Search results
1 – 10 of 351The purpose of this study is to provide context for understanding why encryption is important and provide some examples of applications designed to make it easier than ever to…
Abstract
Purpose
The purpose of this study is to provide context for understanding why encryption is important and provide some examples of applications designed to make it easier than ever to control who has access to the information transmitted by the technology used.
Design/methodology/approach
This paper provides an overview of the topic.
Findings
It is important for libraries to take an active role in understanding the encryption technology being provided to their patrons and used by their staff. It can be easily assumed that information held by these technologies is secure in ways that it is not.
Originality/value
Information that is transmitted online is almost always done so in a way that can be easily intercepted. The easiest way to keep it secure is not to avoid having it be intercepted, but to encrypt it so that it is unintelligible when it is intercepted.
The use of mobile messaging (MM) or mobile instant messaging has grown in the past few years at astonishing rates.
Abstract
Purpose
The use of mobile messaging (MM) or mobile instant messaging has grown in the past few years at astonishing rates.
Design/methodology/approach
This growth has prompted data gatherers and trend forecasters to look at the use of MM apps in different ways than in the past.
Findings
In a 2015 survey, The Pew Research Center asked about the use of MM apps separately from cell phone texting for the first time (Duggan, 2015).
Originality/value
Digital marketing site eMarketer.com published their first ever worldwide forecast for MM in 2015. This forecast report shows 1.4 billion current users of MM apps or 5 per cent of smartphone users accessing an MM app at least once a month. This is a 31.6 per cent increase from the previous year. The forecast predicts that by 2018, there will be two billion users, representing 80 per cent of smartphone users (eMarketer.com, 2015).
Details
Keywords
Mahdi Ghaemi Asl, Muhammad Mahdi Rashidi and Seyed Ali Hosseini Ebrahim Abad
The purpose of this study is to investigate the correlation between the price return of leading cryptocurrencies, including Bitcoin, Ethereum, Ripple, Litecoin, Monero, Stellar…
Abstract
Purpose
The purpose of this study is to investigate the correlation between the price return of leading cryptocurrencies, including Bitcoin, Ethereum, Ripple, Litecoin, Monero, Stellar, Peercoin and Dash, and stock return of technology companies' indices that mainly operate on the blockchain platform and provide financial services, including alternative finance, democratized banking, future payments and digital communities.
Design/methodology/approach
This study employs a Bayesian asymmetric dynamic conditional correlation multivariate Generalized Autoregressive Conditional Heteroskedasticity (GARCH) (BADCC-MGARCH) model with skewness and heavy tails on daily sample ranging from August 11, 2015, to February 10, 2020, to investigate the dynamic correlation between price return of several cryptocurrencies and stock return of the technology companies' indices that mainly operate on the blockchain platform. Data are collected from multiple sources. For parameter estimation and model comparison, the Markov chain Monte Carlo (MCMC) algorithm is employed. Besides, based on the expected Akaike information criterion (EAIC), Bayesian information criterion (BIC), deviance information criterion (DIC) and weighted Deviance Information Criterion (wDIC), the skewed-multivariate Generalized Error Distribution (mvGED) is selected as an optimal distribution for errors. Finally, some other tests are carried out to check the robustness of the results.
Findings
The study results indicate that blockchain-based technology companies' indices' return and price return of cryptocurrencies are positively correlated for most of the sampling period. Besides, the return price of newly invented and more advanced cryptocurrencies with unique characteristics, including Monero, Ripple, Dash, Stellar and Peercoin, positively correlates with the return of stock indices of blockchain-based technology companies for more than 93% of sampling days. The results are also robust to various sensitivity analyses.
Research limitations/implications
The positive correlation between the price return of cryptocurrencies and the return of stock indices of blockchain-based technology companies can be due to the investors' sentiments toward blockchain technology as both cryptocurrencies and these companies are based on blockchain technology. It could also be due to the applicability of cryptocurrencies for these companies, as the price return of more advanced and capable cryptocurrencies with unique features has a positive correlation with the return of stock indices of blockchain-based technology companies for more days compared to the other cryptocurrencies, like Bitcoin, Litecoin and Ethereum, that may be regarded more as speculative assets.
Practical implications
The study results may show the positive role of cryptocurrencies in improving and developing technology companies that mainly operate on the blockchain platform and provide financial services and vice versa, suggesting that managers and regulators should pay more attention to the usefulness of cryptocurrencies and blockchains. This study also has important risk management and diversification implications for investors and companies investing in cryptocurrencies and these companies' stock. Besides, blockchain-based technology companies can add cryptocurrencies to their portfolio as hedgers or diversifiers based on their strategy.
Originality/value
This is the first study analyzing the connection between leading cryptocurrencies and technology companies that mainly operate on the blockchain platform and provide financial services by employing the Bayesian ssymmetric DCC-MGARCH model. The results also have important implications for investors, companies, regulators and researchers for future studies.
Details
Keywords
Krishna Prakasha, Balachandra Muniyal and Vasundhara Acharya
The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions…
Abstract
Purpose
The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism.
Design/methodology/approach
One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm.
Findings
The time consumed for the proposed research work shows that it is practical and acceptable.
Originality/value
The proposed research work is an efficient and enhanced user authentication mechanism.
Details
Keywords
Technology firms warn that building such a ‘backdoor’ would weaken encryption and security for all users and erode privacy.
Details
DOI: 10.1108/OXAN-DB253293
ISSN: 2633-304X
Keywords
Geographic
Topical
This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor…
Abstract
Purpose
This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor networks (WSNs). Presently, securing data aggregation is an important research issue in WSNs due to two facts: sensor nodes deployed in the sensitive and open environment are easily targeted by adversaries, and the leakage of aggregated data causes damage in the networks, and these data cannot be retrieved in a short span of time. Most of the traditional cryptographic algorithms provide security for data aggregation, but they do not reduce energy consumption.
Design/methodology/approach
Nowadays, the homomorphic cryptosystem is used widely to provide security with low energy consumption, as the aggregation is performed on the ciphertext without decryption at the cluster head. In the present paper, the Paillier additive homomorphic cryptosystem and Boneh et al.’s aggregate signature method are used to encrypt and to verify aggregate data at the base station.
Findings
The combination of the two algorithms reduces computation time and energy consumption when compared with the state-of-the-art techniques.
Practical implications
The secured data aggregation is useful in health-related applications, military applications, etc.
Originality/value
The new combination of encryption and signature methods provides confidentiality and integrity. In addition, it consumes less computation time and energy consumption than existing methods.
Details
Keywords
A.B. Feroz Khan and Anandharaj G
The purpose of the paper is to analyze the layer wise security issues in IoT and to obtain the effective security mechanism for jamming attack .
Abstract
Purpose
The purpose of the paper is to analyze the layer wise security issues in IoT and to obtain the effective security mechanism for jamming attack .
Design/methodology/approach
In this study, the authors proposed a multi layer security approach for the detection of DDoS in IoT environment, which protects the smart devices from DDoS, this scheme also reduces the computational cost in the network under mobility condition.
Findings
Even though many works have been done for the security of wireless sensor network (WSN), all works have focused on encryption which depends on the key management strategy. In this study, the authors proposed a multilayer approach to analyze the layer wise security issues and also proposed a threshold-based countermeasure (TBC) for replay attack in each layer.
Originality/value
The results indicate that the proposed algorithm lowers the computational costs and energy consumption than in modern schemes. Also, the proposed research work improves the scalability of sensor networks using the TBC.
Details