scholarly journals The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration

Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 10
Author(s):  
Niluka Amarasinghe ◽  
Xavier Boyen ◽  
Matthew McKague

The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised by these schemes. Bitcoin, despite being considered as the most widespread among all, is claimed to have significant lapses in relation to its anonymity. Unfortunately, studies have shown that many cryptocurrency transactions can be traced back to their corresponding participants through the analysis of publicly available data, to which the cryptographic community has responded by proposing new constructions with improved anonymity claims. Nevertheless, the absence of a common metric for evaluating the level of anonymity achieved by these schemes has led to numerous disparate ad hoc anonymity definitions, making comparisons difficult. The multitude of these notions also hints at the surprising complexity of the overall anonymity landscape. In this study, we introduce such a common framework to evaluate the nature and extent of anonymity in (crypto) currencies and distributed transaction systems, thereby enabling one to make meaningful comparisons irrespective of their implementation. Accordingly, our work lays the foundation for formalizing security models and terminology across a wide range of anonymity notions referenced in the literature, while showing how “anonymity” itself is a surprisingly nuanced concept, as opposed to existing claims that are drawn upon at a higher level, thus missing out on the elemental factors underpinning anonymity.

1970 ◽  
Vol 24 (3) ◽  
pp. 479-502 ◽  
Author(s):  
R. L. Friedheim ◽  
J. B. Kadane

International arrangements for the uses of the ocean have been the subject of long debate within the United Nations since a speech made by Ambassador Arvid Pardo of Malta before the General Assembly in 1967. Issues in question include the method of delimiting the outer edge of the legal continental shelf; the spectrum of ocean arms control possibilities; proposals to create a declaration of principles governing the exploration for, and the exploitation of, seabed mineral resources with the promise that exploitation take place only if it “benefits mankind as a whole,” especially the developing states; and consideration of schemes to create international machinery to regulate, license, or own the resources of the seabed and subsoil. The discussions and debates began in the First (Political and Security) Committee of the 22nd General Assembly and proceeded through an ad hoc committee to the 23rd and 24th assembly plenary sessions. The creation of a permanent committee on the seabed as a part of the General Assembly's machinery attests to the importance members of the United Nations attribute to ocean problems. Having established the committee, they will be faced soon with the necessity of reaching decisions. The 24th General Assembly, for example, passed a resolution requesting the Secretary-General to ascertain members' attitudes on the convening of a new international conference to deal with a wide range of law of the sea problems.


Author(s):  
Dr. B. Balakumar

Abstract: Recent advances in software, hardware communication technologies are enabling the design and implementation of whole range of different type of network that are various environments. Vehicular Ad-Hoc network is received a lot of interest in the couple years in the one of the networks. A Vehicular Ad-Hoc Network or VANET is a technology that uses moving cars as nodes in a network to create a mobile network. In VANET improving the driving comfort and safety information message are broadcasted regularly. VANET turns every participating car approximately 100 to 300 meters to connect and turn create network with a wide range. In enable vehicle to communicate which other with roadside units (RSUs). Vehicular network are special types of VANET that supported infrastructure based real time traffic management, including internet access, video streaming and content distribution. Privacy - preserving data Acquisition and forwarding scheme by introducing the novel cryptographic algorithm for key generation and powerful encryption. This paper introduces system that takes Advantages of the RSUs that are the connected to the internet provide various types of information to VANET users. Keywords: VANET, RSU, Ad-Hoc Network, URE, ITS


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Inam Ullah Khan ◽  
Muhammad Abul Hassan ◽  
Mohammad Dahman Alshehri ◽  
Mohammed Abdulaziz Ikram ◽  
Hasan J. Alyamani ◽  
...  

In recent decades, the Internet of flying networks has made significant progress. Several aerial vehicles communicate with one another to form flying ad hoc networks. Unmanned aerial vehicles perform a wide range of tasks that make life easier for humans. However, due to the high frequency of mobile flying vehicles, network problems such as packet loss, latency, and perhaps disrupted channel links arise, affecting data delivery. The use of UAV-enabled IoT in sports has changed the dynamics of tracking and working on player safety. WBAN can be merged with aerial vehicles to collect data regarding health and transfer it to a base station. Furthermore, the unbalanced energy usage of flying things will result in earlier mission failure and a rapid decline in network lifespan. This study describes the use of each UAV’s residual energy level to ensure a high level of safety using an ant-based routing technique called AntHocNet. In health care, the use of IoT-assisted aerial vehicles would increase operational performance, surveillance, and automation optimization to provide a smart application of flying IoT. Apart from that, aerial vehicles can be used in remote communication for treatment, medical equipment distribution, and telementoring. While comparing routing algorithms, simulation findings indicate that the proposed ant-based routing protocol is optimal.


2018 ◽  
Vol 30 (4) ◽  
pp. 356-370 ◽  
Author(s):  
José Álvarez-García ◽  
Amador Durán-Sánchez ◽  
María de la Cruz del Río-Rama

Purpose Since Masaaki Imai coined the term Kaizen in the mid-1980s, it has been seen as a key element for the competitiveness of Japanese companies, and it is currently a widely discussed philosophy and is applied in a wide range of organizations throughout the world. The purpose of this paper is to serve as guidance for researchers who are developing their studies in the field of the Kaizen philosophy, in order to improve their knowledge on the most relevant articles, the most productive authors or the key scientific journals that make up this subject. Design/methodology/approach In order to fulfill the proposed objective, a descriptive bibliometric study was carried out with the analysis of citations from 138 articles included in the multidisciplinary database Scopus (Elsevier) until 2016. For the search of documents, a tracking strategy was chosen that allowed for the development of the ad hoc database required to analyze each of the basic variables of the bibliometric indicators. Findings The results obtained show a growing interest of the scientific community in its study in the last decade, as shown by the significant increase in citations received by articles, despite the reduction in the number of papers published in the last two years. Research limitations/implications The main limitations are derived from the choice of a specific database, as well as the specific search equation. Originality/value The study presents an in-depth analysis of the current state of research regarding the Kaizen philosophy through its bibliometric study, providing useful information for academics and professionals by providing a series of significant indicators to measure the bibliographic material.


2017 ◽  
Vol 2 (2) ◽  
pp. 187-200
Author(s):  
Didik Supriyoko ◽  
Ujang Bahar ◽  
Mul Yadi

The method used in this research is a normative juridical research with comparative law. This study will be a descriptive analysis will provide an overview of the Implementation Program of Bogor City Police Officer Bhabinkamtibmas by virtue Kapolri No.Pol: B / 3022 / XII / 2009Sdeops Date December 14, 2009 on the Handling of Cases Through the Alternative Dispute Resolution (ADR). The program is named after the latest Police Officer Bhabinkamtibmas. The program is a pilot project. This program will be applied in the future to another police station to an extent Polsek.Dengan the Bhabinkamtibmas officers who have members from a wide range of functions is expected to prevent the disruption of security and public order as well as to resolve conflicts early horizontal. The role and function Bhabinkamtibmas members in each region will be further optimized. Bhabinkamtibmas officer team will be down directly in the community to help solve the problems of citizens. Thus, each issue should not be resolved through legal channels, but through mediation and approach officials with the public. The formation of a team of officers Bhayangkara Trustees Public Order and Safety in the City Police Bogor, West Java, a pilot project, particularly for the police station in West Java. The team of eight people who have received training and certification from the National Mediation Centre. The team is a kind of ad hoc team, which is responsible to the Chief of Police and Officer Team members Bhabinkamtibmas of some police functions, not only the function of public guidance. The conclusion from this study is the Program Implementation in Bogor Police Officer Bhabinkamtibmas City and yet not maximum impact on increasing public perception of the police. In terms of implementation, it appears less optimal competence of officers in the police station and police station level. Instructive culture within the police adopted a policy of military norms Officer Program Bhabinkamtibmas seen by officers in the field more as a mere 'implementation of new tasks' rather than the 'improvement of quality of service'.


Author(s):  
Leonardo Lezcano

This chapter presents an approach to translate definitions expressed in openEHR Archetype Definition Language (ADL) to a formal representation using ontology languages. The approach is implemented in the ArchOnt framework, which is also described. The integration of those formal representations with clinical rules is then studied, providing an approach to reuse reasoning on concrete instances of clinical data. Sharing the knowledge expressed in the form of rules is coherent with the philosophy of open sharing underlying clinical archetypes, and it also extends reuse to propositions of declarative knowledge as those encoded for example in clinical guidelines. Thus, this chapter describes the techniques to map archetypes to formal ontologies and how rules can be attached to the resulting representation. In addition, the translation allows specifying logical bindings to equivalent clinical concepts from other knowledge sources. Such bindings encourage reuse as well as ontology reasoning and navigability across different ontologies. Another significant contribution of the chapter is the application of the presented approach as part of two research projects in collaboration with teaching hospitals in Madrid. Examples taken from those cases, such as the development of alerting systems aimed at improving patient safety, are explained. Besides the direct applications described, the automatic translation of archetypes to an ontology language fosters a wide range of semantic and reasoning activities to be designed and implemented on top of a common representation instead of taking an ad-hoc approach.


Author(s):  
Hussein Al-Bahadili ◽  
Alia Sabri

In mobile ad hoc networks (MANETs), broadcasting is widely used in route discovery and other network services. The most widely used broadcasting algorithm is simple flooding, which aggravates a high number of redundant packet retransmissions, causing contention and collisions. Proper use of dynamic probabilistic algorithm significantly reduces the number of retransmissions, which reduces the chance of contention and collisions. In current dynamic probabilistic algorithm, the retransmission probability (pt) is formulated as a linear/non-linear function of a single variable, the number of first-hop neighbors (k). However, such algorithm is suffers in the presence of noise due to increasing packet-loss. In this paper, the authors propose a new dynamic probabilistic algorithm in which ptis determined locally by the retransmitting nodes considering both k and the noise-level. This algorithm is referred to as the dynamic noise-dependent probabilistic (DNDP) algorithm. The performance of the DNDP algorithm is evaluated through simulations using the MANET simulator (MANSim). The simulation results show that the DNDP algorithm presents higher network reachability than the dynamic probabilistic algorithm at a reasonable increase in the number of retransmissions for a wide range of noise-level. The effects of nodes densities and nodes speeds on the performance of the DNDP algorithm are also investigated.


Author(s):  
Abdelaziz Amara Korba ◽  
Mohamed Amine Ferrag

This chapter proposes a new cluster-based secure routing scheme to detect and prevent intrusions in ad hoc networks. The proposed scheme combines both specification and anomaly detection techniques to provide an accurate detection of wide range of routing attacks. The proposed secure scheme provides an adaptive response mechanism to isolate malicious nodes from the network. A key advantage of the proposed secure scheme is its capacity to prevent wormhole and rushing attacks and its real-time detection of both known and unknown attacks which violate specification. The simulation results show that the proposed scheme shows high detection rate and low false positive rate compared to other security mechanisms.


Author(s):  
Tim Goodchild ◽  
Sam Chenery-Morris

This chapter will explore the introduction and development of podcasts at University Campus Suffolk (UCS). The podcasts discussed in this chapter have all been developed in relation to pre-registration health and social care courses within the Faculty of Health at UCS. UCS is a relatively new university, and has a wide range of professional courses including nursing, midwifery, radiography, operating department practice and social work. The chapter will begin with a discussion of where podcasts sit in the paradigm of mobile learning and then a brief history of podcasting. The introduction of podcasts at UCS has been ad-hoc and mostly in response to ideas for developing the wider student learning experience. This ad-hoc approach has led to the development of a model for their educational use. Three case studies will be outlined, followed by presentation of the model. These case studies will show how podcasts came to be utilised, and the progression of our thoughts and experiences which have informed their current and future development at UCS. Small scale evaluations throughout the developmental period, and informal student feedback have helped inform the progression of podcasting at UCS. These evaluations have driven the increased use of podcasts at UCS, with students enjoying the experience of using podcasts, and also the ability to digest the podcasts at a time of their choosing. However, it should be noted that because of the nature of the developmental process, full scale evaluative research is only now being undertaken.


Author(s):  
Shalin Hai-Jew

People often refer to the World Wide Web (WWW) and the Internet to conduct ad hoc and informal problem-solving. Their success in their endeavors has depended on a wide range of information access and crowd-sourcing; deeper analysis of problems; and growing self-efficacy through acclimating into certain problem-solving groups (with attendant new identities) and the “takeaway” learning by abstracting the problem-solving process. This chapter suggests that a greater awareness of site and online resource designers about the steps of problem-solving may enhance the building of self-discovery learning affordances for every phase of the informal problem-solving process.


Sign in / Sign up

Export Citation Format

Share Document