Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Arts and Humanities (1)
- Bilingual, Multilingual, and Multicultural Education (1)
- Biomedical (1)
- Computer Engineering (1)
- Computer Sciences (1)
-
- Curriculum and Social Inquiry (1)
- Education (1)
- Educational Methods (1)
- Electrical and Computer Engineering (1)
- Engineering (1)
- Information Security (1)
- Library and Information Science (1)
- Near Eastern Languages and Societies (1)
- Physical Sciences and Mathematics (1)
- Quantitative, Qualitative, Comparative, and Historical Methodologies (1)
- Science and Technology Studies (1)
- Sociology (1)
- Theory and Algorithms (1)
- Institution
- Publication
- Publication Type
Articles 1 - 3 of 3
Full-Text Articles in Social and Behavioral Sciences
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Compact Hardware Implementation Of A Sha-3 Core For Wireless Body Sensor Networks, Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
Information Science Faculty Publications
One of the most important Internet of Things applications is the wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments of small scale smart sensors in WBSNs, security, and privacy guarantees (e.g., security and safety-critical data, sensitive private information) are becoming a challenging issue because these sensor nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious tampering) using the secure hash algorithm 3 (SHA-3) when smart sensors in WBSNs communicate with each other using the Internet. Due to the limited resources (i.e., storage, …
A Framework For The Performance Analysis And Tuning Of Virtual Private Networks, Fridrich Shane Perez
A Framework For The Performance Analysis And Tuning Of Virtual Private Networks, Fridrich Shane Perez
Theses and Dissertations
With the rising trend of personal devices like laptops and smartphones being used in businesses and significant enterprises, the concern for preserving security arises. In addition to preserving security measures in outside devices, the network speed and performance capable by these devices need to be balanced with the security aspect to avoid slowing down virtual private network (VPN) activity. Performance tests have been done in the past to evaluate available software, hardware, and network security protocol options that will best benefit an entity according to its specific needs. With a variety of comparable frameworks available currently, it is a matter …
Nothing To Hide, Nothing To Fear? Tools And Suggestions For Digital Data Protection, Jedidiah C. Anderson, Erik Skare, Courtney Dorroll
Nothing To Hide, Nothing To Fear? Tools And Suggestions For Digital Data Protection, Jedidiah C. Anderson, Erik Skare, Courtney Dorroll
The Qualitative Report
The developing cyber-infrastructure has provided new tools, methods, and opportunities to conduct research. However, the Snowden leaks and subsequent developments proved that the same infrastructure has made all-encompassing surveillance possible – posing new challenges for researchers when engaging with those they are obligated to protect. As the cyber-infrastructure simultaneously opens up new possibility-spaces for circumventing structures of surveillance, while drawing on the authors’ own experiences, this article presents a number of tools and suggestions that will aid the researcher to engage more responsibly and safely with the research subject digitally.