22,854 research outputs found

    FastPay: High-Performance Byzantine Fault Tolerant Settlement

    Get PDF
    FastPay allows a set of distributed authorities, some of which are Byzantine, to maintain a high-integrity and availability settlement system for pre-funded payments. It can be used to settle payments in a native unit of value (crypto-currency), or as a financial side-infrastructure to support retail payments in fiat currencies. FastPay is based on Byzantine Consistent Broadcast as its core primitive, foregoing the expenses of full atomic commit channels (consensus). The resulting system has low-latency for both confirmation and payment finality. Remarkably, each authority can be sharded across many machines to allow unbounded horizontal scalability. Our experiments demonstrate intra-continental confirmation latency of less than 100ms, making FastPay applicable to point of sale payments. In laboratory environments, we achieve over 80,000 transactions per second with 20 authorities---surpassing the requirements of current retail card payment networks, while significantly increasing their robustness

    Chemical applications of escience to interfacial spectroscopy

    No full text
    This report is a summary of works carried out by the author between October 2003 and September 2004, in the first year of his PhD studie

    A Forensically Sound Adversary Model for Mobile Devices

    Full text link
    In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device

    Development and Deployment of VoiceXML-Based Banking Applications

    Get PDF
    In recent times, the financial sector has become one of the most vibrant sectors of the Nigerian economy with about twenty five banks after the bank consolidation / merger exercise. This sector presents huge business investments in the area of Information and Communication Technology (ICT). It is also plausible to say that the sector today is the largest body of ICT services and products users. It is no gainsaying the fact that so many Nigerians now carry mobile phones across the different parts of the country. However, applications that provide voice access to real-time banking transactions from anywhere, anytime via telephone are still at their very low stage of adoption across the Nigerian banking and financial sector. A versatile speech-enabled mobile banking application has been developed using VXML, PHP, Apache and MySQL. The developed application provides real-time access to banking services, thus improving corporate bottom-line and Quality of Service (QoS) for customer satisfaction

    Conceptual evidence collection and analysis methodology for Android devices

    Full text link
    Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android devices that is, as far as practical, device agnostic. Android devices may contain a significant amount of evidential data that could be essential to a forensic practitioner in their investigations. However, the retrieval of this data requires that the practitioner understand and utilize techniques to analyze information collected from the device. The major contribution of this research is an in-depth evidence collection and analysis methodology for forensic practitioners.Comment: in Cloud Security Ecosystem (Syngress, an Imprint of Elsevier), 201

    Monitoring and data analytics-triggered reconfiguration in partially disaggregated optical networks

    Get PDF
    ©2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.We present ADONIS, which stands for Aggregator/Disaggregator for Optical Network equIpmentS, a novel open device agent able to construct logical network devices from (dis)aggregation of physical components in order to expose meaningful network devices to the SDN controller. We experimentally assess it by means of a control closed-loop involving ADONIS, a Software Defined Network controller, a Monitoring and Data Analytics system, and a novel reconfiguration tool, SMART-A.The research leading to these results has received funding from the EC through the METRO-HAUL (G.A. nº 761727).Peer ReviewedPostprint (author's final draft

    Creation of a Single National ID: Challenges & Opportunities for India

    Get PDF
    A National ID for all citizens and residents of India has long being considered a critical necessity, albeit the related projects have been in pilot mode for the past several years and no distinct road ahead seems to be coming out. The government has been focusing on inclusive growth and has launched several schemes at different levels to facilitate the same. However, monitoring the execution of these schemes and understanding clearly if the targeted citizens actually have got benefited, would demand for substantial granularity of information and doing away with information bottlenecks. Interestingly, proper execution of the National ID project by the government can prove to be useful for execution of various schemes and projects as well as in accessing multiple government and private sector services. This paper focuses on the need for a single national identity system in India and its proposed execution which may actually be linked to citizen life cycle. The other aspects covered and analyzed include current Indian scenario, challenges, existing identification systems and loopholes in the existing systems. Major challenges seem to be coming from enrolments, technology platform choice and strategic design, corresponding policy and legal frameworks. The paper also discusses about international scenario of single national id projects undertaken in 27 countries across the globe to understand current status, adoption and usage. To reinforce the need for national ID, the existing IDs were analysed based on a scoring model considering various dimensions. Primary research was conducted, based on which it was found none of the existing IDs was able to satisfy as a National ID based on the scoring model. The proposed road map has been discussed in length i.e technology platform, smart card technology, legal and administrative framework, business model based on Private-Public Partnership (PPP) considering the mammoth and diverse population. A ranking matrix may be created to come up with a composite score for all districts based on various dimensions. The execution may be planned to be executed without asking Indians to stand in queue for one more ID and accelerating towards a more secured society and more importantly ensuring better delivery of Government services to citizens.

    The Role of the Internet of Things in Network Resilience

    Get PDF
    Disasters lead to devastating structural damage not only to buildings and transport infrastructure, but also to other critical infrastructure, such as the power grid and communication backbones. Following such an event, the availability of minimal communication services is however crucial to allow efficient and coordinated disaster response, to enable timely public information, or to provide individuals in need with a default mechanism to post emergency messages. The Internet of Things consists in the massive deployment of heterogeneous devices, most of which battery-powered, and interconnected via wireless network interfaces. Typical IoT communication architectures enables such IoT devices to not only connect to the communication backbone (i.e. the Internet) using an infrastructure-based wireless network paradigm, but also to communicate with one another autonomously, without the help of any infrastructure, using a spontaneous wireless network paradigm. In this paper, we argue that the vast deployment of IoT-enabled devices could bring benefits in terms of data network resilience in face of disaster. Leveraging their spontaneous wireless networking capabilities, IoT devices could enable minimal communication services (e.g. emergency micro-message delivery) while the conventional communication infrastructure is out of service. We identify the main challenges that must be addressed in order to realize this potential in practice. These challenges concern various technical aspects, including physical connectivity requirements, network protocol stack enhancements, data traffic prioritization schemes, as well as social and political aspects

    Protecting the infrastructure: 3rd Australian information warfare & security conference 2002

    Get PDF
    The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year\u27s conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations. The papers cover many topics, all within the field of information warfare and its applications, now and into the future. The papers have been grouped into six streams: • Networks • IWAR Strategy • Security • Risk Management • Social/Education • Infrastructur
    • …
    corecore