RH Logo
Hubs
About
Live
Leaderboard

Most Reputable Users

Author Profile Avatar
Eric Cuellar
193
Author Profile Avatar
ayotune adebayo
2246
Author Profile Avatar
Patrick Joyce
5786
Author Profile Avatar
Emeka A. Ezewudo
2819
Author Profile Avatar
Khizar Hayat
127
Author Profile Avatar
Brian Armstrong
758
Author Profile Avatar
Shubham Jangid
112
Author Profile Avatar
Bhaiwaseem Tum
121
Author Profile Avatar
Noman Jee
108
Author Profile Avatar
shahadat hossain
135

Trending Papers in cryptography and security

Trending
Today
2
Authors: George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis
Published: Sep 2020
Authors: George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis
Published: Sep 2020
In the 4th industrial revolution era, security of multiple interconnected devices has become a critical issue. A rapidly increasing number of cybersecurity incidents emerge due to complex interconnected sensors, devices, and systems used in the Internet of Things. In this paper, we tackle the need for automation in security risk analysis and restructuring of such networks. The presented framework models the connections of assets and devices so as to depict their interdependencies on a company's business processes and effectively reduces their overall risk against cybersecurity threats. It achieves this by (1) identifying critical components and dependency structural risks, (2) prioritizing assets based on their influence on business processes and (3) proposing network restructures and asset clusters. To do that, the proposed algorithm utilizes (i) dependency risk graphs for modeling and analyzing networks dependencies, (ii) graph minimum spanning trees, and (iii) network centrality metrics. We test the implementation on a real-world company and demonstrate its effectiveness. Results show that the framework can automatically identify critical components and dependency structural risks and propose different network topologies by creating the optimum number of asset subnets, while retaining business operations. Tests show that the closeness centrality metric combined with the midpoint on extreme values calculation type works best for network asset grouping and subnetting.
Author Profile Avatar
Colin Moser
174
Published: Nov 2019
Published: Nov 2019
  • Blockchain is a popular technology for managing digital transactions in several sectors including healthcare [1], supply chain, manufacturing [2], energy [3] and finance [4]. This emerging technology has been at the core of the definition of cryptocurrencies, bitcoin [4] being generally considered as the first one.
Author Profile Avatar
ayotune adebayo
Slide 1 of 1
  • Paper Preview Page 1
12
Published: Aug 2018
Published: Aug 2018
  • Tho risk in investing can be quite volatile, the returns outweigh the potential fears
Author Profile Avatar
Shubham Jangid
Slide 1 of 1
  • Paper Preview Page 1
112
From Paper: Safeguarding the evidential value of forensic cryptocurrency investigations
Published: Mar 2020
From Paper: Safeguarding the evidential value of forensic cryptocurrency investigations
Published: Mar 2020
  • Analyzing cryptocurrency payment flows has become a key forensic method in law enforcement. • The evidential value of obtained findings in court is still largely unclear. • We discuss commonly used methods in cryptocurrency investigations in the light of internationally accepted legal standards. • Furthermore, we translate the findings into a data sharing framework to safeguard the evidential value of the findings.
Author Profile Avatar
ayotune adebayo
Slide 1 of 1
  • Paper Preview Page 1
65
From Paper: AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers
Published: Dec 2020
From Paper: AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers
Published: Dec 2020
  • This could allow an attacker to extract sensitive data on the device, even if wifi or bluetooth were disabled, from several meters away.
  • Malware on an air-gapped (disconnected from the internet) computer can generate wifi signals which allow an attacker to send data to a nearby device.
Author Profile Avatar
Brian Armstrong
3
Authors: Cohney, Shaanan, et al
Published: Dec 2020
Authors: Cohney, Shaanan, et al
Published: Dec 2020
Universities have been forced to rely on remote educational technology to facilitate the rapid shift to online learning. In doing so, they acquire new risks of security vulnerabilities and privacy violations. To help universities navigate this landscape, we develop a model that describes the actors, incentives, and risks, informed by surveying 105 educators and 10 administrators. Next, we develop a methodology for administrators to assess security and privacy risks of these products. We then conduct a privacy and security analysis of 23 popular platforms using a combination of sociological analyses of privacy policies and 129 state laws, alongside a technical assessment of platform software. Based on our findings, we develop recommendations for universities to mitigate the risks to their stakeholders.
Author Profile Avatar
khush deoja
26
From Paper: Celo: A Multi-Asset Cryptographic Protocol for Decentralized Social Payments
Published: Apr 2019
From Paper: Celo: A Multi-Asset Cryptographic Protocol for Decentralized Social Payments
Published: Apr 2019
  • 4) The PoS system uses validator groups which are elected by holders of CELO, the native governance token.
  • 3) Supports multiple stablecoins, the first being Celo Dollars (cUSD), which are stabilized using both elastic/algorithmic supply and crypto-collateralized reserves.
Author Profile Avatar
Eric Cuellar
Slide 1 of 1
  • Paper Preview Page 1
3
Authors: Michael Fleder, Michael S. Kester, Sudeep Pillai
Published: Feb 2015
Authors: Michael Fleder, Michael S. Kester, Sudeep Pillai
Published: Feb 2015
Bitcoins have recently become an increasingly popular cryptocurrency through which users trade electronically and more anonymously than via traditional electronic transfers. Bitcoin's design keeps all transactions in a public ledger. The sender and receiver for each transaction are identified only by cryptographic public-key ids. This leads to a common misconception that it inherently provides anonymous use. While Bitcoin's presumed anonymity offers new avenues for commerce, several recent studies raise user-privacy concerns. We explore the level of anonymity in the Bitcoin system. Our approach is two-fold: (i) We annotate the public transaction graph by linking bitcoin public keys to "real" people - either definitively or statistically. (ii) We run the annotated graph through our graph-analysis framework to find and summarize activity of both known and unknown users.
Retrieved from arxiv
Retrieved from arxiv
0
Authors: David Amar, Lior Zilpa
Published: Jan 2019
Authors: David Amar, Lior Zilpa
Published: Jan 2019
Blockchains have recently gained popularity thanks to their ability to record "digital truth". They are designed to keep persistence, security, and avoid attacks which is useful for many applications. However, they are still problematic in their energy consumption, governance, and scalability Current solutions either require vast computing power via Proof-of-Work (PoW) or cannot directly utilize computing power as a resource in virtual mining. Here, we propose incentive-based protocols that use competitions to integrate computing power into blockchains. We introduce Proof-of-Accumulated-Work (PoAW): miners compete in costumer-submitted jobs, accumulate recorded work whenever they are successful, and, over time, are remunerated. The underlying competition replaces the standard hash puzzle-based competitions of PoW. A competition is managed by a dynamically-created small masternode network (dTMN) of invested miners. dTMNs allow for scalability as we do not need the entire network to manage the competition. Using careful design on incentives, our system preserves security, avoids attacks, and offers new markets to miners. When there are no costumers the system converges into a standard protocol. Our proposed solution improves the way by which the blockchain infrastructure works and makes use of its computing power. We also discuss how the protocol can be used by fields that require solving difficult optimization problems, such as Artificial Intelligence and Pattern Recognition in Big Data.
Retrieved from arxiv
Retrieved from arxiv