Malaysia is geographically located in the center of Southeast Asia, holding the Malacca Strait, an important international waterway, and is an important node in the construction of the "Belt and Road". China and Malaysia have long maintained good economic and trade cooperation. Investment and trade are important ways of economic exchanges between the two countries. Malaysia has a favorable investment environment, and China has become the largest investor in Malaysia's manufacturing industry for six consecutive years. In terms of trade, China has become the largest trading partner of Malaysia for 14 consecutive years, the largest source of imports and the second largest export market of Malaysia. As an important investor and trade partner of China, Malaysia's research on the trade effects of direct investment in Malaysia can further promote bilateral economic cooperation and provide reference for China's investment in other countries along the "Belt and Road". Firstly, the paper defines the main concepts involved, and combs the relevant theories of trade effects of direct investment, which lays a theoretical foundation for the following research. Then, the paper analyzes the development of China's direct investment and trade in Malaysia, introduces the general situation of China's direct investment and trade in Malaysia, and preliminarily judges that China's direct investment and trade in Malaysia are promoting relations. Finally, the paper combines the status quo analysis and empirical conclusions, and puts forward relevant policy recommendations.
Public chains represented by Bitcoin and Ethereum do not require users to use their real names, and transaction data are open to the whole network. Analysed based on this, researchers have achieved the deanonymization of blockchain transactions to a certain extent. Based on the existing blockchain transaction privacy protection scheme, the true link relationship between the transaction sender and receiver is hidden, which brings difficulties to regulation. In this paper, we propose a cryptocurrency mixing service RBSmix, which allows users to reestablish their financial privacy in Bitcoin and related cryptocurrencies. RBSmix, through blind signature to prevent attackers from linking input and output addresses, by the threshold secret sharing algorithm, encryption technology, and a regulation team, combined with the idea of voting, tracks the source of funds for illegal addresses. Experiments show that the scheme scales to large numbers of users and can provide users with better privacy protection.
As the most successful cryptocurrency, bitcoin has become the primary target of attackers. The security risks existing in bitcoin network (P2P networks) may pose serious threats to itself. It has been proved that network attackers of the autonomous system level could isolate a specific set of bitcoin nodes using prefix hijacking attacks; since this attack achieves bitcoin partition by deleting all data packets of the victim node, it is easy to be discovered by the victim node, and cannot maintain a long-term connection (the partition will disappear after canceling the BGP hijacking) (Apostolaki M et al. (2017)). This paper proposes a new attack scheme—eclipse attack method based on BGP hijacking (BHE). The attack can occupy the network connection of the victim node, and only need to delete part of the TCP handshaking packets of the victim node during the attack, and it makes the attack more hidden and can occupy the network connection of the victim node for a long time. The innovation of the BHE attack is that it can control the peering decision of the victim node by controlling the victim node’s internal peer database (new table and tried table) and preventing the victim node from establishing a good connection. It enables the attacker to occupy all network connections of the victim node and become its natural network middleman. We verify the feasibility of the BHE attack through experimental evaluation and demonstrate that an attacker who can launch BGP hijacking may occupy all connections of the victim node within 20 minutes (ignoring the time of traffic diversion). To reduce the attack’s impact, the paper provides some countermeasures that can use in practice according to the basic characteristics of the attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.