Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Understanding The Impact Of Emergent Conflict On Communication And Team Cognition: A Multilevel Study In Engineering Teams, Francisco Cima Apr 2024

Understanding The Impact Of Emergent Conflict On Communication And Team Cognition: A Multilevel Study In Engineering Teams, Francisco Cima

Engineering Management & Systems Engineering Theses & Dissertations

The development of team cognition is crucial for fostering high-performing teams. In cognitive-intensive fields like engineering, effective communication serves as a primary precursor to team knowledge development, enabling group members to effectively retrieve and utilize each other's expertise. Despite the critical role of communication, there is a lack of empirical research examining how conflict situations, which are critical emerging factors inherent to teamwork, interact with communication processes to constrain team knowledge development and utilization. This study, rooted in information processing theory, investigates how emerging conflict shapes multilevel team knowledge structures by interacting with communication processes in engineering project teams. Prior …


Structural Characterization Of A Tritruss Module, Lauren M. Simmons Apr 2024

Structural Characterization Of A Tritruss Module, Lauren M. Simmons

Mechanical & Aerospace Engineering Theses & Dissertations

The TriTruss is a novel structural module developed by researchers at NASA Langley Research Center (LaRC) that can be used in space to assemble large support structures for a variety of applications. One such application is the metering truss or primary mirror backbone support structure of an In-Space Assembled Telescope (iSAT). For the iSAT application, the TriTruss will be supporting mirror segments, payloads, and instruments, all of which require the TriTruss to have a high stiffness. Structural characterization from testing and analysis is needed to ensure the integrity of the struts that make up a TriTruss module is maintained when …


Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain Jan 2024

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain

VMASC Publications

Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …