1,548 research outputs found

    Peer-to-Peer File Sharing WebApp: Enhancing Data Security and Privacy through Peer-to-Peer File Transfer in a Web Application

    Get PDF
    Peer-to-peer (P2P) networking has emerged as a promising technology that enables distributed systems to operate in a decentralized manner. P2P networks are based on a model where each node in the network can act as both a client and a server, thereby enabling data and resource sharing without relying on centralized servers. The P2P model has gained considerable attention in recent years due to its potential to provide a scalable, fault-tolerant, and resilient architecture for various applications such as file sharing, content distribution, and social networks.In recent years, researchers have also proposed hybrid architectures that combine the benefits of both structured and unstructured P2P networks. For example, the Distributed Hash Table (DHT) is a popular hybrid architecture that provides efficient lookup and search algorithms while maintaining the flexibility and adaptability of the unstructured network.To demonstrate the feasibility of P2P systems, several prototypes have been developed, such as the BitTorrent file-sharing protocol and the Skype voice-over-IP (VoIP) service. These prototypes have demonstrated the potential of P2P systems for large-scale applications and have paved the way for the development of new P2P-based systems

    PROPOSED LIGHTWEIGHT PROTOCOL FOR IOT AUTHENTICATION

    Get PDF
    The Internet of Things (IoT) alludes to interestingly identifiable items (things) which can communicate with differentquestions through the worldwide framework of remote/wired Internet. The correspondence system among an expansive number of assetobliged gadgets that produce substantial volumes of information affects the security and protection of the included items. In thispaper, we propose a lightweight protocol for IoT authentication which based on two algorithms LA1 and RA1 which is used forauthentication and generating session key that is used for encryption

    Blockchain-based Governance, Risk Management, and Compliance for Fractional Ownership: Design and Implementation of A Decentralized Autonomous Agent System

    Get PDF
    Fractional ownership makes homeownership more affordable. But there are challenges in a fractional ownership real estate transaction (FORET) regarding governance, risk management and compliance (GRC) processes. Centralized GRC solutions are less effective in managing the tiered structure of communications in a FORET, which can lead to principal-agent problems such as information asymmetry, risk aversion, and moral hazard. In this research we investigate how these principal-agent problems in FORET could be mitigated. Using an agency theory perspective, we adopt a design science multimethodological research approach. We propose conceptual and system artefacts to support the design and implementation of a decentralized autonomous agent system. These artefacts deliver a formal problem representation structure related to centralized GRC in fractional ownership. We illustrate our solution with a system prototype and implementation. We evaluate the research outputs and compare them with existing GRC systems. This paper contributes to the understanding of GRC in supporting fractional ownership decision making

    LT10 A LIGHTWEIGHT PROPOSED ENCRYPTION ALGORITHM FOR IOT

    Get PDF
    In this paper, algorithm (LT10) which is originally consist of four kasumi elements is proposed as a lightweight encryption algorithm, the proposed algorithm take into account that the IOT devices have a limit computation abilities and the sensitivity of smart homes and IOT network information that need to be exchanged the key length is 128 bit and the block length is 128 bi

    Synergizing Roadway Infrastructure Investment with Digital Infrastructure for Infrastructure-Based Connected Vehicle Applications: Review of Current Status and Future Directions

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The safety, mobility, environmental and economic benefits of Connected and Autonomous Vehicles (CAVs) are potentially dramatic. However, realization of these benefits largely hinges on the timely upgrading of the existing transportation system. CAVs must be enabled to send and receive data to and from other vehicles and drivers (V2V communication) and to and from infrastructure (V2I communication). Further, infrastructure and the transportation agencies that manage it must be able to collect, process, distribute and archive these data quickly, reliably, and securely. This paper focuses on current digital roadway infrastructure initiatives and highlights the importance of including digital infrastructure investment alongside more traditional infrastructure investment to keep up with the auto industry's push towards this real time communication and data processing capability. Agencies responsible for transportation infrastructure construction and management must collaborate, establishing national and international platforms to guide the planning, deployment and management of digital infrastructure in their jurisdictions. This will help create standardized interoperable national and international systems so that CAV technology is not deployed in a haphazard and uncoordinated manner

    Toward a scientific approach to identifying and understanding indicators of radicalization and terrorist intent: Eight key problems

    Get PDF
    Comments on the original articles by Meloy, Roshdi, Glaz-Ocik, & Hoffmann (see record 2016-18836-002), by Böckler, Hoffmann, & Zick (see record 2016-18836-003), by Meloy, Habermeyer, & Guldimann (see record 2016-18836-004), and by Van Der Meer (see record 2016-18836-005). Collectively, the articles contained in this issue offer a lot of interesting and insightful material on radicalization/violence indicators and the validity of the Terrorist Radicalization Assessment Protocol–18 (TRAP-18). They do this through testing the tool against a medium-sized sample of 22 cases (Meloy, Roshdi, Glaz-Ocik, & Hoffmann, 2015), and individual case studies ranging from the very famous (Breivik in the work of Meloy, Habermeyer, & Guldimann, 2015), to the not so famous (“U” in the work of Böckler, Hoffmann, & Zick, 2015), to the barely remembered (Lucheni in the work of Van Der Meer, 2015). They make important methodological contributions (discussions surrounding intercoder reliability) and substantive contributions in terms of new data generation and providing granular level detail on a couple of largely overlooked and unstudied cases. The results illustrate that time and again, various distal and proximal indicators built into the TRAP-18 were apparent. However, in a very short space of time, the empirical study of terrorist behavior has made some large steps with multiple data-driven, methodologically rich projects producing a lot of insight. The literature is finally at a point at which data access is not as much of a problem as it was previously. The next big challenges are essentially conceptual, and hopefully this commentary can work toward synthesizing and standardizing approaches across these multiple data-driven endeavors. To progress, we need to think more carefully about base rates, protective factors, weighting/clustering risk factors, thinking about the “terrorist” in a more nuanced way, and taking temporality into account

    Globalisation and the reform of European social models

    Get PDF
    This Policy Contribution by André Sapir was presented to the ECOFIN informal meeting in Manchester. See also the Policy Brief based on this paper.

    Malware Propagation Modelling in Peer-to-Peer Networks: A Review

    Get PDF
    yesPeer-to-Peer (P2P) network is increasingly becoming the most important means of trading content throughout the last years due to the constant evolvement of the cyber world. This popularity made the P2P network susceptible to the spread of malware. The detection of the cause of malware propagation is now critical to the survival of P2P networks. This paper offers a review of the current relevant mathematical propagation models that have been proposed to date to predict the propagation behavior of a malware in a P2P network. We analyzed the models proposed by researchers and experts in the field by evaluating their limitations and a possible alternative for improving the analysis of the expected behavior of a malware spread
    • 

    corecore