36 research outputs found

    Building robust m-commerce payment system on offline wireless network

    Get PDF
    Mobile commerce is one of the upcoming research area with focus on mobile payment systems. Unfortunately, the current payment systems is directly dependent on fixed infrastructure of network (cellular network), which fails to facilitate optimal level of security for the payment system. The proposed system highlights a novel approach for building a secure, scalable, and flexible e-payment systems in the distributed scenario of wireless adhoc network in offline mode of communication for enhanced security on transaction and payment process. The proposed system uses Simple Public Key Infrastructure for providing the security in payment processes. The performance analysis of the proposed model shows that the system is highly robust and secure ensuring anonymity, privacy, non-repudiation offline payment system over wireless adhoc network

    A traceable E-cash transfer system against blackmail via subliminal channel

    No full text
    Due to the development of Internet communication technology, E-Commerce is becoming popular. Because crime is thriving, avoiding malicious behavior and protecting property becomes an important issue. To prevent malicious behavior, many proposals have been put forth. The subliminal channel is the most popular method, which notifies the designated receiver to transmit secret messages. Simmons was the first to propose this concept in 1983. Now, more and more digital signature applications use a subliminal channel to transfer secret messages. In this paper, we propose a traceable E-cash transfer system against blackmail via subliminal channel. (C) 2009 Elsevier B.V. All rights reserved

    Creating Chaos Online

    Get PDF
    Unmasks the disinformation propagated by Russian trolling in public discours

    Labouring in Lilliput : labour relations and images of smallness in developing microstates

    Get PDF
    This project opens up insights into the social processes colouring labour relations in developing microstates. It purports to explore how worker behaviour in very small, often island, developing countries unfolds in circumstances prone also to influences resulting from the condition of smallness. The thesis' main intended contribution is therefore an alertness to the plausibility and heuristic usefulness of a smallness perspective towards a better understanding of microstate labour dynamics in particular. The research design adopted is reflexively critical. It confronts the theories and epithets surrounding the developing microstate, constructing a home grown, conceptual framework and methodological regime. This sensitises research to the often unacknowledged, behavioural dynamics which 'infect' labour formation and labour-management relations in these territories. The method of investigation comprises a resort to multiple data sourcing. A literature audit is complemented by 4 case studies. These involve: Transnationally comparable employment and labour relations settings emergent from semi-structured interview scripts; encounters with fellow microstate academics; and an autobiographical ethnography. The material is organised a follows: The research question is first set up and the applied methodology problematised (Chapter 1) . Next is a review of development theory, with the proposal of an alternative explanation of microstate 'development' strategies, subsequently applied to the experiences of Malta (my country) and Barbados (Chapter 2). The construction of a microstate labour syndrome follows, with the explanatory and organising potential of a typology revolving around the conditions of intimacy, totality and monopoly (Chapter 3). These leitmotifs are then tested out: First, in the context of labour relations in two microstate hotels (Chapter 4); secondly, with respect to the behaviour and perceptions of microstate campus academic staff; lastly, in relation to the self as microstate academic (Chapter 5). The conclusion serves as a synthesis as well as an opportunity to appraise the implications of the results (Chapter 6)

    Broadcasting modernity: eloquent listening in the early twentieth century

    Get PDF
    This thesis, ‘Broadcasting Modernity’ is an account of sound technology, namely wireless, as a feature of early twentieth century literature. If modernism is a historical-specific movement, and language a repository of time, then the advent of radio broadcasting cannot be ignored - a medium which inscribed itself into the pages of books. The present study is original, in that it establishes radio as a portal through which to regard the wider cultural mentality, cross-cutting, or ‘crashing’ the written word, and thus producing the effect of two wires instantly reacting to one another. Therefore, just as radio may be accessed through literature, certain texts between 1900-1945 may be reinterpreted acoustically. To qualify this argument, a select group of writers are discussed individually, and at length – figures who allowed radio to affect their creative output, at various levels, in a period of rapid technological change

    A traceable E-cash transfer system against blackmail

    No full text
    由於網際網路與移動式通訊的蓬勃發展,使得電子商務(E-Commerce)變得越來越普及。因為犯罪行為日益遽增,所以如何防止惡意行為以及保護個人資產成了一個很重要的議題。在本篇論文中,我們提出了兩個新的電子現金轉帳系統來防止勒索行為。一個應用在移動式設備上,另外一個則應用了潛隱通道(subliminal channel)的簽章方法。犯罪者所指定的帳戶在勒索的情況下會被追蹤到,而轉帳的程序依然進行卻不會被犯罪者察覺,等到轉帳程序完成後,這個問題的帳戶就會被凍結。然而犯罪者不知道這個指定的帳戶已經被凍結,因此當他/她去提款時,他/她就無法得逞拿到資金。在1983年,Simmons最早提出潛隱通道的概念,現今就有越來越多的應用在數位簽章(digital signature)上傳輸秘密的訊息。除此之外,為了保護轉帳訊息的轉送,我們也提供了一個交互認證(mutual authentication)的機制來建立會議金鑰用以傳送通訊資料,並且也利用這樣的會議金鑰來代替潛隱通道中的共同秘密金鑰。對於被害者或是犯罪者,我們提出的方案都可以避免惡意的行為。Due to the development of internet and mobile communication technology, E-Commerce is becoming popular. Because the crime is thriving, how to against malicious behavior and protect the victim's property becomes an important issue. In this paper, we present two novel E-cash transfer system against blackmail. One is applied in the mobile devices. The other is applied with the signature of subliminal channel. The problematic account which is designated by the criminal is able to be traced under the blackmail. And the transfer is still running not alert the criminal. After the transfer is finished, the problematic account will be frozen. However, the criminal doesn't know the designated account has to be frozen. Therefore, when he/she goes to withdraw the money, he/she will not gain his/her purpose. The subliminal channel is the most popular method which notifies the designated receiver for the blackmail. Simmons was the first person to propose this concept in 1983. Now, there are more and more digital signature applications using subliminal channel to transfer secret messages. In addition, to protect the transfer messages forwarding, we also propose a mutual authentication scheme and construct a session key to protect the communication messages. For victim or criminal, the proposed protocol can also prevent malicious behavior.1. Introduction……………………………………………………………………… 1 2. The proposed scheme……………………………………………………………. 8 2.1. Our E-cash transfer system via mobile devices…………………………… 8 2.1.1. Constructing the session key model………………………………. 11 2.1.2. Registration phase………………………………………………… 16 2.1.3. Login and authentication phase …………………………………... 16 2.1.4. Transfer phase…………………………………………………….. 20 2.1.5. Reporting blackmail to the Official Agency phase……………….. 22 2.1.6. Freezing the account phase……………………………………….. 24 2.1.7. Password change phase…………………………………………… 26 2.2. Our E-cash transfer system via subliminal channel……………………….. 27 2.2.1. Initialization phase………………………………………………... 29 2.2.2. Transfer phase…………………………………………………….. 29 2.2.3. Reporting blackmail to the Official Agency phase……………….. 33 2.2.4. Freezing the account phase……………………………………….. 34 3. Analyses and discussions………………………………………………………… 38 3.1. Requirements of remote user login authentication………………………... 38 3.1.1. Denial of service attacks………………………………………….. 38 3.1.2. Devices loss attacks………………………………………………. 38 3.1.3. Forgery attacks……………………………………………………. 39 3.1.4. Forward secrecy…………………………………………………... 40 3.1.5. Insider attacks…………………………………………………….. 40 3.1.6. Mutual authentication…………………………………………….. 41 3.1.7. Parallel session attacks…………………………………………… 42 3.1.8. Password guessing attacks………………………………………... 42 3.1.9. Replay attacks…………………………………………………….. 43 3.1.10. Stolen-verifier attacks……………………………………………... 43 3.2. Subliminal channel without sharing the common secret key in advance…. 45 3.3. The problematic account is traceable……………………………………… 46 3.3.1. In our E-cash transfer scheme via mobile devices………………... 46 3.3.2. In our E-cash transfer scheme via subliminal channel……………. 47 3.4. The protocol is preventive false reports…………………………………… 48 3.4.1. In our E-cash transfer scheme via mobile devices………………... 48 3.4.2. In our E-cash transfer scheme via subliminal channel……………. 49 3.5. The session keys are constructed by mutual authentication………………. 49 3.5.1. In our E-cash transfer scheme via mobile devices………………... 49 3.5.2. In our E-cash transfer scheme via subliminal channel……………. 53 3.6. The session keys withstand man-in-the-middle attacks…………………… 54 3.6.1. In our E-cash transfer scheme via mobile devices………………... 54 3.6.2. In our E-cash transfer scheme via subliminal channel……………. 55 3.7. The digital signature is the proof of non-repudiation……………………... 56 3.7.1. In our E-cash transfer scheme via mobile devices………………... 56 3.7.2. In our E-cash transfer scheme via subliminal channel……………. 57 3.8. Analyses…………………………………………………………………… 60 3.8.1. In our E-cash transfer scheme via mobile devices………………... 60 3.8.2. In our E-cash transfer scheme via subliminal channel……………. 61 4. Conclusions………………………………………………………………………. 63 Reference……………………………………………………………………………... 6

    Suspicion, control and desire - a criminological analysis of secretive conduct and smart devices

    Get PDF
    The topic of this thesis is the connection between secrecy and the onlife reality, a blurring line between being online and offline. Specifically, it offers a novel criminological perspective on how the smart technological devices integrated in the onlife ecology (with its technologies, features, design, instant online access, and messaging) aid specific instances of 'secretive conduct', involving regular and mundane episodes of suspicion, control and desire towards our kin, partners, co-worker, and perfect strangers. While most studies on smart technology (phones, pc, homes, watches, cars) concern privacy and security, as well as the elements of isolation and social disintegration - this thesis offers an innovative contribution in the field of criminology. The elements which protect our devices, such as touch ID and face recognition have created an un-accessible wall against other users, both online and offline; the character of such elements and their effects is a central concern of this thesis, revolving around suspicion, control and desire such a condition induces. Using a cultural criminology perspective, this work will theorize the ecology of onlife reality, the secretive conduct that characterises its environment; interpreting how tools of monitoring and control appear to have taken over any 'space' - from public to private. It appears that not only is anything observable - but it is done in a covert and discreet manner - the Goffmanian front & back stage result constantly under scrutiny. In this context, the users become increasingly effected by this covert scrutiny. The smartphone functions as a quintessential tool that allows such a blur - leading into the onlife question of crime and cybercrime. Advancing an experimental 'hybrid' methodology that attempts to unite both digital and 'in-person' ethnographic considerations, the research makes use of informal and incidental 'confessions' of smart technology users, such as their personal or witnessed secretive conducts. The analysis concentrates on specific abusive episodes in which the use of onlife devices allow all sorts of secretive conducts, with direct or indirect elements of harm: these are treated as social 'vignettes', and include parents secretly monitoring their children, partners making assumptions on the other's whereabouts, perpetuating elements of stalking, blackmailing, monitoring, all in a remote and apparently 'secured' environment. This work contributes to cultural criminology with analysis of the blasé approach to such elements of secretive conduct becoming integral in the onlife habitus of smartphone users. Secrecy is becoming a central element of onlife ecology, taking place unwillingly, and mostly unknowingly. To act in secret, to monitor in secret - wanting to see, control, and observe all become central elements of the onlife

    Toward an Ecological Culture: Sustainability, Post-domination and Spirituality

    Get PDF
    This essay presents an overview of an emergent culture of ecological consciousness and sensitivity for nature within and without humans. The inquiry pertains to the interdisciplinary field of human ecology. The essential methodological approach is eco-systemic, implying the basic interrelatedness of entities and their environment. The essay explores the interconnections at various levels of human-ecological interaction, analyzed from the perspective of the basic components of an ecological culture: sustainability - as an economy of metabolic exchange with the environment and inclusion into natural cycles of renewal; post-domination - as human relations based on individuals\u27 responsibility for their social and natural environment, and on surpassing the authoritarian structures of subordination of humans and nature; and a spirituality of immanent ethic and sensitivity. Individual responsibility is the core of an ecological culture, and the basis of an ecological consciousness - an awareness of the ecological context of the individual\u27s life process - the impact which the ways of satisfying the individual\u27s needs have on the immediate, and also the wider social, biological and physical environment. Ecological culture involves the revitalization of the local community and the household as the levels of immediate human-ecological interactions. The lack of individual responsibility is both caused by and expressed in domination patterns. Domination is based on dualism. Its essential routines are inferiorization and exclusion of mutuality which entail a lack of empathy and harmony - thus hindering a positive relation to the social and natural environment. When domination structures are deconstructed, a possibility of a new integration emerges in the reconsidered sphere of spirituality, involving immanence (re-connection of spirituality and nature), and integrative epistemology (inclusion of other-than-rational modes of comprehension and communication). An essential epistemological component is a sensitivity which links life processes in and around us, thus enabling us to feel that we are part of natural renewal and energy exchange. Such a sensitivity is the basis for individual responsibility which is no longer a matter of reliance on external authority and imposed morality of prescribed rights and duties. Responsibility becomes an individual\u27s inner ethic of joy as an ultimate expression of livelines
    corecore