Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Social and Behavioral Sciences

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally Jul 2018

Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally

Information Science Faculty Publications

One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …


Protecting Online Privacy, Stephanie D. Winkler Jan 2016

Protecting Online Privacy, Stephanie D. Winkler

Theses and Dissertations--Communication

Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy. Privacy laws in the United States are currently outdated and do little to protect online privacy. These laws are unlikely to be changed as both the government and industry have interests in keeping these privacy laws lax. To bridge the gap between the desired level of online privacy and what is provided legally users may turn …


Encryption And Incrimination: The Evolving States Of Encrypted Drives, Shannon M. Oltmann Dec 2014

Encryption And Incrimination: The Evolving States Of Encrypted Drives, Shannon M. Oltmann

Information Science Faculty Publications

Individuals use encryption to safeguard many valid and legal applications but also to hide illegal activity. Several legal cases have drawn the limits of self-incrimination under the Fifth Amendment regarding providing passwords to access illegal information content,such as child pornography. The cases illustrate that certain knowledge of evidence amounts to a compelling need for access and that a subpoena for hard drive contents is more likely to succeed than requiring a witness to provide a password. Since known documents are not legally protected and biometric data can be compelled as evidence, there is no reason that known digital documents, biometric …