23 research outputs found

    An Optimized Round-Robin Scheduling of Speakers for Peers-to-Peers-Based Byzantine Faulty Tolerance

    Full text link
    © 2018 IEEE. Blockchain technology has been showing its strong performance on decentralized security when integrating with Internet of Things network. However, the trilemma of scalability-security-decentralization exists in Blockchain-based IoT. Therein the typical round-robin scheduling implemented in the Byzantine Faulty Tolerance (BFT) proposed by Neo's Blockchain has a significant delay when consecutive faulty miners exist. This paper proposes a novel analysis model for evaluating the network performance collapse in general, followed by an optimized round-robin scheduling for the case when the mutual latency difference is not significant enough for ranking. Based on the model, the optimized mechanism is able to increase the block rate for a specific subset of consecutive faulty miners by nearly 50% and provide a linearly positive growth rate of the mitigation with respect to the fail rate of a single miner, which strongly promotes the efficiency of the P2P-based BFT consensus algorithm

    A High-Performance Hybrid Blockchain System for Traceable IoT Applications

    Full text link
    © 2019, Springer Nature Switzerland AG. Blockchain, as an immutable distributed ledger, can be the key to realize secure and trustworthy IoT applications. However, existing blockchains can hardly achieve high-performance and high-security for large-scale IoT applications simultaneously. In this paper, we propose a hyper blockchain architecture combining the security of public blockchains with the efficiency of private blockchains. An IoT anchoring smart contract is proposed to anchor private IoT blockchains into a public blockchain. An IoT device management smart contract is also designed to trace sensory data. A comprehensive analysis reveals that the proposed hybrid blockchain system can achieve the performance of private blockchains and resist tampering

    Private and censorship-resistant communication over public networks

    Get PDF
    Society’s increasing reliance on digital communication networks is creating unprecedented opportunities for wholesale surveillance and censorship. This thesis investigates the use of public networks such as the Internet to build robust, private communication systems that can resist monitoring and attacks by powerful adversaries such as national governments. We sketch the design of a censorship-resistant communication system based on peer-to-peer Internet overlays in which the participants only communicate directly with people they know and trust. This ‘friend-to-friend’ approach protects the participants’ privacy, but it also presents two significant challenges. The first is that, as with any peer-to-peer overlay, the users of the system must collectively provide the resources necessary for its operation; some users might prefer to use the system without contributing resources equal to those they consume, and if many users do so, the system may not be able to survive. To address this challenge we present a new game theoretic model of the problem of encouraging cooperation between selfish actors under conditions of scarcity, and develop a strategy for the game that provides rational incentives for cooperation under a wide range of conditions. The second challenge is that the structure of a friend-to-friend overlay may reveal the users’ social relationships to an adversary monitoring the underlying network. To conceal their sensitive relationships from the adversary, the users must be able to communicate indirectly across the overlay in a way that resists monitoring and attacks by other participants. We address this second challenge by developing two new routing protocols that robustly deliver messages across networks with unknown topologies, without revealing the identities of the communication endpoints to intermediate nodes or vice versa. The protocols make use of a novel unforgeable acknowledgement mechanism that proves that a message has been delivered without identifying the source or destination of the message or the path by which it was delivered. One of the routing protocols is shown to be robust to attacks by malicious participants, while the other provides rational incentives for selfish participants to cooperate in forwarding messages

    CORPORATE SOCIAL RESPONSIBILITY IN ROMANIA

    Get PDF
    The purpose of this paper is to identify the main opportunities and limitations of corporate social responsibility (CSR). The survey was defined with the aim to involve the highest possible number of relevant CSR topics and give the issue a more wholesome perspective. It provides a basis for further comprehension and deeper analyses of specific CSR areas. The conditions determining the success of CSR in Romania have been defined in the paper on the basis of the previously cumulative knowledge as well as the results of various researches. This paper provides knowledge which may be useful in the programs promoting CSR.Corporate social responsibility, Supportive policies, Romania

    University catalog, 2016-2017

    Get PDF
    The catalog is a comprehensive reference for your academic studies. It includes a list of all degree programs offered at MU, including bachelors, masters, specialists, doctorates, minors, certificates, and emphasis areas. It details the university wide requirements, the curricular requirements for each program, and in some cases provides a sample plan of study. The catalog includes a complete listing and description of approved courses. It also provides information on academic policies, contact information for supporting offices, and a complete listing of faculty members. -- Page 3

    University catalog, 2015-2016

    Get PDF
    The catalog is a comprehensive reference for your academic studies. It includes a list of all degree programs offered at MU, including bachelors, masters, specialists, doctorates, minors, certificates, and emphasis areas. It details the university wide requirements, the curricular requirements for each program, and in some cases provides a sample plan of study. The catalog includes a complete listing and description of approved courses. It also provides information on academic policies, contact information for supporting offices, and a complete listing of faculty members. -- Page 4

    THE ROLE OF JAVANESE CULTURE IN CHARACTER BUILDING AT ELEMENTARY SCHOOL

    Get PDF
    Nowadays, character education becomes a major concern in Indonesia. Character development has been done by various strategy, but the results is yet to be seen. Character development should beginin elementary school in order that the children's charactercould formed early so that it could be developed until they are mature. One of the efforts of character building is integrating the local wisdom in learning. One of them is the Javanese culture. Javanese culture has a variety of rules called the "unggah-ungguh" that always give good models to the public community, especially to the Javanese. Along with the times, the Javanese culture that upholds ethics began to degraded and replaced by foreign cultures that came later. The parents’ roles in instilling the Javanese culture to their children also decreased gradually. This paper will examine the Javanese culture’s roles toward the character building in elementary schools’ students. Descriptive method supported by a depth review of the literature and the previous studies is used in this paper as a method. Based on the results of these reviews, we obtain some information about the types and mechanisms of Javanese culture in character building of students, especially elementary school students
    corecore