scholarly journals An improvement of both security and reliability for AES implementations

Author(s):  
Mouna Bedoui ◽  
Hassen Mestiri ◽  
Belgacem Bouallegue ◽  
Belgacem Hamdi ◽  
Mohsen Machhout
2012 ◽  
Vol 132 (4) ◽  
pp. 200-203
Author(s):  
Masayuki NAGAO ◽  
Muneaki KURIMOTO ◽  
Risyun KIN ◽  
Tomohiro KAWASHIMA ◽  
Yoshinobu MURAKAMI

2021 ◽  
Author(s):  
Aymeric Amelot ◽  
Angelo Nataloni ◽  
Patrick François ◽  
Ann-Rose Cook ◽  
Jean-Paul Lejeune ◽  
...  

2021 ◽  
Vol 8 (4) ◽  
pp. 848-865
Author(s):  
Qing-Hua Zhu ◽  
Huan Tang ◽  
Jia-Jie Huang ◽  
Yan Hou

2021 ◽  
Vol 21 (3) ◽  
pp. 1-33
Author(s):  
Qianmu Li ◽  
Shunmei Meng ◽  
Xiaonan Sang ◽  
Hanrui Zhang ◽  
Shoujin Wang ◽  
...  

Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing . At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneous, and redundant. As an important part of the CMD, the dynamic scheduling algorithm realizes the dynamic change of the service centralized executor, which can enusre the security and reliability of CMD of volunteer computing . Aiming at the problems of passive scheduling and large scheduling granularity existing in the existing scheduling algorithms, this article first proposes a scheduling algorithm based on time threshold and task threshold and realizes the dynamic randomness of mimic defense from two different dimensions; finally, combining time threshold and random threshold, a dynamic scheduling algorithm based on multi-level queue is proposed. The experiment shows that the dynamic scheduling algorithm based on multi-level queue can take both security and reliability into account, has better dynamic heterogeneous redundancy characteristics, and can effectively prevent the transformation rule of heterogeneous executors from being mastered by attackers.


Author(s):  
Wei Hu ◽  
Lingjuan Wu ◽  
Yu Tai ◽  
Jing Tan ◽  
Jiliang Zhang

Author(s):  
Mahmood A. Rashid ◽  
Krishneel Deo ◽  
Divnesh Prasad ◽  
Kunal Singh ◽  
Sarvesh Chand ◽  
...  

Abstract Blockchain is an emerging technology framework for creating and storing transaction in distributed ledgers with a high degree of security and reliability. In this paper, we present a blockchain-based platform to create and store contracts in between students and their higher education sponsors facilitated by intermediary brokers denoted as fundraisers. The sponsorship might be in any form, such as scholarship, donation, or loan. The fund will be arranged and managed by a group of competitive fundraisers who will hold the distributed ledgers and act as the miners in the blockchain network.


Author(s):  
Xingwang Li ◽  
Huang Mengyan ◽  
Yuanwei Liu ◽  
Varun G Menon ◽  
Anand Paul ◽  
...  

2021 ◽  
Vol 13 (7) ◽  
pp. 3710
Author(s):  
Nijolė Batarlienė ◽  
Maksimas Meleniakas

A claim can be understood as a negative result of the performance of a contract, as it is necessary to fulfill the obligation and/or indemnify (freight damage claim, for example). Today’s claims management faces a variety of problems, such as inefficient claims postings, possible data forgery, and a very lengthy claims resolution process. All these problems can be solved by using a synthesis of innovative tools, e.g., a blockchain system, game theory, and statistical methods. Theoretical possibilities and practical examples regarding solving claims management problems were identified by analyzing various scientific sources. However, it remained unclear whether these methods could interact with each other, complicate the existing claims settlement process or not, or whether a synthesis of such measures would be viable. Therefore, a qualitative study was conducted and answers to the above questions were found. The research revealed that 75% of international Lithuanian logistics companies can apply the synthesis of these methods in claims management and solutions. Using the concordance coefficient formula, the value of W was calculated. This coefficient indicated that the opinions of the experts who participated in the study were somewhat similar. The value of the actual χ2 distribution was also calculated. The result obtained shows that the experts’ opinions were somewhat harmonized and that their compatibility was not accidental. The use of blockchain system synthesis in combination with game theory and statistical methods could help international logistics companies to reduce their costs, speed up the management process, and increase data security and reliability while ensuring structured one-stop claims management.


2021 ◽  
Vol 46 (2) ◽  
pp. 11-15
Author(s):  
Peter G. Neumann

Mini-editorial (PGN) 2020 was a crazy year, with all kinds of risks on display. As usual, many of the lessons noted in past issues of SEN and RISKS have been largely ignored, and failures continue to mirror events from the past that have long been discussed here. Issues such as safety, security, and reliability always seem to need more foresight than they receive. Y2K con- tinues to hit somewhere each New Year's Day, when short- term remediations that demanded periodic upgrading have been forgotten. (I suppose old COBOL code will still ex- ist in year 2100, when there may be ambiguities relating to dates that could be 21xx or 20xx (although 19xx is unlikely), and the narrow windowing xes will fail even more dramati- cally.) Election integrity continues to be a real concern, where we are caught in the crosshairs between computer systems and networks that are not meaningfully trustworthy or au- ditable, and the nontechnological risks are still pervasive from unbalanced redistricting, creative dysinformation, poli- tics, Citzens United, and foreign interference. We need non- partisan scrutiny and defense against would-be subverters to overcome potential attacks and inadvertent mistakes. In pres- ence of potential risks in every part of the process, a strong sense of risk-awareness is required by voters, election officials, and the media (both proactively and remedially, as needed).


Sign in / Sign up

Export Citation Format

Share Document