Browsing by Subject "security"
Now showing items 1-13 of 13
-
(2016-08-30)Standard encryption protocols do not allow for native searching or modification of data, without decryption. In this scenario, whoever is performing the operations on this file must also have the encryption key. Homomorphic ...
-
(2009-05-15)Cluster computing has emerged as a common approach for providing more comput- ing and data resources in industry as well as in academia. However, since cluster computer developers have paid more attention to performance ...
-
Solana has been a relatively new blockchain platform that has gained popularity due to its quick transaction times and low transaction fees. However, the focus is mainly seen in their “smart contracts” – an automatically-enforced ...
-
(Texas A&M University, 2005-02-17)Digital fingerprinting is a method by which a copyright owner can uniquely embed a buyer-dependent, inconspicuous serial number (representing the fingerprint) into every copy of digital data that is legally sold. The ...
-
Combined Safety and Security Risk Evaluation Considering Safety and Security-Type Initiating Events (2016-11-15)Destruction to critical nuclear infrastructures would have a debilitating effect on national public health safety, national economy, security, etc. For this reason, analysts perform safety risk analyses to quantify and ...
-
(2013-08-02)A covert communications network (CCN) is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on the confidentiality and anonymity of communications, ...
-
Information Theoretically Secure Enhanced Johnson Noise Based Key Distribution over the Smart Grid (2016-07-25)The imperative need for unconditionally secure key exchange is caused by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are information ...
-
(2009-05-15)This dissertation examines the interdependence between urban water distribution systems and urban fire response. The focus on interdependent critical infrastructures is driven by concern for security of water systems and ...
-
(2016-04-12)Near Field Communication (NFC) is an RFID based proximity communication technology. The extensive use of NFC technology for popular and sensitive applications such as financial transactions and content sharing necessitates ...
-
(Texas A&M University, 2006-10-30)With the rapid proliferation of wireless networks and mobile computing applications, Quality of Service (QoS) for mobile ad hoc networks (MANETs) has received increased attention. Security is a critical aspect of QoS ...
-
(2009-05-15)Wireless ad hoc and sensor networks are envisioned to be self-organizing and autonomous networks, that may be randomly deployed where no fixed infrastructure is either feasible or cost-effective. The successful commercialization ...
-
(2015-05-07)Since its first release, Android has been increasingly adopted by people and companies worldwide. It is currently estimated that around 1.1 billion Android devices are in use. Even though Android was built with Security ...
-
A new design for virtual patching applications is presented for software defined network environments. Based on OpenFlow implementation, a software defined network can be programmed to intelligently detect threats and ...