electrons with energies close to the Fermi level effectively transfer only between Cu and Co ions which substitute Zn atoms, and are located in the neighbor sites connected by an O ion. The simulation results are consistent with the experimental observations that addition of Cu helps achieve stable ferromagnetism of Co-doped ZnO. It is shown that simultaneous insertion of Co and Cu atoms leads to smaller energy band gap, redshift of the optical absorption edge, as well as significant changes in the reflectivity, dielectric function, refractive index, and electron energy loss function of ZnO as compared to the doping with either Co or Cu atoms. These highly unusual optical properties are explained in terms of the computed electronic structure and are promising for the development of the next-generation room-temperature ferromagnetic semiconductors for future spintronic devices on the existing semiconductor micromanufacturing platform.
Resumo:
This paper describes research investigating expertise and the types of knowledge used by airport security screeners. It applies a multi method approach incorporating eye tracking, concurrent verbal protocol and interviews. Results show that novice and expert security screeners primarily access perceptual knowledge and experience little difficulty during routine situations. During non-routine situations however, experience was found to be a determining factor for effective interactions and problem solving. Experts were found to use strategic knowledge and demonstrated structured use of interface functions integrated into efficient problem solving sequences. Comparatively, novices experienced more knowledge limitations and uncertainty resulting in interaction breakdowns. These breakdowns were characterised by trial and error interaction sequences. This research suggests that the quality of knowledge security screeners have access to has implications on visual and physical interface interactions and their integration into problem solving sequences. Implications and recommendations for the design of interfaces used in the airport security screening context are discussed. The motivations of recommendations are to improve the integration of interactions into problem solving sequences, encourage development of problem scheme knowledge and to support the skills and knowledge of the personnel that interact with security screening systems.
Resumo:
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensively studied in the literature over the last 25 years. These generators have the attractive feature of provable pseudorandomness security assuming the hardness of the RSA inversion problem. However, despite extensive study, the most efficient provably secure RSA-based generators output asymptotically only at most O(logn) bits per multiply modulo an RSA modulus of bitlength n, and hence are too slow to be used in many practical applications. To bring theory closer to practice, we present a simple modification to the proof of security by Fischlin and Schnorr of an RSA-based PRG, which shows that one can obtain an RSA-based PRG which outputs Ω(n) bits per multiply and has provable pseudorandomness security assuming the hardness of a well-studied variant of the RSA inversion problem, where a constant fraction of the plaintext bits are given. Our result gives a positive answer to an open question posed by Gennaro (J. of Cryptology, 2005) regarding finding a PRG beating the rate O(logn) bits per multiply at the cost of a reasonable assumption on RSA inversion.
Resumo:
An increasing range of services are now offered via online applications and e-commerce websites. However, problems with online services still occur at times, even for the best service providers due to the technical failures, informational failures, or lack of required website functionalities. Also, the widespread and increasing implementation of web services means that service failures are both more likely to occur, and more likely to have serious consequences. In this paper we first develop a digital service value chain framework based on existing service delivery models adapted for digital services. We then review current literature on service failure prevention, and provide a typology of technolo- gies and approaches that can be used to prevent failures of different types (functional, informational, system), that can occur at different stages in the web service delivery. This makes a contribution to theory by relating specific technologies and technological approaches to the point in the value chain framework where they will have the maximum impact. Our typology can also be used to guide the planning, justification and design of robust, reliable web services.
Resumo:
Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.
Resumo:
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.
Resumo:
Recent controversy on the quantum dots dephasing mechanisms (between pure and inelastic) is re-examined by isolating the quantum dots from their substrate by using the appropriate limits of the ionization energy theory and the quantum adiabatic theorem. When the phonons in the quantum dots are isolated adiabatically from the phonons in the substrate, the elastic or pure dephasing becomes the dominant mechanism. On the other hand, for the case where the phonons from the substrate are non-adiabatically coupled to the quantum dots, the inelastic dephasing process takes over. This switch-over is due to different elemental composition in quantum dots as compared to its substrate. We also provide unambiguous analysis as to understand why GaAs/AlGaAs quantum dots may only have pure dephasing while InAs/GaAs quantum dots give rise to the inelastic dephasing as the dominant mechanism. It is shown that the elemental composition plays an important role (of both quantum dots and substrate) in evaluating the dephasing mechanisms of quantum dots.
Resumo:
Dealing with digital medical images is raising many new security problems with legal and ethical complexities for local archiving and distant medical services. These include image retention and fraud, distrust and invasion of privacy. This project was a significant step forward in developing a complete framework for systematically designing, analyzing, and applying digital watermarking, with a particular focus on medical image security. A formal generic watermarking model, three new attack models, and an efficient watermarking technique for medical images were developed. These outcomes contribute to standardizing future research in formal modeling and complete security and computational analysis of watermarking schemes.
Resumo:
This thesis has developed a new approach to trace virtual protection signals in Electrical substation networks. The main goal of the research was to analyse the contents of the virtual signals transferred, using third party software. In doing so, a comprehensive test was done on a distance protection relay, using non-conventional test equipment.
Resumo:
While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.