71 research outputs found
Functional Consistency across Retail Central Bank Digital Currency and Commercial Bank Money
Central banks are actively exploring central bank digital currencies (CBDCs)
by conducting research, proofs of concept and pilots. However, adoption of a
retail CBDC can risk fragmenting both payments markets and retail deposits if
the retail CBDC and commercial bank money do not have common operational
characteristics. In this paper, we focus on a potential UK retail CBDC, the
'digital pound', and the Bank of England's 'platform model'. We first explore
how the concept of functional consistency could mitigate the risk of
fragmentation. We next identify the common operational characteristics that are
required to achieve functional consistency across all forms of regulated retail
digital money. We identify four design options based on the provision of these
common operational characteristics by the central bank, payment interface
providers (PIPs), technical service providers (TSPs) or a financial market
infrastructure (FMI). We next identify architecturally-significant use cases
and select key capabilities that support these use cases and the common
operational characteristics. We evaluate the suitability of the design options
to provide these key capabilities and draw insights. We conclude that no single
design option could provide functional consistency across digital pounds and
commercial bank money and, instead, a complete solution would need to combine
the suitable design option(s) for each key capability and include common
ecosystem services provided by an FMI and TSPs.Comment: 24 pages, 3 figures, 3 table
Survey on Mobile Social Cloud Computing (MSCC)
Due to enhancement in technology the use of mobile devices increases with time. Now mobile devices (mobiles, PDA, Laptops etc.) became an essential part of mankind’s life. With the ease of Internet the popularity of Social Networking Services (SNS) among people increases. With the sharp drops in the prices, the working of mobile devices including smart phones and laptops is rising steadily. So due to this, mobile devices are now used as a provider of computing resources and services instead of requester. For this concept of Cloud Computing (CC) is merged with the mobile computing and SNS which is known as MSCC. MSCC is technology of future and it enables users/consumers to access the services in a fast and efficient manner. MSCC is the integration of three different technologies 1) Mobile Computing 2) SNS 3) Cloud Computing. Here mobile devices are (those have moments) using SNS (Both as a provider or requester) in Cloud Computing (CC) environment. In such environment, a user through mobile devices canparticipate in a social network through relationships which are based on trust. Units of the identical or alike social network can share services or data of cloud with other users of that social network without any authentication by using their mobile device as they be members of the identical social network. Various techniques are revised and improved to achieve good performance in a cloud computing network environment. In this work, there is a detailed survey of existing social cloud and mobile cloud techniques and their application areas. The comparative survey tables can be used as a guideline to select a technique suitable for different applications at hand. This survey paper reports the results of a survey of Mobile Social Cloud Computing (MSCC) regarding the importance of security of MSCC. Here we compare the works of different researcher in the field of MSCC on the basis of some essential features like security algorithm used, Qos and Fault tolerant strategy used, ease of proposed algorithm, space complexity etc. Considering all the limitations of the existing social cloud and mobile cloud techniques, an adaptive MSCC framework of Fault tolerance for future research is proposed
Perinatal and maternal outcome in meconium stained amnioticfluid (thin and thick) at dhiraj general hospital, a rural tertiary health centre
Background: To determine the perinatal outcome of with Meconium-stained amniotic fluid (MSAF) compared with clear amniotic fluid at Dhiraj Hospital.Methods: A prospective observational study was carried out in obstetrics and gynaecology department of Dhiraj Hospital, Sumandeep Vidyapeeth from March 2021 to August 2021. All patients fulfilling inclusion and exclusion criteria as mentioned above were taken for the study. All the categorial variables were analysed independently with the help of chi square test and fisher’s exact test and all the continuous variables were analysed with independent ‘t test’.Results: Out of 500 patients selected for the present study which had inclusion criteria, 13.6% were meconium stained out of which 50 (73.5%) cases had thin meconium and 18 (26.4%) cases had thick meconium. Fetal CTG abnormalities were more common in MSAF group and were noted in 38.2% of cases which is significantly increased compared to control group with CTG abnormalities in 8.3%. The difference was significant with p value of <0.001. 32(47.0%) patients with meconium-stained amniotic fluid had normal vaginal delivery, while in control group out of 432, 360 (83.3%) delivered normally. Incidence of LSCS and assisted vaginal delivery was more in meconium-stained amniotic fluid.Conclusions: Meconium-stained amniotic fluid is associated with more frequency of operative delivery, birth asphyxia, neonatal sepsis, and neonatal intensive care unit admissions compared to clear amniotic fluid. Better perinatal outcome in clear amniotic fluid compared to meconium stained liquor
AES Based White Box Cryptography in Digital Signature Verification
According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An adversary in such a setting is aware of the method and can analyze many system inputs and outputs, but is blind to the specifics of how a critical instantiation primitive is implemented. This is the focus of white-box solutions, which are designed to withstand attacks that come from the execution environment. This is significant because an attacker may obtain unrestricted access to the program’s execution in this environment. The purpose of this article is to assess the efficiency of white-box implementations in terms of security. Our contribution is twofold: first, we explore the practical implementations of white-box approaches, and second, we analyze the theoretical foundations upon which these implementations are built. First, a research proposal is crafted that details white-box applications of DES and AES encryption algorithms. To begin, this preparation is necessary. The research effort planned for this project also includes cryptanalysis of these techniques. Once the general cryptanalysis results have been examined, the white-box design approaches will be covered. We have decided to launch an investigation into creating a theoretical model for white box, since no prior formal definitions have been offered, and suggested implementations have not been accompanied by any assurance of security. This is due to the fact that no formal definition of “white box” has ever been provided. In this way lies the explanation for why this is the situation. We define WBC to encompass the security requirements of WBC specified over a white box cryptography technology and a security concept by studying formal models of obfuscation and shown security. This definition is the product of extensive investigation. This state-of-the-art theoretical model provides a setting in which to investigate the security of white-box implementations, leading to a wide range of positive and negative conclusions. As a result, this paper includes the results of a Digital Signature Algorithm (DSA) study which may be put to use in the real world with signature verification. Possible future applications of White Box Cryptography (WBC) research findings are discussed in light of these purposes and areas of investigation
Recommended from our members
New approaches to nitrogen ligands bearing electron withdrawing groups and their role in coordination chemistry
The search for non-cyclopentadienide-type catalyst systems continues,
driven by industry’s desire to obtain even greater control over polymer properties
and extend the family of products to include new monomer combinations. At the
forefront of this search are two ligand types, diketimines and their oxygensubstituted analogs, the aminoenones. We have recently found an efficient and
clean synthetic pathway, developed in conjunction with the Los Alamos National
Laboratory, to these ligand types, utilizing novel aluminum chemistry. A variety
of dimeric alkylaminoalanes, with the general formula, [Me2AlN(H)Arf]2, that
feature aryl groups with varying degrees of fluorination, are presented. A nonfluorinated pyridine derivative that resulted in a novel pentasubstituted aluminum
species is also discussed. The use of these new aminoalane reagents for the
transformation of the ketone functionality to the imine functionality was very
viii
successful, and in most instances, led to a higher yield of a cleaner product, than
with the traditional methodology. Finally, the coordination capability of this class
of ligand was studied by the reactions with both early and late transition metals,
as well as the main group metal aluminum. Simple adducts of titanium,
vanadium, chromium, and platinum were prepared, as well as complexes of
titanium, zirconium, and aluminumChemistr
- …