74 research outputs found

    Structured Intuition: A Methodology to Analyse Entity Authentication

    Get PDF

    Challenges and Prospects of e‐Elections in Nigeria

    Get PDF
    E‐governance is a momentous currency in contemporary society, and it manifests in virtually all areas of life, which include, among others, banking, insurance, trade and commerce, and democracy. The deployment of Information Communication Technology (ICT) and Information Technology (IT) devices for democratic governance has been successful in technologically advanced countries, and has inspired countries from the developing South, such as Nigeria to contemplate or commence e‐elections for democratic sustainability. The elections regulatory body, the Independent National Electoral Commission (INEC) had contemplated exploring e‐elections in the country but later dropped the idea on grounds of unpreparedness. Electoral process or election however, has its several components: voter registration, registration review/update, electioneering campaigns, actual voting, and release of election results. These naturally come with their challenges and have informed a school of thought that based on Nigeria’s economic instability, corruption, resources mismanagement, and technologically backward climate, including unstable power supply, e‐elections would be far‐fetched. The other school of thought however, exhibits hope and optimism. This paper, with data scooped through questionnaire administration and from literature, examines the challenges and prospects as well as the peculiarity of Nigerian electoralsystem and the e‐election system, which will be marooned in the general Nigerian politicandl economic climate. Findings show that the prospects are and will always be good for the country, but that the stakes are far too high at a moment of huge infrastructural laybacks of the country. Moreover, not too many people have confidence in the electoral regime, let alone going ahead with such a venture as e‐elections. It therefore recommends, among other things, that the nation should develop the sub‐sectors of the economy that can sustain e‐elections before INEC goes ahead with the capital‐intensive enterprise for democratic sustainability in Nigeria

    E-democracy Implementation: The Imperative of Agenda Setting

    Get PDF
    Decline in the level of citizens’ participation due to disconnect between citizens and their representatives has been identified as one of the prominent challenges facing most democratic societies in the world today. E-democracy has been identified to have the potentials to reduce the contemporary estrangement between the democratic actors by creating new forms of engagement, deliberation, and collaboration in polity to make the democratic processes more inclusive and transparent. However, edemocracy initiatives in many countries have had mixed success as most e-democracy implementations have been unable to justify the essence of huge investments made into it. This research paper reviews existing edemocracy development processes and agenda of nations among the top twenty countries in e-participation implementation as rated in the UN Global E-Government Evaluation, 2010. The sample composed of secondary data sourced from information system centric academic journals, book chapters, conference proceedings, database of international development organisations (OECD, UN, EU) on e-democracy implementation reports and database of research institutions and centres that focus on e-government and e-democracy implementation. Findings revealed that most countries do not have well established framework and agenda setting for e-democracy implementation, but only based their e-democracy implementation on one of the objectives of their e-government implementation. As a result, policy content is largely missing in most edemocracy strategies at both conceptual and implementation stage. This paper therefore, presents a guideline for e-democracy agenda setting and discusses issues germane to establishing e-democracy agenda. It submits that for a successful e-democracy implementation, the agenda-setting phase should capture the legal and political processes of the country. In addition, e-democracy strategic vision, strategic aim and objectives, strategic policy, mode of implementation and overseeing body should be well articulated in the agenda setting phase of e-democracy implementation plan. The discussion will benefit both researchers, government and practitioners on successful e-democracy implementation as basis for societal development

    The Role of Information and Communication Technology on Transparency, Trust and Good Governance in Nigeria

    Get PDF
    Studies on transparency and trust in public sector management have generated exciting moments amongst scholars and practitioners alike in the area of good governance for development of societies. Furthermore, it has been argued by some scholars that government agencies are more likely to achieve their goals of enhanced performance for the improvement in the living standard of the people, particularly in the provision of adequate social amenities such as clean water, electricity supply, good roads, well equipped hospitals and adequate security protection of lives and properties, where transparency on the part of public officials in the use of public resources, and trust about government agencies on the part of the people are the norms in such a society. Previous studies have hinged on transparency for enhanced performance of government and its agencies on the integrity and perception of the individual employees in carrying out their assignments without taking into consideration the lack of capacity to perform, and the value judgment of such individuals. This present study focuses on the role of information and communication technology (ICT) in the management of government and its activities for enhanced development in the society. The work contributes to our understanding of the relationship between ICT, transparency, trust and good governance as a catalyst for development in Nigeria. With the use of structural equation model, the study empirically analyzed 261 copies of the questionnaire that were administered to respondents in the public and the private sectors of the nation’s economy, about their perception on the relationship between the variables under consideration. The findings suggest the importance of ICT as a facilitator of transparency in the management of public resources, including, revenue collection and disbursement of public funds by government officials, as a basis for societal development, than the mere reliance on individual employees’ integrity and perception in the management of public resources in Nigeria’s quest for developmen

    Cryptography for Bitcoin and friends

    Get PDF
    Numerous cryptographic extensions to Bitcoin have been proposed since Satoshi Nakamoto introduced the revolutionary design in 2008. However, only few proposals have been adopted in Bitcoin and other prevalent cryptocurrencies, whose resistance to fundamental changes has proven to grow with their success. In this dissertation, we introduce four cryptographic techniques that advance the functionality and privacy provided by Bitcoin and similar cryptocurrencies without requiring fundamental changes in their design: First, we realize smart contracts that disincentivize parties in distributed systems from making contradicting statements by penalizing such behavior by the loss of funds in a cryptocurrency. Second, we propose CoinShuffle++, a coin mixing protocol which improves the anonymity of cryptocurrency users by combining their transactions and thereby making it harder for observers to trace those transactions. The core of CoinShuffle++ is DiceMix, a novel and efficient protocol for broadcasting messages anonymously without the help of any trusted third-party anonymity proxies and in the presence of malicious participants. Third, we combine coin mixing with the existing idea to hide payment values in homomorphic commitments to obtain the ValueShuffle protocol, which enables us to overcome major obstacles to the practical deployment of coin mixing protocols. Fourth, we show how to prepare the aforementioned homomorphic commitments for a safe transition to post-quantum cryptography.Seit seiner revolutionären Erfindung durch Satoshi Nakamoto im Jahr 2008 wurden zahlreiche kryptographische Erweiterungen für Bitcoin vorgeschlagen. Gleichwohl wurden nur wenige Vorschläge in Bitcoin und andere weit verbreitete Kryptowährungen integriert, deren Resistenz gegen tiefgreifende Veränderungen augenscheinlich mit ihrer Verbreitung wächst. In dieser Dissertation schlagen wir vier kryptographische Verfahren vor, die die Funktionalität und die Datenschutzeigenschaften von Bitcoin und ähnlichen Kryptowährungen verbessern ohne deren Funktionsweise tiefgreifend verändern zu müssen. Erstens realisieren wir Smart Contracts, die es erlauben widersprüchliche Aussagen einer Vertragspartei mit dem Verlust von Kryptogeld zu bestrafen. Zweitens schlagen wir CoinShuffle++ vor, ein Mix-Protokoll, das die Anonymität von Benutzern verbessert, indem es ihre Transaktionen kombiniert und so deren Rückverfolgung erschwert. Sein Herzstück ist DiceMix, ein neues und effizientes Protokoll zur anonymen Veröffentlichung von Nachrichten ohne vertrauenswürdige Dritte und in der Präsenz von bösartigen Teilnehmern. Drittens kombinieren wir dieses Protokoll mit der existierenden Idee, Geldbeträge in Commitments zu verbergen, und erhalten so das ValueShuffle-Protokoll, das uns ermöglicht, große Hindernisse für den praktischen Einsatz von Mix-Protokollen zu überwinden. Viertens zeigen wir, wie die dabei benutzten Commitments für einen sicheren Übergang zu Post-Quanten-Kryptographie vorbereitet werden können

    Distributed detection of anomalous internet sessions

    Get PDF
    Financial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to browsers and banking sites. The use of highly dangerous malware has become the most significant threat and traditional signature-detection methods are nowadays easily circumvented due to the amount of new samples and the use of sophisticated evasion techniques. Antivirus vendors and malware experts are pushed to seek for new methodologies to improve the identification and understanding of malicious applications behavior and their targets. Financial institutions are now playing an important role by deploying their own detection tools against malware that specifically affect their customers. However, most detection approaches tend to base on sequence of bytes in order to create new signatures. This thesis approach is based on new sources of information: the web logs generated from each banking session, the normal browser execution and customers mobile phone behavior. The thesis can be divided in four parts: The first part involves the introduction of the thesis along with the presentation of the problems and the methodology used to perform the experimentation. The second part describes our contributions to the research, which are based in two areas: *Server side: Weblogs analysis. We first focus on the real time detection of anomalies through the analysis of web logs and the challenges introduced due to the amount of information generated daily. We propose different techniques to detect multiple threats by deploying per user and global models in a graph based environment that will allow increase performance of a set of highly related data. *Customer side: Browser analysis. We deal with the detection of malicious behaviors from the other side of a banking session: the browser. Malware samples must interact with the browser in order to retrieve or add information. Such relation interferes with the normal behavior of the browser. We propose to develop models capable of detecting unusual patterns of function calls in order to detect if a given sample is targeting an specific financial entity. In the third part, we propose to adapt our approaches to mobile phones and Critical Infrastructures environments. The latest online banking attack techniques circumvent protection schemes such password verification systems send via SMS. Man in the Mobile attacks are capable of compromising mobile devices and gaining access to SMS traffic. Once the Transaction Authentication Number is obtained, criminals are free to make fraudulent transfers. We propose to model the behavior of the applications related messaging services to automatically detect suspicious actions. Real time detection of unwanted SMS forwarding can improve the effectiveness of second channel authentication and build on detection techniques applied to browsers and Web servers. Finally, we describe possible adaptations of our techniques to another area outside the scope of online banking: critical infrastructures, an environment with similar features since the applications involved can also be profiled. Just as financial entities, critical infrastructures are experiencing an increase in the number of cyber attacks, but the sophistication of the malware samples utilized forces to new detection approaches. The aim of the last proposal is to demonstrate the validity of out approach in different scenarios. Conclusions. Finally, we conclude with a summary of our findings and the directions for future work

    Proceedings of the Workshop on web applications and secure hardware (WASH 2013).

    Get PDF
    Web browsers are becoming the platform of choice for applications that need to work across a wide range of different devices, including mobile phones, tablets, PCs, TVs and in-car systems. However, for web applications which require a higher level of assurance, such as online banking, mobile payment, and media distribution (DRM), there are significant security and privacy challenges. A potential solution to some of these problems can be found in the use of secure hardware – such as TPMs, ARM TrustZone, virtualisation and secure elements – but these are rarely accessible to web applications or used by web browsers. The First Workshop on Web Applications and Secure Hardware (WASH'13) focused on how secure hardware could be used to enhance web applications and web browsers to provide functionality such as credential storage, attestation and secure execution. This included challenges in compatibility (supporting the same security features despite different user hardware) as well as multi-device scenarios where a device with hardware mechanisms can help provide assurance for systems without. Also of interest were proposals to enhance existing security mechanisms and protocols, security models where the browser is not trusted by the web application, and enhancements to the browser itself

    Principles of Security and Trust

    Get PDF
    This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems
    corecore