International Journal of Internet Technology and Secured Transactions最新文献

筛选
英文 中文
A secured transaction based on blockchain architecture in mobile banking platform 基于区块链架构的移动银行平台安全交易
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10039177
S. Folorunso, Chinmay Chakraborty, J. B. Awotunde
{"title":"A secured transaction based on blockchain architecture in mobile banking platform","authors":"S. Folorunso, Chinmay Chakraborty, J. B. Awotunde","doi":"10.1504/ijitst.2021.10039177","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10039177","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security threats and countermeasures on the internet of things 物联网的安全威胁与对策
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10039864
Eugene Rhee
{"title":"Security threats and countermeasures on the internet of things","authors":"Eugene Rhee","doi":"10.1504/ijitst.2021.10039864","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10039864","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Providing a model based on Poisson distribution for malware propagation assessment in peer-to-peer networks 提出了一种基于泊松分布的点对点网络恶意软件传播评估模型
International Journal of Internet Technology and Secured Transactions Pub Date : 2021-01-01 DOI: 10.1504/ijitst.2021.10040082
M. Mollamotalebi, S. Haghi
{"title":"Providing a model based on Poisson distribution for malware propagation assessment in peer-to-peer networks","authors":"M. Mollamotalebi, S. Haghi","doi":"10.1504/ijitst.2021.10040082","DOIUrl":"https://doi.org/10.1504/ijitst.2021.10040082","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67218446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obsolete Ransomware: A Comprehensive Study of the Continued Threat to Users 过时的勒索软件:对用户持续威胁的综合研究
International Journal of Internet Technology and Secured Transactions Pub Date : 2020-12-31 DOI: 10.20533/JITST.2046.3723.2020.0082
Arsh Arora, Ragib Hasan, Gary Warner
{"title":"Obsolete Ransomware: A Comprehensive Study of the Continued Threat to Users","authors":"Arsh Arora, Ragib Hasan, Gary Warner","doi":"10.20533/JITST.2046.3723.2020.0082","DOIUrl":"https://doi.org/10.20533/JITST.2046.3723.2020.0082","url":null,"abstract":"","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72610059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering Private User Storages in Online Social Networks 恢复在线社交网络中的私有用户存储
International Journal of Internet Technology and Secured Transactions Pub Date : 2020-12-31 DOI: 10.20533/JITST.2046.3723.2020.0083
Fabian Schillinger, C. Schindelhauer
{"title":"Recovering Private User Storages in Online Social Networks","authors":"Fabian Schillinger, C. Schindelhauer","doi":"10.20533/JITST.2046.3723.2020.0083","DOIUrl":"https://doi.org/10.20533/JITST.2046.3723.2020.0083","url":null,"abstract":"Private user storages are used in Online Social Networks (OSN) to securely save private settings and keys on a server. This allows users to access these settings and keys from all their devices. Therefore, private user storages can synchronize these devices. When end-to-end encryption is applied in an OSN to ensure the privacy of users and the communication private user storages can be used to safely store all private and symmetric keys. A user can retrieve the encrypted storage from the server and decrypt it with its password. However, when the password is lost access to the private user storage is lost as well, as the symmetric key cannot be retrieved from the server in contrast to the recovery functions of some OSNs, where a new password can be created. We present a scheme that splits private user storages into different parts and applies two different secret sharing schemes to be able to recover the keys with the help of the other participants of the OSN. The scheme is more robust to missing shares than other secret sharing schemes. Therefore, even when a large fraction of the distributed shares are not accessible because shareholders are inactive or malicious high rates of successful reconstructions can be achieved. Keyword send-to-end encryption, online chat; online social networ, applied secret sharing, private storage, instant messaging service","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72850569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comparative Study of Traffic Generators: Applicability for Malware Detection Testbeds 流量发生器的比较研究:对恶意软件检测试验台的适用性
International Journal of Internet Technology and Secured Transactions Pub Date : 2020-12-31 DOI: 10.20533/JITST.2046.3723.2020.0085
Matt Swann, Joseph R. Rose, G. Bendiab, S. Shiaeles, N. Savage
{"title":"A Comparative Study of Traffic Generators: Applicability for Malware Detection Testbeds","authors":"Matt Swann, Joseph R. Rose, G. Bendiab, S. Shiaeles, N. Savage","doi":"10.20533/JITST.2046.3723.2020.0085","DOIUrl":"https://doi.org/10.20533/JITST.2046.3723.2020.0085","url":null,"abstract":"Network traffic generators are invaluable tools that allow for applied experimentation to evaluate the performance of networks, infrastructure, and security controls, by modelling and simulating the communication packets and payloads that would be produced by machines and devices on the network. Specifically for security applications, these tools can be used to consistently simulate malicious activity on the network and test the components designed to detect and mitigate malicious activities, in a highly reliable and customisable way. However, despite the promising features, most of these tools have some problems that can undermine the correctness of experiments. The accuracy of the simulation results depends strongly on the performance and reliability of the used generator. Thus, in this paper, we investigate the performance and accuracy of three of the most reviewed network traffic generators in literature, namely Cisco TRex, Ostinato and Genesids. Mainly, the comparative experiments examine the strengths and limitations of these tools, for malicious trafficwhich can help the research community to choose the most suitable one to assess the performance of their networks and security controls.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82456797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Controllability for Risk Management in Smart and Intelligent Systems 智能系统风险管理中的数据可控性
International Journal of Internet Technology and Secured Transactions Pub Date : 2020-07-13 DOI: 10.20533/JITST.2046.3723.2020.0080
M. Munier, V. Lalanne
{"title":"Data Controllability for Risk Management in Smart and Intelligent Systems","authors":"M. Munier, V. Lalanne","doi":"10.20533/JITST.2046.3723.2020.0080","DOIUrl":"https://doi.org/10.20533/JITST.2046.3723.2020.0080","url":null,"abstract":"Information has become a major asset in companies that have based their business on the production and exploitation of this information, but also in traditional companies that exploit their information with a view to continuously improving their processes. This is the case in collaborative systems where companies are interconnected but also in intelligent systems that have many information exchanges with there environment. It is important that companies keep control of the information they import, process and distribute. In this article, in the context of a risk management approach, we present a new security criterion: controllability.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89791607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ADFT: an adaptive, distributed, fault-tolerant routing algorithm for 3D mesh-based networks-on-chip ADFT:一种自适应、分布式、容错路由算法,适用于基于三维网格的片上网络
International Journal of Internet Technology and Secured Transactions Pub Date : 2020-04-27 DOI: 10.1504/IJITST.2020.10022905
Zahra Mogharrabi-Rad, E. Yaghoubi
{"title":"ADFT: an adaptive, distributed, fault-tolerant routing algorithm for 3D mesh-based networks-on-chip","authors":"Zahra Mogharrabi-Rad, E. Yaghoubi","doi":"10.1504/IJITST.2020.10022905","DOIUrl":"https://doi.org/10.1504/IJITST.2020.10022905","url":null,"abstract":"Nowadays, three-dimensional network-on-chips (3D-NoCs) have been introduced as the most efficient communication architectures. In these architectures, it is likely to encounter some faults. Therefore, an important goal in designing such architectures is to make them more tolerable against faults. In this paper, an adaptive, distributed and fault-tolerant routing algorithm called ADFT is proposed for 3D mesh-based NoC that is able to tolerate permanent faults and does not require any additional circuit for fault-tolerant. In order to evaluate the performance of the ADFT, we compared it with LOFT in terms of latency and throughput. Simulation results show improvement of the proposed method.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45998825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimising group key management for frequent-membership-change environment in VANET 优化组密钥管理以应对VANET中频繁的成员变更环境
International Journal of Internet Technology and Secured Transactions Pub Date : 2020-04-27 DOI: 10.1504/ijitst.2020.10028984
Baasantsetseg Bold, Young-Hoon Park
{"title":"Optimising group key management for frequent-membership-change environment in VANET","authors":"Baasantsetseg Bold, Young-Hoon Park","doi":"10.1504/ijitst.2020.10028984","DOIUrl":"https://doi.org/10.1504/ijitst.2020.10028984","url":null,"abstract":"In this paper, we propose a tree-based optimal group key management algorithm using a batch rekeying technique, which changes a set of keys at a certain time interval. In batch rekeying, the server collects all the joining and leaving requests during the time interval, and generates rekeying messages. In the proposed algorithm, when a vehicle joins a group, it is located at a certain leaf node of the key-tree according to its leaving time. This reduces the size of the rekeying messages because the vehicles that leave during the same time interval are concentrated on the same parent node. With the proposed scheme, tree-based group key management can be employed to the VANET because it solves the communication overhead problem. Using simulations, we demonstrate that our scheme remarkably reduces the communication cost for updating the group key.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45561788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bitcoin price prediction using ARIMA model 基于ARIMA模型的比特币价格预测
International Journal of Internet Technology and Secured Transactions Pub Date : 2020-04-27 DOI: 10.1504/ijitst.2020.10028982
M. Poongodi, V. Vijayakumar, N. Chilamkurti
{"title":"Bitcoin price prediction using ARIMA model","authors":"M. Poongodi, V. Vijayakumar, N. Chilamkurti","doi":"10.1504/ijitst.2020.10028982","DOIUrl":"https://doi.org/10.1504/ijitst.2020.10028982","url":null,"abstract":"Bitcoin is a highly volatile cryptocurrency with rising popularity. It is a turning point in the way currency is seen. Now the currency, rather than being physical is becoming more and more digital. Due to high variance of solo mining, the number of users joining top most famous bitcoin mining pools is increasing due to the fact that users together under a bitcoin pool will have a higher chance of generating next block in the bitcoins blockchain by reducing the variance and earning the mining reward. In this research paper we are doing a survey on the technology lying underneath bitcoin's network and the various machine learning predictive algorithms. We collected the dataset on bitcoin blockchain from 28 April 2013 to 31 July 2017 which is publicly available on https://coinmarketcap.com and applied the ARIMA model for price prediction of bitcoin.","PeriodicalId":38357,"journal":{"name":"International Journal of Internet Technology and Secured Transactions","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42334906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信