Now showing items 21-28 of 28

    • Li, Shuo (2012-07-16)
      Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a ...
    • Chen, Pu (2016-12-08)
      Split manufacturing of integrated circuits reduces vulnerabilities introduced by an untrusted foundry by manufacturing only a part of design at an untrusted high-end foundry and the remaining part at a trusted low-end ...
    • Satchidanandan, Bharadwaj (2019-07-10)
      The coming decades may see the large scale deployment of networked cyber-physical systems to address global needs in areas such as energy, water, healthcare, and transportation. However, as recent events have shown, such ...
    • Nandwani, Ankur Bharatbhushan (2012-02-14)
      Different approaches have been developed for TCP/IP fingerprinting, but none of these approaches is suited for Internet-wide fingerprinting. In this work, we develop approaches that rigorously tackle the issue of noise ...
    • Feng, Lang (2020-06-02)
      Security and computing efficiency are two important aspects in the field of computer engineering. With the increasing complexity of modern computers, various security problems are exposed. Moreover, applications continuously ...
    • Carchidi, Arielle 1990- (2012-05-03)
      In recent years, maritime piracy has received more attention from governments, the maritime industry, and the media. Increased incidents of violent attacks, particularly in the Gulf of Aden and the Red Sea, create hazards ...
    • Zhang, Yangyong (2021-07-29)
      Internet of Things (IoT) has evolved from a traditional sensor network to an increasingly cloud dependent ecosystem. This transition empowers IoT devices with abundant outsourced computational power. However, securing IoT ...
    • Mohanty, Saswat (2012-07-16)
      Voice Over IP (VoIP) systems and transmission technologies have now become the norm for many communications applications. However, whether they are used for personal communication or priority business conferences and talks, ...