Now showing items 1-5 of 5

    • An Affine Based Homomorphic Encryption Scheme 

      Loyka, Kyle (2016-08-30)
      Standard encryption protocols do not allow for native searching or modification of data, without decryption. In this scenario, whoever is performing the operations on this file must also have the encryption key. Homomorphic ...
    • Covert Communication Networks 

      Nix, Timothy Glen (2013-08-02)
      A covert communications network (CCN) is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on the confidentiality and anonymity of communications, ...
    • Information Theoretically Secure Enhanced Johnson Noise Based Key Distribution over the Smart Grid 

      Gonzalez, Elias (2016-07-25)
      The imperative need for unconditionally secure key exchange is caused by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information ...
    • Privacy with DSRC Vehicle Safety Broadcasts 

      Rumuly, Mason Christopher
      Dedicated Short Range Communications (DSRC) is an emerging technology application allowing vehicles to communicate with each other for safety improvements. The current protocol calls for open broadcast of Basic Safety ...
    • Sister Act: Understanding Sorority Women's Communication About Condom Use 

      Hernandez, Rachael A. (2011-10-21)
      Young women‘s sexual health is declining. Sorority women face an intersectionality of risk for the negative consequences of sexual activity because of college attendance, sex, and age. The influence of peer communication ...