Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

A Novel E-Voting System With Diverse Security Features, Haijun Pan Oct 2017

A Novel E-Voting System With Diverse Security Features, Haijun Pan

Dissertations

Internet-based E-voting systems can offer great benefits over traditional voting machines in areas, such as protecting voter and candidate privacy, providing accurate vote counting, preventing voter fraud, and shortening the time of vote counting. This dissertation introduces, establishes and improves Internet-based E-voting systems on various aspects of the voting procedure. In addition, our designs also enable voters to track their votes which is a very important element in any elections.

Our novel Internet-based E-voting system is based on the following realistic assumptions: (1) The election authorities are not 100% trustworthy; (2) The E-voting system itself is not 100% trustworthy; (3) …


Operating Characteristics Of Passenger Screening Processes And The Development Of A Paced Inspection System, Geraldine Kelly Leone Jan 2010

Operating Characteristics Of Passenger Screening Processes And The Development Of A Paced Inspection System, Geraldine Kelly Leone

Dissertations

The airport checkpoint security screening (ACSS) system is an important line of defense against the introduction of dangerous objects into the U.S. aviation system. Recently, there has been much interest in modeling these systems and to derive operating parameters which optimize performance. In general there are two performance measures of interest (i) the waiting time of the arriving entities, and (ii) the allocated screening resources and its utilization. Clearly, the traveling public would like a zero waiting time, while airports are limited both in terms of space and resource capital. The arrival and exit entity in the ACSS system are …


Kerberos Phone Secure Messenger, Nabeel Al-Saber Jan 2008

Kerberos Phone Secure Messenger, Nabeel Al-Saber

Theses

Security is becoming vital in today's open insecure Internet. While popular Internet enabled mobile devices are spreading widely, the security of such platforms is not maturely addressed. This research extends the popular Kerberos authentication protocol to run on mobile phones and builds a novel Kerberos Secure Phone Messenger (KSPM) on top of the protocol. Moreover, the Kerberos network authentication protocol provides user authentication and message privacy with the convenience of secret key cryptography. Such an advantage in mobile phones helps reduce the computational burden and power consumption if compared with public key cryptography. KSPM achieves high standards in terms of …


Analysis Of Truck Delays At Container Terminal Security Inspection Stations, Dae-Gwun Yoon May 2007

Analysis Of Truck Delays At Container Terminal Security Inspection Stations, Dae-Gwun Yoon

Dissertations

After September 11, 2001, special attention has been given to the vulnerability at container transportation to terrorist activities. United States Customs and Border Protection (CBP) has set up inspection stations for containers at seaport terminals to screen containers, but this practice affects the truck turnaround time in the seaport by generating additional processing delays.

This dissertation analyses the additional truck turnaround time incurred at the inspection stations under various levels of security. Queuing models were used to estimate truck delay as containers are inspected at two successive security inspection stages. Each stage may utilize one or more inspection equipment. The …


Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen Jan 2007

Non-Repudiation Secure File Transfer Protocol (Nrsftp), Jerry Chen

Theses

Non Repudiation Secure File Transfer Protocol (NRSFTP) is designed to resolve three main concerns for today's electronic file transfer methodology. The three main concerns are Non-Repudiation, Secure, and Non-Real Time file transfer. Non-repudiation is to assure the receiver that the sender of the document is not an imposter. Secure document transfer is to assure the sender that only the intended receiver will be able to read the document. Non-real-time file transfer is to provide convenient and low cost transportability of the encrypted data from one party to another. With the above three concerns addressed, the NRSFTP protocol can be widely …


Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky Aug 2003

Ip Traceback With Deterministic Packet Marking Dpm, Andrey Belenky

Dissertations

In this dissertation, a novel approach to Internet Protocol (IP) Traceback - Deterministic Packet Marking (DPM) is presented. The proposed approach is scalable, simple to implement, and introduces no bandwidth and practically no processing overhead on the network equipment. It is capable of tracing thousands of simultaneous attackers during a Distributed Denial of Service (DDoS) attack. Given sufficient deployment on the Internet, DPM is capable of tracing back to the slaves for DDoS attacks which involve reflectors. Most of the processing is done at the victim. The traceback process can be performed post-mortem, which allows for tracing the attacks that …