Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Addressing Challenges In Utilizing Gpus For Accelerating Privacy-Preserving Computation, Ardhi Wiratama Baskara Yudha Jan 2024

Addressing Challenges In Utilizing Gpus For Accelerating Privacy-Preserving Computation, Ardhi Wiratama Baskara Yudha

Graduate Thesis and Dissertation 2023-2024

Cloud computing increasingly handles confidential data, like private inference and query databases. Two strategies are used for secure computation: (1) employing CPU Trusted Execution Environments (TEEs) like AMD SEV, Intel SGX, or ARM TrustZone, and (2) utilizing emerging cryptographic methods like Fully Homomorphic Encryption (FHE) with libraries such as HElib, Microsoft SEAL, and PALISADE. To enhance computation, GPUs are often employed. However, using GPUs to accelerate secure computation introduces challenges addressed in three works.

In the first work, we tackle GPU acceleration for secure computation with CPU TEEs. While TEEs perform computations on confidential data, extending their capabilities to GPUs …


Flight Emergency Advice Works Just As Well Back On The Ground, Carolyn Massiah Nov 2016

Flight Emergency Advice Works Just As Well Back On The Ground, Carolyn Massiah

UCF Forum

Save yourself first!

This one sentence is a valuable piece of advice I wish I had received and fully embraced so much earlier in life. In fact, it is still a notion that I struggle with because it is one that sounds selfish in nature. However, now more than at any other point in my life, I realize that in order to be selfless and to be able to assist others, you must first truly work on thinking of your own self first.


Networking And Security Solutions For Vanet Initial Deployment Stage, Baber Aslam Jan 2012

Networking And Security Solutions For Vanet Initial Deployment Stage, Baber Aslam

Electronic Theses and Dissertations

Vehicular ad hoc network (VANET) is a special case of mobile networks, where vehicles equipped with computing/communicating devices (called "smart vehicles") are the mobile wireless nodes. However, the movement pattern of these mobile wireless nodes is no more random, as in case of mobile networks, rather it is restricted to roads and streets. Vehicular networks have hybrid architecture; it is a combination of both infrastructure and infrastructure-less architectures. The direct vehicle to vehicle (V2V) communication is infrastructure-less or ad hoc in nature. Here the vehicles traveling within communication range of each other form an ad hoc network. On the other …


Collaboration Enforcement In Mobile Ad Hoc Networks, Ning Jiang Jan 2006

Collaboration Enforcement In Mobile Ad Hoc Networks, Ning Jiang

Electronic Theses and Dissertations

Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation …


Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks, Mohit Jagetia Jan 2004

Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks, Mohit Jagetia

Electronic Theses and Dissertations

The IEEE802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is a popular wireless secure communication stream cipher protocol approach to network security used to protect link-layer communications from eavesdropping and other attacks. It allows user to communicate with the user; sharing the public key over a network. It provides authentication and encrypted communications over unsecured channels. However, WEP protocol has an inherent security flaw. It is vulnerable to the various attacks, various experiments has proved that WEP fails to achieve its security goals. This thesis entails designing, evaluating and prototyping a wireless security infrastructure that …