145,252 research outputs found

    Overlay Security: Quantum-Safe Communication over the Internet Infrastructure

    Get PDF
    The need for a quantum-safe Internet is emerging, and this is a great opportunity to re-examine the legacy of public key infrastructure. There is a need for perspective on the evolution of cryptography over the years, including the perfect information-theoretical secure schemes and the computationally secure schemes, in particular. There is also a need to examine the evolving Internet infrastructure to identify efficient design and secure cryptographic schemes over the existing Internet infrastructure. A combination of overlay security, blockchain, and Merkle trees with Lamport’s signatures offers just such an easily implementable quantum-safe Internet

    A novel pseudo-random number generator based on discrete chaotic iterations

    Full text link
    Security of information transmitted through the Internet, against passive or active attacks is an international concern. The use of a chaos-based pseudo-random bit sequence to make it unrecognizable by an intruder, is a field of research in full expansion. This mask of useful information by modulation or encryption is a fundamental part of the TLS Internet exchange protocol. In this paper, a new method using discrete chaotic iterations to generate pseudo-random numbers is presented. This pseudo-random number generator has successfully passed the NIST statistical test suite (NIST SP800-22). Security analysis shows its good characteristics. The application for secure image transmission through the Internet is proposed at the end of the paper.Comment: The First International Conference on Evolving Internet:Internet 2009 pp.71--76 http://dx.doi.org/10.1109/INTERNET.2009.1

    A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle

    Get PDF
    As an extension for Internet of Things (IoT), Internet of Vehicles (IoV) achieves unified management in smart transportation area. With the development of IoV, an increasing number of vehicles are connected to the network. Large scale IoV collects data from different places and various attributes, which conform with heterogeneous nature of big data in size, volume, and dimensionality. Big data collection between vehicle and application platform becomes more and more frequent through various communication technologies, which causes evolving security attack. However, the existing protocols in IoT cannot be directly applied in big data collection in large scale IoV. The dynamic network structure and growing amount of vehicle nodes increases the complexity and necessary of the secure mechanism. In this paper, a secure mechanism for big data collection in large scale IoV is proposed for improved security performance and efficiency. To begin with, vehicles need to register in the big data center to connect into the network. Afterwards, vehicles associate with big data center via mutual authentication and single sign-on algorithm. Two different secure protocols are proposed for business data and confidential data collection. The collected big data is stored securely using distributed storage. The discussion and performance evaluation result shows the security and efficiency of the proposed secure mechanism

    Case Studies in Physical Therapy: Transitioning a "Hands-On" Approach into a Virtual Platform

    Get PDF
    Technology is expanding at an unprecedented rate. Because patients value the speed and convenience of the internet, there is an increasing demand for telemedicine.  Practitioners must therefore adapt their clinical skills to evolving online technologies. This paper presents a series of three case studies in which a physical therapist first assessed and treated musculoskeletal disorders via a live, secure video. The basis of the mechanical assessment was observation of movement rather than palpation. In each case, the virtual mechanical assessment identified a specific sub-classification with a directional preference.  All patients reported improvements in symptoms and function in less than four visits and all maintained a reduction in symptoms after three months. Given the “hands-off” role of the evaluator, this approach can become an effective tool in the evolving healthcare platform of telerehabilitation.

    Smart Cities for Real People

    Get PDF
    Accelerating urbanization of the population and the emergence of new smart sensors (the Internet of Things) are combining in the phenomenon of the smart city. This movement is leading to improved quality of life and public safety, helping cities to enjoy economies that help remedy some budget overruns, better health care, and is resulting in increased productivity. The following report summarizes evolving digital technology trends, including smart phone applications, mapping software, big data and sensor miniaturization and broadband networking, that combine to create a technology toolkit available to smart city developers, managers and citizens. As noted above, the benefits of the smart city are already evident in some key areas as the technology sees actual implementation, 30 years after the creation of the broadband cable modem. The challenges of urbanization require urgent action and intelligent strategies. The applications and tools that truly benefit the people who live in cities will depend not on just the tools, but their intelligent application given current systemic obstacles, some of which are highlighted in the article. Of course, all the emerging technologies mentioned are dependent on ubiquitous, economical, reliable, safe and secure networks (wired and wireless) and network service providers

    Trends in Migration, Hosting and Payment for Commercial Child Pornography Websites

    Get PDF
    The Financial Coalition Against Child Pornography ("Coalition") was formed in 2006 to address the alarming growth of commercial child pornography over the Internet. Its members include leaders in the banking and payments industries, as well as Internet services companies. One of the Coalition's charters is to track and anticipate how the mechanics of commercial child pornography are evolving. This paper looks at Trends in Migration, Hosting and Payment for Commercial Child Pornography Websites

    Ontology acquisition and exchange of evolutionary product-brokering agents

    Get PDF
    Agent-based electronic commerce (e-commerce) has been booming with the development of the Internet and agent technologies. However, little effort has been devoted to exploring the learning and evolving capabilities of software agents. This paper addresses issues of evolving software agents in e-commerce applications. An agent structure with evolution features is proposed with a focus on internal hierarchical knowledge. We argue that knowledge base of agents should be the cornerstone for their evolution capabilities, and agents can enhance their knowledge bases by exchanging knowledge with other agents. In this paper, product ontology is chosen as an instance of knowledge base. We propose a new approach to facilitate ontology exchange among e-commerce agents. The ontology exchange model and its formalities are elaborated. Product-brokering agents have been designed and implemented, which accomplish the ontology exchange process from request to integration
    corecore