Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Computer Engineering
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White
Master's Theses
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.
Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …
Categorization Of Security Design Patterns, Jeremiah Y. Dangler
Categorization Of Security Design Patterns, Jeremiah Y. Dangler
Electronic Theses and Dissertations
Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework's effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access Control, …
Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao
Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao
Hong-Ning Dai
The eavesdropping security of wireless ad hoc networks has attracted considerable attention recently. However, most of current studies only consider OMN networks, where each node is mounted with a single omni-directional antenna, which radiates radio signals in all directions and consequently leads to the high eavesdropping possibility. Compared with an omnidirectional antenna, a directional antenna can concentrate the radio signals on some desired directions so that it can potentially reduce the eavesdropping possibility. This paper investigates the eavesdropping security of wireless ad hoc networks equipped with directional antennas. In particular, we study the eavesdropping possibility of OMN networks, SDA networks …