transfer protocol
Recently Published Documents


TOTAL DOCUMENTS

604
(FIVE YEARS 110)

H-INDEX

28
(FIVE YEARS 4)

2022 ◽  
Vol 2022 ◽  
pp. 1-12
Author(s):  
M. Vijayalakshmi ◽  
S. Mercy Shalinie ◽  
Ming Hour Yang ◽  
Shou-Chuan Lai ◽  
Jia-Ning Luo

Supply chain management (SCM) governance is the streamline of the IoT product life cycle from its production to delivery. Integrating blockchain with supply chain management is essential to ensure end-to-end tracking, trustiness between manufacturers and customers, fraud and counterfeit elimination, and customizing administrative costs and paperwork. This paper proposes an RFID ownership transfer protocol with the help of zk-SNARKs (Zero Knowledge-Succinct Noninteractive Arguments of Knowledge) using Ethereum blockchain. When the owner performs RFID transfer, the transferred information will be recorded on the blockchain using smart contracts. When using a smart contract to transfer ownership on the Ethereum blockchain, because the content on the blockchain will not be tampered with, all accounts in the Ethereum can view the transfer results and verify them. The privacy of the supply chain is attained by generating the proof of product code via zk-SNARKs algorithm. This algorithm also enhances the scalability of the supply chain system by creating a trusted setup in off-chain mode.


2022 ◽  
Vol 269 ◽  
pp. 229-233
Author(s):  
Kalli L. Devecki ◽  
Sergey Kozyr ◽  
Marie Crandall ◽  
Brian K. Yorkgitis
Keyword(s):  

Molecules ◽  
2021 ◽  
Vol 27 (1) ◽  
pp. 33
Author(s):  
Binlin Zhao ◽  
Tianxiang Zhu ◽  
Mengtao Ma ◽  
Zhuangzhi Shi

We report an efficient and practical iron-catalyzed hydrogen atom transfer protocol for assembling acetylenic motifs into functional alkenes. Diversities of internal alkynes could be obtained from readily available alkenes and acetylenic sulfones with excellent Markovnikov selectivity. An iron hydride hydrogen atom transfer catalytic cycle was described to clarify the mechanism of this reaction.


Author(s):  
M. Adnan Nur ◽  
Nurilmiyanti Wardhani

Penelitian ini bertujuan untuk mengembangkan serta menguji akses antara mobile application yang dibangun dengan framework apache cordova dan web server apache melalui hypertext transfer protocol (HTTP) menggunakan Object XHR dari Javascript. Aplikasi yang dibangun menggunakan studi kasus bimbingan tugas akhir pada STMIK Handayani Makassar. Penelitian ini dilaksanakan menggunakan metode research and  development  (R & D) yang terdiri atas beberapa tahapan yaitu tahap analisis meliputi tinjauan terhadap penggunaan framework apache cordova dan web service, tahap perancangan menggunakan unified modelling language, tahap pembuatan aplikasi dan tahap pengujian menggunakan metode blackbox. Hasil penelitian menunjukkan bahwa seluruh fungsi aplikasi dapat mengakses data dari web service. Terdapat perbedaan waktu request data server ketika aplikasi dijalankan pada emulator (google chrome) dan aplikasi yang diinstalasi langsung pada perangkat android dengan sistem operasi MIUI OS dan ColorOS. Request data server dengan emulator lebih cepat dengan perbedaan waktu yang tidak begitu signifikan yaitu rata-rata selisih waktu hanya 41,76 ms untuk MIUI OS dan 46,52 ms  untuk ColorOS.


Minerva ◽  
2021 ◽  
Vol 2 (6) ◽  
pp. 23-31
Author(s):  
Moreno Almanza Olmedo

This paper was designed with the intention of analyzing the vulnerability of e-commerce web sites. We are going to describe the transmission of data in clear text without encryption by hypertext transfer protocol (HTTP), reason why we argue that by means of a sniffer technique this information can be captured and this way violating customer privacy information.


Author(s):  
Н.Д. Маслов ◽  
Е.В. Попова

В статье рассматривается исследование модели соединения Web-приложения и Web-службы напрямую и через прокси. Рассматривается кроссплатформенная высокопроизводительная среда ASP.NET. При разработке используется паттерн MVC. Формирование запросов реализуется с помощью архитектурного стиля REST и протокола передачи гипертекста HTTP. Строится модель взаимодействия Web-приложения и Web-службы. Целью данной работы является исследование данной модели взаимодействия напрямую и через прокси. Были разработаны Web-приложение, являющееся сервисом по аренде видеофильмов и Web-служба, функциональное назначение которой – работа с базой данных Web-сервера. Для реализации прокси сборки было создан отдельный проект. В настройках проекта были прописаны протокол передачи данных, хост API, порт и роутинги перенаправления запросов. Исследование модели проводилось с помощью программного обеспечения Postman и инструментов браузера. Результаты исследования показывают плюсы и минусы использования прокси при взаимодействии Web-приложения и Web-службы. Данная статья поможет заказчикам, разработчикам Web-приложений выбрать модель соединения Web-приложения и Web-службы, соответствующую решаемым задачам. The article considers the study of the connection model of a Web application and a Web service directly and through a proxy. A cross-platform high-performance environment is considered ASP.Net. The MVC pattern is used during development. Request generation is implemented using the REST architectural style and the HTTP hypertext transfer protocol. A model of interaction between a Web application and a Web service is being built. The purpose of this work is to study this model of interaction directly and through a proxy. A Web application was developed, which is a video rental service and a Web service, the functional purpose of which is to work with a Web server database. A separate project was created to implement the build proxy. In the project settings, the data transfer protocol, API host, port and request forwarding routings were registered. A previously developed service was used as an API. The model was studied using Postman software and browser tools. The results of the study show the pros and cons of using a proxy when interacting with a Web application and a Web service. This article will help customers, developers of Web applications to choose a model for connecting a Web application and a Web service that corresponds to the tasks being solved.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Hangchao Ding ◽  
Han Jiang ◽  
Qiuliang Xu

We propose postquantum universal composable (UC) cut-and-choose oblivious transfer (CCOT) protocol under the malicious adversary model. In secure two-party computation, we construct s copies’ garbled circuits, including half check circuit and half evaluation circuit. The sender can transfer the key to the receiver by CCOT protocol. Compared to PVW-OT [6] framework, we invoke WQ-OT [35] framework with reusability of common random string ( crs ) and better security. Relying on LWE’s assumption and the property of the Rounding function, we construct an UC-CCOT protocol, which can resist quantum attack in secure two-party computation.


2021 ◽  
pp. 108495
Author(s):  
Babu Pillai ◽  
Kamanashis Biswas ◽  
Zhé Hóu ◽  
Vallipuram Muthukkumarasamy

Sign in / Sign up

Export Citation Format

Share Document