Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.
In many multi-user cryptographic applications (e.g., electronic voting, digital lotteries, e-cash application, anonymous access to some resources, etc.), anonymity pops up as one of the main security objectives. Protecting private...
Managing the effects of changing requirements remains one of the greatest challenges of enterprise software development. The iterative and incremental model provides an expedient framework for addressing such concerns. This thesis...
This report shall discuss the threats to information and services in open systems. In it we shall provide an illustration where these threats are confronted, describe the three basic techniques of authentication, and comment on the...
In this dissertation we study the security and survivability of wireless mobile network systems in two distinct threat models: the Byzantine threat model and the sel¯sh node threat model. Wireless mobile networks are collections of self...
The Internet is an excellent source of information and entertainment. Children reap numerous benefits using the Internet for educational purposes, playing games and communicating with people all over the world. But along with these...
Instant messaging has been and still is a revolutionary technology, bringing people in communication with each other faster and easier. Its characteristic as sending messaging in real-time make it even more appealing than e-mail itself....
This work will examine enhancements to the library for scalable, parallel pseudorandom number generation (SPRNG). SPRNG uses parameterization to produce many streams of random numbers with emphasis on parallel Monte Carlo methods. We...
Since the explosion of computer systems and computer networks within the past decade, e-commerce, online banking, and other "internet" oriented applications have risen exponentially. According to Forrester Research Group, online shopping...
Digital signatures are essential to Internet applications and more generally electronic commerce. However, they are subject to various attacks that lend them impractical for some legal applications. In this thesis we consider...
Metadata is an important aspect in learning resource discovery, reuse of learning resources, within-collection organization of learning resources, retrieval of non-textual media, and interoperability among learning resources. This paper...
Research concerning optimization of reuse of software assets developed and consumed within large software enterprises is prevalent within academia and industry. Comparatively few research efforts have been devoted to exploring asset...
Mobile Ad Hoc Networks (MANETs) are a collection of wireless mobile nodes with links that are made and broken arbitrarily. They have limited resources in power, computation, broadcast range, and a dynamic topology with no fixed...
In addition to requiring routing to be dead-lock free and deterministic, Infiniband networks adopt destination based routing, which further complicates the routing design by putting additional constraints on the paths that can be...
With growing interest in devices that utilize the spin degree of freedom of the charge carriers, there is an extensive research effort into materials with high spin polarization. Two types of materials that have attracted particular...
Some of the material in is restricted to members of the community. By logging in, you may be able to gain additional access to certain collections or items. If you have questions about access or logging in, please use the form on the Contact Page.