digital certificates
Recently Published Documents


TOTAL DOCUMENTS

119
(FIVE YEARS 35)

H-INDEX

7
(FIVE YEARS 2)

Significance Despite this, there are no common standards for validating vaccination and COVID test results. This is hampering national-level disease containment efforts and also regional and international travel. Impacts Lack of state capacity to produce reliable health records is a major constraint for developing countries. The black market in fraudulent vaccination and test results will proliferate. Political divisions over vaccine mandates will intensify if digital certificates become mandatory in a wider variety of contexts.


2021 ◽  
Vol 1 (1) ◽  
pp. 17-28
Author(s):  
Nurul Huda ◽  
Harimukti Wandebori

In an effort to realize good and equitable services to all communities, the Ministry of ATR/BPN seeks to become a transparent and accountable institution or known as Good Governance. As an effort to realize this, digital land certification services are one of the steps towards good governance. This study aims to find out the problems faced in realizing digital certificates. The research method was carried out qualitatively, data was presented descriptively, while data collection was carried out through interviews with several respondents, namely the community and employees in the Kerawang Regency Land Office. The results of the study show that several obstacles in digital certificates are caused by internal factors including those related to human resources who are not entirely able to use technology/information, limited office infrastructure, data that has not been integrated and the need for definite checks related to documents in land certificates. While some external factors are related to the community and other agencies, namely not all people have the ability to use information technology, not all people have digital equipment, besides the problem with other agencies, namely the unavailability or integration of data in one system. Some of these problems have caused the digital land certification process to take a long time and do not meet the expected standards.


2021 ◽  
Vol 7 (1) ◽  
pp. 35
Author(s):  
Mauro Alberto de los Santos Nodar ◽  
Tiago Manuel Fernández Caramés

Due to the recent outbreak of the COVID-19 pandemic, everybody’s lives have changed dramatically and society went through new stages accompanied by new needs. This article details a solution for one of these needs, since it provides a system of digital certificates for the secure storage and sharing of medical data related to COVID-19, with the goal of demonstrating immunity or lack of viral infection in a unequivocal, unbreakable and secure way. The proposed system is based on Blockchain and its inherent benefits, developing also a decentralized, mobile and multiplatform app for its use and an incentive system with a customized cryptocurrency in order to reward the users who use it.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5898
Author(s):  
Patrícia R. Sousa ◽  
Luís Magalhães ◽  
João S. Resende ◽  
Rolando Martins ◽  
Luís Antunes

The increasing pervasiveness of the Internet of Things is resulting in a steady increase of cyberattacks in all of its facets. One of the most predominant attack vectors is related to its identity management, as it grants the ability to impersonate and circumvent current trust mechanisms. Given that identity is paramount to every security mechanism, such as authentication and access control, any vulnerable identity management mechanism undermines any attempt to build secure systems. While digital certificates are one of the most prevalent ways to establish identity and perform authentication, their provision at scale remains open. This provisioning process is usually an arduous task that encompasses device configuration, including identity and key provisioning. Human configuration errors are often the source of many security and privacy issues, so this task should be semi-autonomous to minimize erroneous configurations during this process. In this paper, we propose an identity management (IdM) and authentication method called YubiAuthIoT. The overall provisioning has an average runtime of 1137.8 ms ±65.11+δ. We integrate this method with the FIWARE platform, as a way to provision and authenticate IoT devices.


Energies ◽  
2021 ◽  
Vol 14 (17) ◽  
pp. 5364
Author(s):  
Mohamed Elhoseny ◽  
Khalid Haseeb ◽  
Asghar Ali Shah ◽  
Irshad Ahmad ◽  
Zahoor Jan ◽  
...  

Internet of Things (IoT) performs a vital role in providing connectivity between computing devices, processes, and things. It significantly increases the communication facilities and giving up-to-date information to distributed networks. On the other hand, the techniques of artificial intelligence offer numerous and valuable services in emerging fields. An IoT-based healthcare solution facilitates patients, hospitals, and professionals to observe real-time and critical data. In the literature, most of the solution suffers from data intermission, high ethical standards, and trustworthiness communication. Moreover, network interruption with recurrent expose of sensitive and personal health data decreases the reliance on network systems. Therefore, this paper intends to propose an IoT solution for AI-enabled privacy-preserving with big data transferring using blockchain. Firstly, the proposed algorithm uses a graph-modeling to develop a scalable and reliable system for gathering and transmitting data. In addition, it extracts the subset of nodes using the artificial intelligence approach and achieves efficient services for the healthcare system. Secondly, symmetric-based digital certificates are utilized to offer authentic and confidential transmission with communication resources using blockchain. The proposed algorithm is explored with existing solutions through multiple simulations and proved improvement in terms of realistic parameters.


2021 ◽  
Author(s):  
Manohar Raavi ◽  
Pranav Chandramouli ◽  
Simeon Wuthier ◽  
Xiaobo Zhou ◽  
Sang-Yoon Chang

2021 ◽  
Vol 12 (2) ◽  
pp. 332-342
Author(s):  
Janet Hui XUE

This article further develops the concept of algorithmic vulnerability. The analysis is built on empirical evidence of the Chinese Health Code System (HCS), compared to similar plans for the “COVID-19 Certificate” in the European Union (EU). Implementing the HCS has shown two-sided regulatory implications: improving social protection (a national strategy, a common mutual-recognition standard, scaled-up public–private cooperation) and increasing risks of social exclusion (non-digital and digital forms of vulnerability). This article argues that algorithmic vulnerability is caused by mismatches between biased databases, unfairly pre-designed algorithms and dynamically changed risk groups in reality in the context of COVID-19 vaccination. It contributes a framework for deploying plans for digital certificates in the EU concerning minimising the social risks associated with algorithmic vulnerability. The framework consists of (1) reinforcing existing vulnerability inherited from non-digital society (eg caused by intersectional factors of race/ethnicity, gender, age and health) and (2) introducing new forms of vulnerability generated by algorithm design and implementation (eg excluding the risk groups of individuals who are un/mis/overrepresented in the databases, such as those defined by nationality plus COVID-19 status).


2021 ◽  
Author(s):  
Khalid Abdel Hafeez

File sharing is one of the most popular applications in peer-to-peer networks where there is no control over what the peer can download or upload. This explains why file sharing got a high percentage of the overall internet traffic. Although file sharing is a legal technology, many users use it to share copyrighted materials and that's why many applications have been sued and shut down. In this thesis we will build a secure and legal file sharing system using Java bindings of JXTA protocols. The application security is derived from using digital certificates signed by a server peer who acts like a certificate authority (CA), all communications are encrypted using these digital certificates. The legal side is derived from the fact that each peer has a tokens account that will be updated and signed by the server peer only. The downloading peer has to pay some tokens for downloading a file to the uploading peer who then contacts the server peer to credit its commission from that payment. The server peer is the only one who can cash those payments to make the system forgery protected. The interaction between peers and the server peer could be on monthly basis so peers can download and upload files easliy and without the presence of the server. At the end we analyzed the security aspects and show how the implementation deals with most known peer-to-peer threats.


2021 ◽  
Author(s):  
Khalid Abdel Hafeez

File sharing is one of the most popular applications in peer-to-peer networks where there is no control over what the peer can download or upload. This explains why file sharing got a high percentage of the overall internet traffic. Although file sharing is a legal technology, many users use it to share copyrighted materials and that's why many applications have been sued and shut down. In this thesis we will build a secure and legal file sharing system using Java bindings of JXTA protocols. The application security is derived from using digital certificates signed by a server peer who acts like a certificate authority (CA), all communications are encrypted using these digital certificates. The legal side is derived from the fact that each peer has a tokens account that will be updated and signed by the server peer only. The downloading peer has to pay some tokens for downloading a file to the uploading peer who then contacts the server peer to credit its commission from that payment. The server peer is the only one who can cash those payments to make the system forgery protected. The interaction between peers and the server peer could be on monthly basis so peers can download and upload files easliy and without the presence of the server. At the end we analyzed the security aspects and show how the implementation deals with most known peer-to-peer threats.


Author(s):  
Suleiman I. Sharif ◽  
Rubian S. Sharif

What is the truth about the conspiracy theory of the COVID-19 microchip vaccine? The outbreak of the COVID-19 witnessed a vicious race of pharmaceutical firms to develop a vaccine that ends this disaster. Claims were forwarded that some firms funded by well-known foundations are in the process of developing such a vaccine so people wide world can be tracked. Such claims may have been based on Mr. Bill Gate’s announcement in an interview that through vaccination "we will have some digital certificates" which would be used to show who had recovered, been tested and ultimately who received a vaccine but he made no mention of microchips.  The conspiracy theory is spreading around the world and its supporters are on the increase among the public as well as many healthcare professionals. The spread of the virus has been attributed to the introduction of 5G technology and many religious leaders attributed the crisis to punishment from God to the spread of local wars and mass killing, torturing and killing of Muslims in China and Myanmar gay and lesbian movement and marriages.


Sign in / Sign up

Export Citation Format

Share Document