Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Development And Analysis Of A Model For Assessing Perceived Security Threats And Characteristics Of Innovating For Wireless Networks, Mark Bradley Schmidt May 2006

Development And Analysis Of A Model For Assessing Perceived Security Threats And Characteristics Of Innovating For Wireless Networks, Mark Bradley Schmidt

Theses and Dissertations

This dissertation employed a two prong approach, whereby the survey and case study methods were used to investigate security issues regarding wireless networks. The survey portion draws together two previously unrelated research streams. Given the recent increased concern for security in the computing milieu, Innovation Diffusion Theory and security factor constructs were merged and synthesized to form a new instrument. This instrument is useful in an effort to understand what role security concerns play in the adoption and diffusion of technology. In development of the new instrument, 481 usable surveys were collected and analyzed. Factor analysis revealed favorable factor loadings …


Efficient Encryption On Limited Devices, Roderic Campbell Jan 2006

Efficient Encryption On Limited Devices, Roderic Campbell

Theses

Encryption algorithms have been used since the dawn of time to ensure secure communication over insecure communication channels. Once a secret encryption key is established and as long as the key remains secret, two parties can communicate freely over open channels. The question of how to obtain such a secret key is a large dilemma. Many methods of obtaining such keys have been tried from the most basic form of a one-on-one encounter to more advanced techniques like Diffie-Hellman. This paper compares three versions of the Diffie-Hellman key exchange protocol -- using arithmetic in the field of integers modulo a …


Security In An Ad Hoc Network Using Many-To-Many Invocation, Jefferson Tuttle Jan 2006

Security In An Ad Hoc Network Using Many-To-Many Invocation, Jefferson Tuttle

Theses

There is an increasing need to secure electronic communication. This need is being met on workstations and servers, which have large amounts of memory, and a dedicated network connection. Securing communication in mobile devices is a relatively new research area, and has different requirements than workstations and servers. This project attempts to address these new requirements by incorporating security into the Many-to-Many Invocation (M2MI) library developed at the Rochester Institute of Technology (RIT). Specifically, this project addresses adding encryption and decryption of M2MI method invocations using session keys. It also addresses the methods of establishing and maintaining session keys based …