Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (20)
- Air Force Institute of Technology (6)
- California Polytechnic State University, San Luis Obispo (6)
- Western University (6)
- Singapore Management University (4)
-
- University of Nevada, Las Vegas (4)
- SelectedWorks (3)
- University of Kentucky (3)
- University of Tennessee, Knoxville (3)
- Boise State University (2)
- Georgia Southern University (2)
- Purdue University (2)
- Technological University Dublin (2)
- The University of Maine (2)
- University of Nebraska - Lincoln (2)
- University of Pennsylvania Carey Law School (2)
- Bentley University (1)
- East Tennessee State University (1)
- Liberty University (1)
- Marshall University (1)
- Pace University (1)
- Population Council (1)
- Portland State University (1)
- University of Alabama in Huntsville (1)
- University of Massachusetts Amherst (1)
- University of North Florida (1)
- Keyword
-
- Bayesian Networks (3)
- Computer science (3)
- Data Center Efficiency (3)
- Directional Antennas (3)
- Performance of Wireless Networks (3)
-
- SMART GRID (3)
- Security (3)
- Bayesian networks (2)
- Belief propagation (2)
- Binary-coded decimal system (2)
- COLLECTOR (2)
- CUDA (2)
- Cloud Computing (2)
- Computer architecture (2)
- ELECTRICAL WITH SOLAR ENERGY (2)
- ETD (2)
- GPUs (2)
- Hardware Description Language (2)
- Information systems (2)
- Junction Trees (2)
- Junction trees (2)
- Knowledge,Proximity,Innovation and Learning (2)
- Machine Learning (2)
- Networks on a chip (2)
- Parallel Computing (2)
- Parallel computing (2)
- Routing (2)
- Wireless Networks (2)
- Wireless sensor network (2)
- 3-D Shape Measurement (1)
- Publication
-
- Electronic Thesis and Dissertation Repository (6)
- Electronic Theses and Dissertations (5)
- Theses and Dissertations (5)
- Hong-Ning Dai (4)
- Radhey Shyam Meena (4)
-
- Research Collection School Of Computing and Information Systems (4)
- Computer Engineering (3)
- Heather M Brotherton (3)
- Masters Theses (3)
- Ole J Mengshoel (3)
- Theses and Dissertations--Electrical and Computer Engineering (3)
- All Faculty Scholarship (2)
- Dr Deogratias Harorimana (2)
- Master's Theses (2)
- The Summer Undergraduate Research Fellowship (SURF) Symposium (2)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (2)
- 2013 (1)
- AFIT Patents (1)
- Boise State University Theses and Dissertations (1)
- College of Engineering: Graduate Celebration Programs (1)
- Computer Science Graduate Projects and Theses (1)
- Computer Science and Software Engineering (1)
- Computer Sciences and Electrical Engineering Faculty Research (1)
- Conference Papers (1)
- Department of Anthropology: Faculty Publications (1)
- Dissertations and Theses (1)
- Electrical & Computer Engineering Faculty Research (1)
- Emmanouil Alexander Zografakis EZ (1)
- Information Technology Services: Publications (1)
- Masters (1)
- Publication Type
- File Type
Articles 1 - 30 of 79
Full-Text Articles in Computer Engineering
Using Software-Based Decision Procedures To Control Instruction-Level Execution, William B. Kimball
Using Software-Based Decision Procedures To Control Instruction-Level Execution, William B. Kimball
AFIT Patents
An apparatus, method and program product are provided for securing a computer system. A digital signature of an application is checked, which is loaded into a memory of the computer system configured to contain memory pages. In response to finding a valid digital signature, memory pages containing instructions of the application are set as executable and memory pages other than those containing instructions of the application are set as non-executable. Instructions in executable memory pages are executed. Instructions in non-executable memory pages are prevented from being executed. A page fault is generated in response to an attempt to execute an …
On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar
On The Interoperability Of Programming Languages Based On The Fork-Join Parallelism Model, Sushek Shekar
Electronic Thesis and Dissertation Repository
This thesis describes the implementation of MetaFork, a meta-language for concurrency platforms targeting multicore architectures. First of all, MetaFork is a multithreaded language based on the fork-join model of concurrency: it allows the programmer to express parallel algorithms assuming that tasks are dynamically scheduled at run-time. While MetaFork makes no assumption about the run-time system, it formally defines the serial C-elision of a MetaFork program. In addition, MetaFork is a suite of source-to-source compilers permitting the automatic translation of multithreaded programs between programming languages based on the fork-join model. Currently, this compilation framework supports the OpenMP and CilkPlus concurrency platforms. …
Tascked: The Sanity Promoting Task Manager, Jake Tobin
Tascked: The Sanity Promoting Task Manager, Jake Tobin
Computer Science and Software Engineering
Personal task managers or various forms of to-do lists are abundant in our modern computing age. With the explosion of mobile computing technology, it is easier than ever to take notes digitally and make the data seemingly instantly available anywhere on the Internet. There is a fairly well defined core set of features in personal task managers available for public consumption, but it seems nothing that is publicly available provides feedback to the user or suggestions based on user history. Tascked is a task management solution, which records user history and solicits user feedback on progress. This allows the system …
Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow
Adaptive Computer‐Generated Forces For Simulator‐Based Training, Expert Systems With Applications, Teck-Hou Teng, Ah-Hwee Tan, Loo-Nin Teow
Research Collection School Of Computing and Information Systems
Simulator-based training is in constant pursuit of increasing level of realism. The transition from doctrine-driven computer-generated forces (CGF) to adaptive CGF represents one such effort. The use of doctrine-driven CGF is fraught with challenges such as modeling of complex expert knowledge and adapting to the trainees’ progress in real time. Therefore, this paper reports on how the use of adaptive CGF can overcome these challenges. Using a self-organizing neural network to implement the adaptive CGF, air combat maneuvering strategies are learned incrementally and generalized in real time. The state space and action space are extracted from the same hierarchical doctrine …
On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu
On High-Performance Parallel Fixed-Point Decimal Multiplier Designs, Ming Zhu
UNLV Theses, Dissertations, Professional Papers, and Capstones
High-performance, area-efficient hardware implementation of decimal multiplication is preferred to slow software simulations in a number of key scientific and financial application areas, where errors caused by converting decimal numbers into their approximate binary representations are not acceptable.
Multi-digit parallel decimal multipliers involve two major stages: (i) the partial product generation (PPG) stage, where decimal partial products are determined by selecting the right versions of the pre-computed multiples of the multiplicand, followed by (ii) the partial product accumulation (PPA) stage, where all the partial products are shifted and then added together to obtain the final multiplication product. In this thesis, …
A Privacy-Aware Distributed Storage And Replication Middleware For Heterogeneous Computing Platform, Jilong Liao
A Privacy-Aware Distributed Storage And Replication Middleware For Heterogeneous Computing Platform, Jilong Liao
Masters Theses
Cloud computing is an emerging research area that has drawn considerable interest in recent years. However, the current infrastructure raises significant concerns about how to protect users' privacy, in part due to that users are storing their data in the cloud vendors' servers. In this paper, we address this challenge by proposing and implementing a novel middleware, called Uno, which separates the storage of physical data and their associated metadata. In our design, users' physical data are stored locally on those devices under a user's full control, while their metadata can be uploaded to the commercial cloud. To ensure the …
Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman
Efficient Arithmetic For The Implementation Of Elliptic Curve Cryptography, Ebrahim Abdulrahman Hasan Abdulrahman
Electronic Thesis and Dissertation Repository
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-system. Cryptographic mechanisms based on elliptic curves depend on the arithmetic of points on the curve. The most important arithmetic is multiplying a point on the curve by an integer. This operation is known as elliptic curve scalar (or point) multiplication operation. A cryptographic device is supposed to perform this operation efficiently and securely. The elliptic curve scalar multiplication operation is performed by combining the elliptic curve point routines that are defined in terms of the underlying finite field arithmetic operations. This thesis focuses on hardware …
Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson
Vehicular Motion Sensor: Developing A Wide-Range Motion Sensing Alarm System, Joshua Isaacson
Senior Honors Theses
Vehicular safety has become a serious concern in recent years. Many drivers have difficulty backing out of parking spaces, especially when large trucks and sport utility vehicles block the peripheral view from smaller vehicles. This can lead to accidents and pedestrian injuries when drivers are unable to see or do not pay careful attention to their surroundings.
Vehicular motion sensor systems can alert drivers of approaching obstacles when attempting to back out of parking spaces with limited visibility. This thesis aims to explain the limitations of current systems and the research conducted by the author to develop a prototype for …
Energy Overhead Of The Graphical User Interface In Server Operating Systems, Heather Brotherton, J. Eric Dietz, John Mcgrory, Fred Mtenzi
Energy Overhead Of The Graphical User Interface In Server Operating Systems, Heather Brotherton, J. Eric Dietz, John Mcgrory, Fred Mtenzi
Heather M Brotherton
Evidence of graphical user interface server operating system energy overhead is presented. It is posed that data centers would have substantial energy savings by eliminating graphical user interface operating systems.
D-Tunes: Configuration Engine For Geo-Replicated Cloud Storage, Jiawei Wang, Sanjay Rao
D-Tunes: Configuration Engine For Geo-Replicated Cloud Storage, Jiawei Wang, Sanjay Rao
The Summer Undergraduate Research Fellowship (SURF) Symposium
When developing a web-based application, developers are facing stringent requirements to balance the latency, scalability and availability for their cloud database. Application developers need a specific replication configuration strategy based on the requirement of their application. To deal with this problem, some geo-replicated cloud strategy systems have emerged recently, like Cassandra. This project serves to design a web tool that can help configure the best replication strategies for geo-distributed data stores, which uses quorum-based protocols. Currently, our web tool D-Tunes, require a minimum input from users and generate specific scripts based on the inputs user provided. The program running these …
Open Cortex-M0™ Modular Debug Unit, Chuan Yean Tan, Matthew Swabey
Open Cortex-M0™ Modular Debug Unit, Chuan Yean Tan, Matthew Swabey
The Summer Undergraduate Research Fellowship (SURF) Symposium
The debug unit of a modern digital system on chip (SoC) is a critical unit that allows users to monitor and analyze the chip’s activity that occurs throughout a SoC design. Selection of the debug unit’s correct feature set and architecture are critical to the success of the design. Debugging systems that exist have different architectures and are closely coupled to their host SoCs. As a consequence they are resource intensive to improve on due to the different nature of each SoC designs. Moreover, the bus protocols that allow the debug unit to interact with the SoC design are often …
Clustering Algorithms For Maximizing The Lifetime Of Wireless Sensor Networks With Energy-Harvesting Sensors, Pengfei Zhang, Gaoxi Xiao, Hwee-Pink Tan
Clustering Algorithms For Maximizing The Lifetime Of Wireless Sensor Networks With Energy-Harvesting Sensors, Pengfei Zhang, Gaoxi Xiao, Hwee-Pink Tan
Research Collection School Of Computing and Information Systems
Motivated by recent developments in wireless sensor networks (WSNs), we present several efficient clustering algorithms for maximizing the lifetime of WSNs, i.e., the duration till a certain percentage of the nodes die. Specifically, an optimization algorithm is proposed for maximizing the lifetime of a single-cluster network, followed by an extension to handle multi-cluster networks. Then we study the joint problem of prolonging network lifetime by introducing energy-harvesting (EH) nodes. An algorithm is proposed for maximizing the network lifetime where EH nodes serve as dedicated relay nodes for cluster heads (CHs). Theoretical analysis and extensive simulation results show that the proposed …
An Experimental Study For Inter-User Interference Mitigation In Wireless Body Sensor Networks, Bin Cao, Yu Ge, Chee Wee Kim, Gang Feng, Hwee-Pink Tan, Yun Li
An Experimental Study For Inter-User Interference Mitigation In Wireless Body Sensor Networks, Bin Cao, Yu Ge, Chee Wee Kim, Gang Feng, Hwee-Pink Tan, Yun Li
Research Collection School Of Computing and Information Systems
Inter-user interference degrades the reliability of data delivery in wireless body sensor networks (WBSNs) in dense deployments when multiple users wearing WBSNs are in close proximity to one another. The impact of such interference in realistic WBSN systems is significant but is not well explored. To this end, we investigate and analyze the impact of inter-user interference on packet delivery ratio (PDR) and throughput. We conduct extensive experiments based on the TelosB WBSN platform, considering unslotted carrier sense multiple access (CSMA) with collision avoidance (CA) and slotted CSMA/CA modes in IEEE 802.15.4 MAC, respectively. In order to mitigate interuser interference, …
Rapport: Semantic-Sensitive Namespace Management In Large-Scale File Systems, Yu Hua, Hong Jiang, Yifeng Zhu, Dan Feng
Rapport: Semantic-Sensitive Namespace Management In Large-Scale File Systems, Yu Hua, Hong Jiang, Yifeng Zhu, Dan Feng
Yifeng Zhu
Explosive growth in volume and complexity of data exacerbates the key challenge to effectively and efficiently manage data in a way that fundamentally improves the ease and efficacy of their use. Existing large-scale file systems rely on hierarchically structured namespace that leads to severe performance bottlenecks and renders it impossible to support real-time queries on multi-dimensional attributes. This paper proposes a novel semantic-sensitive scheme, called Rapport, to provide dynamic and adaptive namespace management and support complex queries. The basic idea is to build files’ namespace by utilizing their semantic correlation and exploiting dynamic evolution of attributes to support namespace management. …
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Collaborative Policy-Based Autonomic Management In Iaas Clouds, Omid Mola
Electronic Thesis and Dissertation Repository
With the increasing number of "machines" (either virtual or physical) in a computing environment, it is becoming harder to monitor and manage these resources. Relying on human administrators, even with tools, is expensive and the growing complexity makes management even harder. The alternative is to look for automated approaches that can monitor and manage computing resources in real time with no human intervention. One of the approaches to this problem is policy-based autonomic management. However, in large systems having one single autonomic manager to manage everything is almost impossible. Therefore, multiple autonomic managers will be needed and these will need …
Evaluating The Presence Of A Victim Cache On An Arm Processor, Lakshmi Vidya Peri
Evaluating The Presence Of A Victim Cache On An Arm Processor, Lakshmi Vidya Peri
Computer Science Graduate Projects and Theses
Mobile processor is a CPU designed to save power. It is found in mobile computers and cell phones. A CPU chip, designed for portable computers, is typically housed in a smaller chip package, but more importantly, in order to run cooler, it uses lower voltages than its desktop counterpart and has more "sleep mode" capability. A mobile processor can be throttled down to different power levels and/or sections of the chip can be turned off entirely when not in use. ARM is a 32-bit reduced instruction set computer (RISC) instruction set architecture (ISA). The relative simplicity of ARM processors makes …
The Mayaarch3d Project: A 3d Webgis For Analyzing Ancient Architecture And Landscapes, Jennifer Von Schwerin, Heather Richards-Rissetto, Fabio Remondino, Giorgio Agugario, Gabrio Girardi
The Mayaarch3d Project: A 3d Webgis For Analyzing Ancient Architecture And Landscapes, Jennifer Von Schwerin, Heather Richards-Rissetto, Fabio Remondino, Giorgio Agugario, Gabrio Girardi
Department of Anthropology: Faculty Publications
There is a need in the humanities for a 3D WebGIS with analytical tools that allow researchers to analyze 3D models linked to spatially referenced data. Geographic Information Systems (GIS) allow for complex spatial analysis of 2.5D data. For example, they offer bird’s eye views of landscapes with extruded building footprints, but one cannot ‘get on the ground’ and interact with true 3D models from a pedestrian perspective. Meanwhile, 3D models and virtual environments visualize data in 3D space, but analytical tools are simple rotation or lighting effects. The MayaArch3D Project is developing a 3D WebGIS—called QueryArch3D—to allow these two …
A Free Exchange E-Marketplace For Digital Services, Wafa M. I. Ghonaim
A Free Exchange E-Marketplace For Digital Services, Wafa M. I. Ghonaim
Electronic Thesis and Dissertation Repository
The digital era is witnessing a remarkable evolution of digital services. While the prospects are countless, the e-marketplaces of digital services are encountering inherent game-theoretic and computational challenges that restrict the rational choices of bidders. Our work examines the limited bidding scope and the inefficiencies of present exchange e-marketplaces. To meet challenges, a free exchange e-marketplace is proposed that follows the free market economy. The free exchange model includes a new bidding language and a double auction mechanism. The rule-based bidding language enables the flexible expression of preferences and strategic conduct. The bidding message holds the attribute-valuations and bidding rules …
Innovation And Learning Through Knowledge Gatekeepers:A Critical Examination Of The Relationship Betweentrust, Openness, And The Use Of Gatekeepers, Deogratias Harorimana Dr
Innovation And Learning Through Knowledge Gatekeepers:A Critical Examination Of The Relationship Betweentrust, Openness, And The Use Of Gatekeepers, Deogratias Harorimana Dr
Dr Deogratias Harorimana
The term ‘gatekeeper’ is widely used to represent a class of those who collect information, knowledge and contextualise this before they can share with the rest of the members of the organisation knowledge networks-both formal and informal organisations. In this study, it was found:
1 that there is a strong relationship between the openness of a given firm, as regards its knowledge sharing culture and level trust, and that firm’s use of knowledge gatekeepers
2 that the stage of a given firm’s growth corresponds to its strategic use of different types of gatekeeping.
In early and decline (renewal) stages, for …
A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins
A Secure Reconfigurable System-On-Programmable-Chip Computer System, William Herbert Collins
Masters Theses
A System-on-Programmable-Chip (SoPC) architecture is designed to meet two goals: to provide a role-based secure computing environment and to allow for user reconfiguration. To accomplish this, a secure root of trust is derived from a fixed architectural subsystem, known as the Security Controller. It additionally provides a dynamically configurable single point of access between applications developed by users and the objects those applications use. The platform provides a model for secrecy such that physical recovery of any one component in isolation does not compromise the system. Dual-factor authentication is used to verify users. A model is also provided for tamper …
High-Performance, Scalable Optical Network-On-Chip Architectures, Xianfang Tan
High-Performance, Scalable Optical Network-On-Chip Architectures, Xianfang Tan
UNLV Theses, Dissertations, Professional Papers, and Capstones
The rapid advance of technology enables a large number of processing cores to be integrated into a single chip which is called a Chip Multiprocessor (CMP) or a Multiprocessor System-on-Chip (MPSoC) design. The on-chip interconnection network, which is the communication infrastructure for these processing cores, plays a central role in a many-core system. With the continuously increasing complexity of many-core systems, traditional metallic wired electronic networks-on-chip (NoC) became a bottleneck because of the unbearable latency in data transmission and extremely high energy consumption on chip. Optical networks-on-chip (ONoC) has been proposed as a promising alternative paradigm for electronic NoC with …
A Systematic Approach To Verify An Embedded Capacitive Touchscreen System, Jeffrey Lee Richardson
A Systematic Approach To Verify An Embedded Capacitive Touchscreen System, Jeffrey Lee Richardson
Boise State University Theses and Dissertations
The conspicuously massive growth in the number of products utilizing capacitive touchscreen technology has raised awareness of the technology. The embedded system used to detect and report finger touches to the host is fairly complex and difficult to verify. An automated verification system is required to systematically test this type of system in a reasonable amount of time. This thesis describes the framework for an automated verification system for embedded capacitive touchscreen systems. The framework includes a Cartesian desktop robot, test instruments, communications bridge, and custom-built test management software. The criteria for selecting a Cartesian desktop robot rather than a …
Optimizing Parallel Belief Propagation In Junction Trees Using Regression, Lu Zheng, Ole J. Mengshoel
Optimizing Parallel Belief Propagation In Junction Trees Using Regression, Lu Zheng, Ole J. Mengshoel
Ole J Mengshoel
The Taxation Of Cloud Computing And Digital Content, David Shakow
The Taxation Of Cloud Computing And Digital Content, David Shakow
All Faculty Scholarship
“Cloud computing” raises important and difficult questions in state tax law, and for Federal taxes, particularly in the foreign tax area. As cloud computing solutions are adopted by businesses, items we view as tangible are transformed into digital products. In this article, I will describe the problems cloud computing poses for tax systems. I will show how current law is applied to cloud computing and will identify the difficulties current approaches face as they are applied to this developing technology.
My primary interest is how Federal tax law applies to cloud computing, particularly as the new technology affects international transactions. …
Advancements And Challenges Towards A Collaborative Framework For 3d Tele-Immersive Social Networking, Davide Andrea Mauro, N. E. O’Connor, D. Monaghan, Marc Gowing, P. Fechteler, P. Eisert, J. Wall, E. Izquierdo, D. S. Alexiadis, P. Daras, R. Mekuria, P. Cesar
Advancements And Challenges Towards A Collaborative Framework For 3d Tele-Immersive Social Networking, Davide Andrea Mauro, N. E. O’Connor, D. Monaghan, Marc Gowing, P. Fechteler, P. Eisert, J. Wall, E. Izquierdo, D. S. Alexiadis, P. Daras, R. Mekuria, P. Cesar
Computer Sciences and Electrical Engineering Faculty Research
Social experiences realized through teleconferencing systems are still quite different from face to face meetings. The awareness that we are online and in a, to some extent, lesser real world are preventing us from really engaging and enjoying the event. Several reasons account for these differences and have been identified. We think it is now time to bridge these gaps and propose inspiring and innovative solutions in order to provide realistic, believable and engaging online experiences. We present a distributed and scalable framework named REVERIE that faces these challenges and provides a mix of these solutions. Applications built on top …
Exploring Multiple Dimensions Of Parallelism In Junction Tree Message Passing, Lu Zheng, Ole J. Mengshoel
Exploring Multiple Dimensions Of Parallelism In Junction Tree Message Passing, Lu Zheng, Ole J. Mengshoel
Ole J Mengshoel
Evaluation Of Cyber Sensors For Enhancing Situational Awareness In The Ics Environment, Jeremy R. Otis
Evaluation Of Cyber Sensors For Enhancing Situational Awareness In The Ics Environment, Jeremy R. Otis
Theses and Dissertations
Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that …
Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee
Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee
Computer Engineering
For this project a secure, battery operated, Bluetooth operated padlock was created. The project included both the hardware to integrate with a padlock and an Android application used to interface with the hardware. In order to make the padlock secure both AES encryption and challenge response authentication were used for secure message passing between the device and the Android phone. The project also included power consumption and sustainability tuning including exploring Arduino sleep states and integrating the project with a solar charging unit.
Set-Top Box Simulator, Philip Tyler
Set-Top Box Simulator, Philip Tyler
Computer Engineering
This report presents a python-based Set-top box simulation program utilizing a Simulation library called SimPy (See Appendix 1) to simulate real-time operation of a Set-top Box, or DVR. A graphical user interface, designed with PyQt4, allows a user to customize many simulation parameters such as hard drive speeds, buffer sizes, length of simulation, etc. The GUI also shows the user any errors that occur during the simulation such as buffer overflows/underflows. The results of this simulator lie within 85%-95% accuracy depending on the user-input parameters. With this simulation program, a Set-top box hardware or firmware developer can interchange the scheduling …
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Master's Theses
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.
Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …