Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Physical Sciences and Mathematics
Tradeoffs In Protocol Designs For Collaborative Authentication, Jacob Venne
Tradeoffs In Protocol Designs For Collaborative Authentication, Jacob Venne
USF Tampa Graduate Theses and Dissertations
Authentication is a crucial tool used in access control mechanisms to verify a user’s identity. Collaborative Authentication (co-authentication) is a newly proposed authentication scheme designed to improve on traditional token authentication. Co-authentication works by using multiple user devices as tokens to collaborate in a challenge and authenticate a user request on single device.
This thesis adds two contributions to the co-authentication project. First, a detailed survey of applications that are suitable for adopting co-authentication is presented. Second, an analysis of tradeoffs between varying protocol designs of co-authentication is performed to determine whether, and how, any designs are superior to other …
Initial Comparative Empirical Usability Testing For The Collaborative Authentication System, Kim Bursum
Initial Comparative Empirical Usability Testing For The Collaborative Authentication System, Kim Bursum
USF Tampa Graduate Theses and Dissertations
The Collaborative Authentication (co-authentication) system is an authentication system that relies on some or all members of a pre-registered set of secure hardware tokens being concurrently present to an authentication server at the moment of authentication. Previous researchers have compared various embodiments of the co-authentication system to each other including using Quick Response (QR) codes/cellphone cameras and Near Field Communication (NFC) between tokens. This thesis concerns the initial design and implementation of empirical comparative testing mechanisms between one embodiment of the co-authentication system and other commonly used authentication systems. One contribution is the simulated standard user ID and password login …
Developing A Compiler For A Regular Expression Based Policy Specification Language, Cory Michael Juhlin
Developing A Compiler For A Regular Expression Based Policy Specification Language, Cory Michael Juhlin
USF Tampa Graduate Theses and Dissertations
Security policy specification languages are a response to today's complex and vulnerable software climate. These languages allow an individual or organization to restrict and modify the behavior of third-party applications such that they adhere to the rules specified in the policy. As software grows in complexity, so do the security policies that govern them. Existing policy specification languages have not adapted to the growing complexity of the software they govern and as a result do not scale well, often resulting in code that is overly complex or unreadable. Writing small, isolated policies as separate modules and combining them is known …
Authentication Via Multiple Associated Devices, Jean-Baptiste Subils
Authentication Via Multiple Associated Devices, Jean-Baptiste Subils
USF Tampa Graduate Theses and Dissertations
This thesis presents a practical method of authentication utilizing multiple devices. The factors contributing to the practicality of the method are: the utilization of devices already commonly possessed by users and the amenability to being implemented on a wide variety of devices. The term “device” refers to anything able to perform cryptographic operations, store data, and communicate with another such device.
In the method presented herein, multiple devices need to be associated with a single user to provide this user an identity in the system. A public key infrastructure is used to provide this identity. Each of the devices associated …
Design, Testing And Implementation Of A New Authentication Method Using Multiple Devices, Cagri Cetin
Design, Testing And Implementation Of A New Authentication Method Using Multiple Devices, Cagri Cetin
USF Tampa Graduate Theses and Dissertations
Authentication protocols are very common mechanisms to confirm the legitimacy of someone’s or something’s identity in digital and physical systems.
This thesis presents a new and robust authentication method based on users’ multiple devices. Due to the popularity of mobile devices, users are becoming more likely to have more than one device (e.g., smartwatch, smartphone, laptop, tablet, smart-car, smart-ring, etc.). The authentication system presented here takes advantage of these multiple devices to implement authentication mechanisms. In particular, the system requires the devices to collaborate with each other in order for the authentication to succeed. This new authentication protocol is robust …
Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun
Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun
USF Tampa Graduate Theses and Dissertations
Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy
resources and also restricted by the ad-hoc network operational
environment. They pose unique challenges, due to limited power
supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the …