Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Information Security (6)
- Databases and Information Systems (2)
- Engineering (2)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
-
- Data Storage Systems (1)
- Electrical and Computer Engineering (1)
- Electrical and Electronics (1)
- Graphics and Human Computer Interfaces (1)
- Numerical Analysis and Scientific Computing (1)
- Power and Energy (1)
- Programming Languages and Compilers (1)
- Software Engineering (1)
- Systems Architecture (1)
- Theory and Algorithms (1)
Articles 1 - 8 of 8
Full-Text Articles in Physical Sciences and Mathematics
The Effects Of Side-Channel Attacks On Post-Quantum Cryptography: Influencing Frodokem Key Generation Using The Rowhammer Exploit, Michael Jacob Fahr
The Effects Of Side-Channel Attacks On Post-Quantum Cryptography: Influencing Frodokem Key Generation Using The Rowhammer Exploit, Michael Jacob Fahr
Graduate Theses and Dissertations
Modern cryptographic algorithms such as AES and RSA are effectively used for securing data transmission. However, advancements in quantum computing pose a threat to modern cryptography algorithms due to the potential of solving hard mathematical problems faster than conventional computers. Thus, to prepare for quantum computing, NIST has started a competition to standardize quantum-resistant public-key cryptography algorithms. These algorithms are evaluated for strong theoretical security and run-time performance. NIST is in the third round of the competition, and the focus has shifted to analyzing the vulnerabilities to side-channel attacks. One algorithm that has gained notice is the Round 3 alternate …
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Optimized Damage Assessment And Recovery Through Data Categorization In Critical Infrastructure System., Shruthi Ramakrishnan
Graduate Theses and Dissertations
Critical infrastructures (CI) play a vital role in majority of the fields and sectors worldwide. It contributes a lot towards the economy of nations and towards the wellbeing of the society. They are highly coupled, interconnected and their interdependencies make them more complex systems. Thus, when a damage occurs in a CI system, its complex interdependencies make it get subjected to cascading effects which propagates faster from one infrastructure to another resulting in wide service degradations which in turn causes economic and societal effects. The propagation of cascading effects of disruptive events could be handled efficiently if the assessment and …
Automated Privacy Protection For Mobile Device Users And Bystanders In Public Spaces, David Darling
Automated Privacy Protection For Mobile Device Users And Bystanders In Public Spaces, David Darling
Graduate Theses and Dissertations
As smartphones have gained popularity over recent years, they have provided usersconvenient access to services and integrated sensors that were previously only available through larger, stationary computing devices. This trend of ubiquitous, mobile devices provides unparalleled convenience and productivity for users who wish to perform everyday actions such as taking photos, participating in social media, reading emails, or checking online banking transactions. However, the increasing use of mobile devices in public spaces by users has negative implications for their own privacy and, in some cases, that of bystanders around them.
Specifically, digital photography trends in public have negative implications for …
Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin
Cybersecurity Methods For Grid-Connected Power Electronics, Stephen Joe Moquin
Graduate Theses and Dissertations
The present work shows a secure-by-design process, defense-in-depth method, and security techniques for a secure distributed energy resource. The distributed energy resource is a cybersecure, solar inverter and battery energy storage system prototype, collectively called the Cybersecure Power Router. Consideration is given to the use of the Smart Green Power Node for a foundation of the present work. Metrics for controller security are investigated to evaluate firmware security techniques. The prototype's ability to mitigate, respond to, and recover from firmware integrity degradation is examined. The prototype shows many working security techniques within the context of a grid-connected, distributed energy resource. …
Enforcing Database Security On Cloud Using A Trusted Third Party Based Model, Victor Fuentes Tello
Enforcing Database Security On Cloud Using A Trusted Third Party Based Model, Victor Fuentes Tello
Graduate Theses and Dissertations
Cloud computing offers a considerable number of advantages to clients and organizations that use several capabilities to store sensitive data, interact with applications, or use technology infrastructure to perform daily activities. The development of new models in cloud computing brings with it a series of elements that must be considered by companies, particularly when the sensitive data needs to be protected. There are some concerns related to security that need to be taken into consideration when a service provider manage and store the data in a location outside the company. In this research, a model that uses a trusted third …
Mobile Banking Security Using Gps And Ldpc Codes, Matthew Francis Moccaro
Mobile Banking Security Using Gps And Ldpc Codes, Matthew Francis Moccaro
Graduate Theses and Dissertations
Mobile Banking is becoming a major part of our world's financial system. Being able to manage one's finances on a mobile device can provide services that can make users more productive. It can also serve as a means of financial freedom to those who are unable to access physical banking facilities due to distance, or other problems. However, with such freedom also comes the need for security. A person's financial information is one of the most targeted groups of information by attackers. To secure these mobile freedoms, this paper presents a system to secure mobile banking procedures using global positioning …
A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand
A Secure And Fair Resource Sharing Model For Community Clouds, Santhosh S. Anand
Graduate Theses and Dissertations
Cloud computing has gained a lot of importance and has been one of the most discussed segment of today's IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is …
Mitigating Insider Threat In Relational Database Systems, Qussai Yaseen
Mitigating Insider Threat In Relational Database Systems, Qussai Yaseen
Graduate Theses and Dissertations
The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that insiders get throughout legal accesses, and it concentrates on analyzing the dependencies and constraints among data items and represents them using graph-based methods. The dissertation proposes new types of Knowledge Graphs (KGs) to represent insiders' knowledgebases. Furthermore, it introduces the Neural Dependency and Inference Graph (NDIG) and Constraints and Dependencies Graph (CDG) to demonstrate the dependencies and constraints among data items. The dissertation discusses in detail how insiders use knowledgebases and dependencies and constraints to get …