Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters










Database
Language
Publication year range
1.
Sensors (Basel) ; 23(13)2023 Jun 29.
Article in English | MEDLINE | ID: mdl-37447883

ABSTRACT

Blockchain has become a well-known, secured, decentralized datastore in many domains, including medical, industrial, and especially the financial field. However, to meet the requirements of different fields, platforms that are built on blockchain technology must provide functions and characteristics with a wide variety of options. Although they may share similar technology at the fundamental level, the differences among them make data or transaction exchange challenging. Cross-chain transactions have become a commonly utilized function, while at the same time, some have pointed out its security loopholes. It is evident that a secure transaction scheme is desperately needed. However, what about those nodes that do not behave? It is clear that not only a secure transaction scheme is necessary, but also a system that can gradually eliminate malicious players is of dire need. At the same time, integrating different blockchain systems can be difficult due to their independent architectures, and cross-chain transactions can be at risk if malicious attackers try to control the nodes in the cross-chain system. In this paper, we propose a dynamic reputation management scheme based on the past transaction behaviors of nodes. These behaviors serve as the basis for evaluating a node's reputation to support the decision on malicious behavior and enable the system to intercept it in a timely manner. Furthermore, to establish a reputation index with high precision and flexibility, we integrate Particle Swarm Optimization (PSO) into our proposed scheme. This allows our system to meet the needs of a wide variety of blockchain platforms. Overall, the article highlights the importance of securing cross-chain transactions and proposes a method to prevent misbehavior by evaluating and managing node reputation.


Subject(s)
Blockchain , Trust , Industry , Nonoxynol , Technology
2.
Infect Control Hosp Epidemiol ; 42(10): 1275-1278, 2021 10.
Article in English | MEDLINE | ID: mdl-33551004

ABSTRACT

We sought to determine whether combined chemical, mechanical, and heat cleaning was superior to standard cleaning for the decontamination of 32 sink and shower drains harboring carbapenemase-producing organisms (CPOs). Of 16 intervention drains, 10 (63%) were decontaminated until day 7 versus 1 (5%) of 16 comparator drains (P = .002). Intensive cleaning may be useful if administered repeatedly in drain-associated CPO outbreaks.


Subject(s)
Decontamination , Hot Temperature , Water Supply , Bacterial Proteins , Decontamination/methods , Hospitals , Random Allocation , beta-Lactamases
3.
Sensors (Basel) ; 17(5)2017 May 01.
Article in English | MEDLINE | ID: mdl-28468313

ABSTRACT

Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT) architecture, ubiquitously providing intelligence and convenience to our daily life. In IoT-based network environments, smart objects are embedded everywhere as ubiquitous things connected in a pervasive manner. Ensuring security for interactions between these smart things is significantly more important, and a topic of ongoing interest. In this paper, we present a certificateless signature scheme for smart objects in IoT-based pervasive computing environments. We evaluate the utility of the proposed scheme in IoT-oriented testbeds, i.e., Arduino Uno and Raspberry PI 2. Experiment results present the practicability of the proposed scheme. Moreover, we revisit the scheme of Wang et al. (2015) and revealed that a malicious super type I adversary can easily forge a legitimate signature to cheat any receiver as he/she wishes in the scheme. The superiority of the proposed certificateless signature scheme over relevant studies is demonstrated in terms of the summarized security and performance comparisons.

SELECTION OF CITATIONS
SEARCH DETAIL
...