Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- FCSRs (2)
- AFSRs (1)
- Authentication (1)
- Authorization (1)
- Autocorrelation (1)
-
- Correlation immunity (1)
- Half-l-sequences (1)
- Health Information Exchange (1)
- Integrity (1)
- Multi-sequences (1)
- Privacy (1)
- Q-correlation immune functions (1)
- Q-transform (1)
- Register synthesis problem (1)
- Security (1)
- Security and Privacy in Vehicular Networks (1)
- Vehicular Ad Hoc Networks (1)
- Vehicular Cloud (1)
Articles 1 - 4 of 4
Full-Text Articles in Information Security
Statistical Properties Of Pseudorandom Sequences, Ting Gu
Statistical Properties Of Pseudorandom Sequences, Ting Gu
Theses and Dissertations--Computer Science
Random numbers (in one sense or another) have applications in computer simulation, Monte Carlo integration, cryptography, randomized computation, radar ranging, and other areas. It is impractical to generate random numbers in real life, instead sequences of numbers (or of bits) that appear to be ``random" yet repeatable are used in real life applications. These sequences are called pseudorandom sequences. To determine the suitability of pseudorandom sequences for applications, we need to study their properties, in particular, their statistical properties. The simplest property is the minimal period of the sequence. That is, the shortest number of steps until the sequence repeats. …
New Secure Solutions For Privacy And Access Control In Health Information Exchange, Ahmed Fouad Shedeed Ibrahim
New Secure Solutions For Privacy And Access Control In Health Information Exchange, Ahmed Fouad Shedeed Ibrahim
Theses and Dissertations--Computer Science
In the current digital age, almost every healthcare organization (HCO) has moved from storing patient health records on paper to storing them electronically. Health Information Exchange (HIE) is the ability to share (or transfer) patients’ health information between different HCOs while maintaining national security standards like the Health Insurance Portability and Accountability Act (HIPAA) of 1996. Over the past few years, research has been conducted to develop privacy and access control frameworks for HIE systems. The goal of this dissertation is to address the privacy and access control concerns by building practical and efficient HIE frameworks to secure the sharing …
Topics On Register Synthesis Problems, Weihua Liu
Topics On Register Synthesis Problems, Weihua Liu
Theses and Dissertations--Computer Science
Pseudo-random sequences are ubiquitous in modern electronics and information technology. High speed generators of such sequences play essential roles in various engineering applications, such as stream ciphers, radar systems, multiple access systems, and quasi-Monte-Carlo simulation. Given a short prefix of a sequence, it is undesirable to have an efficient algorithm that can synthesize a generator which can predict the whole sequence. Otherwise, a cryptanalytic attack can be launched against the system based on that given sequence.
Linear feedback shift registers (LFSRs) are the most widely studied pseudorandom sequence generators. The LFSR synthesis problem can be solved by the Berlekamp-Massey algorithm, …
Secure And Authenticated Message Dissemination In Vehicular Ad Hoc Networks And An Incentive-Based Architecture For Vehicular Cloud, Kiho Lim
Theses and Dissertations--Computer Science
Vehicular ad hoc Networks (VANETs) allow vehicles to form a self-organized network. VANETs are likely to be widely deployed in the future, given the interest shown by industry in self-driving cars and satisfying their customers various interests. Problems related to Mobile ad hoc Networks (MANETs) such as routing, security, etc.have been extensively studied. Even though VANETs are special type of MANETs, solutions proposed for MANETs cannot be directly applied to VANETs because all problems related to MANETs have been studied for small networks. Moreover, in MANETs, nodes can move randomly. On the other hand, movement of nodes in VANETs are …