Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Kerberos Phone Secure Messenger, Nabeel Al-Saber Jan 2008

Kerberos Phone Secure Messenger, Nabeel Al-Saber

Theses

Security is becoming vital in today's open insecure Internet. While popular Internet enabled mobile devices are spreading widely, the security of such platforms is not maturely addressed. This research extends the popular Kerberos authentication protocol to run on mobile phones and builds a novel Kerberos Secure Phone Messenger (KSPM) on top of the protocol. Moreover, the Kerberos network authentication protocol provides user authentication and message privacy with the convenience of secret key cryptography. Such an advantage in mobile phones helps reduce the computational burden and power consumption if compared with public key cryptography. KSPM achieves high standards in terms of …


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


Matrix Decomposition For Data Disclosure Control And Data Mining Applications, Jie Wang Jan 2008

Matrix Decomposition For Data Disclosure Control And Data Mining Applications, Jie Wang

University of Kentucky Doctoral Dissertations

Access to huge amounts of various data with private information brings out a dual demand for preservation of data privacy and correctness of knowledge discovery, which are two apparently contradictory tasks. Low-rank approximations generated by matrix decompositions are a fundamental element in this dissertation for the privacy preserving data mining (PPDM) applications. Two categories of PPDM are studied: data value hiding (DVH) and data pattern hiding (DPH). A matrix-decomposition-based framework is designed to incorporate matrix decomposition techniques into data preprocessing to distort original data sets. With respect to the challenge in the DVH, how to protect sensitive/confidential attribute values without …


Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran Dec 2007

Mitigation Of Control Channel Jamming Under Node Capture Attacks, Patrick Tague, Mingya Li, Radha Poovendran

Patrick Tague

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread spectrum, as they know the required spreading sequences. For …