71 research outputs found

    Functional Consistency across Retail Central Bank Digital Currency and Commercial Bank Money

    Full text link
    Central banks are actively exploring central bank digital currencies (CBDCs) by conducting research, proofs of concept and pilots. However, adoption of a retail CBDC can risk fragmenting both payments markets and retail deposits if the retail CBDC and commercial bank money do not have common operational characteristics. In this paper, we focus on a potential UK retail CBDC, the 'digital pound', and the Bank of England's 'platform model'. We first explore how the concept of functional consistency could mitigate the risk of fragmentation. We next identify the common operational characteristics that are required to achieve functional consistency across all forms of regulated retail digital money. We identify four design options based on the provision of these common operational characteristics by the central bank, payment interface providers (PIPs), technical service providers (TSPs) or a financial market infrastructure (FMI). We next identify architecturally-significant use cases and select key capabilities that support these use cases and the common operational characteristics. We evaluate the suitability of the design options to provide these key capabilities and draw insights. We conclude that no single design option could provide functional consistency across digital pounds and commercial bank money and, instead, a complete solution would need to combine the suitable design option(s) for each key capability and include common ecosystem services provided by an FMI and TSPs.Comment: 24 pages, 3 figures, 3 table

    Survey on Mobile Social Cloud Computing (MSCC)

    Get PDF
    Due to enhancement in technology the use of mobile devices increases with time. Now mobile devices (mobiles, PDA, Laptops etc.) became an essential part of mankind’s life. With the ease of Internet the popularity of Social Networking Services (SNS) among people increases. With the sharp drops in the prices, the working of mobile devices including smart phones and laptops is rising steadily. So due to this, mobile devices are now used as a provider of computing resources and services instead of requester. For this concept of Cloud Computing (CC) is merged with the mobile computing and SNS which is known as MSCC. MSCC is technology of future and it enables users/consumers to access the services in a fast and efficient manner. MSCC is the integration of three different technologies 1) Mobile Computing 2) SNS 3) Cloud Computing. Here mobile devices are (those have moments) using SNS (Both as a provider or requester) in Cloud Computing (CC) environment. In such environment, a user through mobile devices canparticipate in a social network through relationships which are based on trust. Units of the identical or alike social network can share services or data of cloud with other users of that social network without any authentication by using their mobile device as they be members of the identical social network. Various techniques are revised and improved to achieve good performance in a cloud computing network environment. In this work, there is a detailed survey of existing social cloud and mobile cloud techniques and their application areas. The comparative survey tables can be used as a guideline to select a technique suitable for different applications at hand. This survey paper reports the results of a survey of Mobile Social Cloud Computing (MSCC) regarding the importance of security of MSCC. Here we compare the works of different researcher in the field of MSCC on the basis of some essential features like security algorithm used, Qos and Fault tolerant strategy used, ease of proposed algorithm, space complexity etc. Considering all the limitations of the existing social cloud and mobile cloud techniques, an adaptive MSCC framework of Fault tolerance for future research is proposed

    Perinatal and maternal outcome in meconium stained amnioticfluid (thin and thick) at dhiraj general hospital, a rural tertiary health centre

    Get PDF
    Background: To determine the perinatal outcome of with Meconium-stained amniotic fluid (MSAF) compared with clear amniotic fluid at Dhiraj Hospital.Methods: A prospective observational study was carried out in obstetrics and gynaecology department of Dhiraj Hospital, Sumandeep Vidyapeeth from March 2021 to August 2021. All patients fulfilling inclusion and exclusion criteria as mentioned above were taken for the study. All the categorial variables were analysed independently with the help of chi square test and fisher’s exact test and all the continuous variables were analysed with independent ‘t test’.Results: Out of 500 patients selected for the present study which had inclusion criteria, 13.6% were meconium stained out of which 50 (73.5%) cases had thin meconium and 18 (26.4%) cases had thick meconium. Fetal CTG abnormalities were more common in MSAF group and were noted in 38.2% of cases which is significantly increased compared to control group with CTG abnormalities in 8.3%. The difference was significant with p value of <0.001. 32(47.0%) patients with meconium-stained amniotic fluid had normal vaginal delivery, while in control group out of 432, 360 (83.3%) delivered normally. Incidence of LSCS and assisted vaginal delivery was more in meconium-stained amniotic fluid.Conclusions: Meconium-stained amniotic fluid is associated with more frequency of operative delivery, birth asphyxia, neonatal sepsis, and neonatal intensive care unit admissions compared to clear amniotic fluid. Better perinatal outcome in clear amniotic fluid compared to meconium stained liquor

    AES Based White Box Cryptography in Digital Signature Verification

    No full text
    According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can analyze many system inputs and outputs, but is blind to the specifics of how a critical instantiation primitive is implemented. This is the focus of white-box solutions, which are designed to withstand attacks that come from the execution environment. This is significant because an attacker may obtain unrestricted access to the program&rsquo;s execution in this environment. The purpose of this article is to assess the efficiency of white-box implementations in terms of security. Our contribution is twofold: first, we explore the practical implementations of white-box approaches, and second, we analyze the theoretical foundations upon which these implementations are built. First, a research proposal is crafted that details white-box applications of DES and AES encryption algorithms. To begin, this preparation is necessary. The research effort planned for this project also includes cryptanalysis of these techniques. Once the general cryptanalysis results have been examined, the white-box design approaches will be covered. We have decided to launch an investigation into creating a theoretical model for white box, since no prior formal definitions have been offered, and suggested implementations have not been accompanied by any assurance of security. This is due to the fact that no formal definition of &ldquo;white box&rdquo; has ever been provided. In this way lies the explanation for why this is the situation. We define WBC to encompass the security requirements of WBC specified over a white box cryptography technology and a security concept by studying formal models of obfuscation and shown security. This definition is the product of extensive investigation. This state-of-the-art theoretical model provides a setting in which to investigate the security of white-box implementations, leading to a wide range of positive and negative conclusions. As a result, this paper includes the results of a Digital Signature Algorithm (DSA) study which may be put to use in the real world with signature verification. Possible future applications of White Box Cryptography (WBC) research findings are discussed in light of these purposes and areas of investigation

    Volatility in Indian Stock Markets

    No full text
    • …
    corecore