Now showing items 1-15 of 15

    • Architectural support for improving security and performance of memory sub-systems 

      Yan, Chenyu (Georgia Institute of Technology, 2008-11-17)
      This thesis explores architectural level optimizations to make secure systems more efficient, secure and affordable. It extends prior work for secure architecture in several areas. It proposes a new combined memory ...
    • Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes 

      Paul, Arnab (Georgia Institute of Technology, 2005-02-11)
      This thesis investigates the role of error-correcting codes in Distributed and Pervasive Computing. The main results are at the intersection of Security and Fault Tolerance for these environments. There are two primary ...
    • Dynamic Authentication for High-Performance Networked Applications 

      Schneck, Phyllis Adele; Schwan, Karsten (Georgia Institute of Technology, 1998)
      Both government and business are increasingly interested in addressing the growing threats imposed by the lack of adequate information security. Consistent with these efforts, our work focuses on the integrity and ...
    • FESL: Fedora Enhanced Security Layer (A Community-Based Project) 

      Shin, Eddie (Georgia Institute of Technology, 2009-05-20)
      While there have been many significant changes to Fedora since the release of Fedora 3.0, there has not been any new work in the area of authentication and authorization. At the same time, there have been many requests ...
    • Half-Baked Cookies: Client Authentication on the Modern Web 

      Mundada, Yogesh; Feamster, Nick; Krishnamurthy, Balachander; Guha, Saikat; Levin, Dave (Georgia Institute of Technology, 2014)
      Modern websites set multiple authentication cookies during the login process to allow users to remain authenticated over the duration of a web session. Web applications use cookie-based authentication to provide different ...
    • A hardware-enabled certificate of authenticity system with intrinsically high entropy 

      Lakafosis, Vasileios (Georgia Institute of Technology, 2013-04-09)
      The objective of the proposed research is the design and fabrication of a novel stand-alone wireless robust system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. The system consists of ...
    • Hello, Are You Human? 

      Xu, Jun; Essa, Irfan A.; Lipton, Richard J. (Georgia Institute of Technology, 2000)
      In this paper, we propose the concept of a humanizer and explore its applications in network security and E-commerce. A humanizer is a novel authentication scheme that asks the question "are you human?" (instead of ...
    • Mandatory Human Participation: A New Scheme for Building Secure Systems 

      Xu, Jun; Essa, Irfan A.; Sung, Min-Ho; Lipton, Richard J. (Georgia Institute of Technology, 2001)
      Mandatory Human Participation (MHP) is a novel authentication scheme that asks the question "are you human?" (instead of "who are you?"), and upon the correct answer to this question, can prove a principal to be a ...
    • Minimum Information Disclosure with Efficiently Verifiable Credentials 

      Bauer, David; Blough, Douglas M.; Cash, David (Georgia Institute of Technology, 2007)
      Public-key based certificates provide a standard way to prove one's identity, as certified by some certificate authority (CA). However, standard certificates provide a binary identification: either the whole identity of ...
    • A New Cryptographic Protocol for Biometric Security Technologies 

      Paul, Arnab; Ramachandran, Umakishore (Georgia Institute of Technology, 2001)
      We propose a new cryptographic protocol for remote authentication. This protocol is suitable when the signature key is very large. The emerging paradigm of verification through biometric samples, such as fingerprints, ...
    • Opportunistic Annexing for Handheld Devices: Opportunities and Challenges 

      Pierce, Jeffrey S.; Mahaney, Heather Elizabeth; Abowd, Gregory D. (Georgia Institute of Technology, 2003)
      Mobile devices such as PDAs and cellphones suffer from limited input and output capabilities. Unlike the processing and storage capabilities of these devices, which will improve over time, their input and output capabilities ...
    • A Statewide Community of Trust: An RUcore Implementation Using Shibboleth and XACML 

      Jantz, Ron (Georgia Institute of Technology, 2009-05-20)
      RUcore (http://rucore.libraries.rutgers.edu ) is Rutgers University's Fedora-based institutional repository. The RUcore framework provides generic services for users, collections, and digital preservation. As a result, ...
    • Toward securing links and large-scale 

      Delgosha, Farshid (Georgia Institute of Technology, 2007-09-13)
      Applications of finite-field wavelets, paraunitary matrices, and multivariate polynomials in the design of efficient cryptographic algorithms for resource-limited devices and wireless sensor nodes is the main topic of this ...
    • Vulnerabilities in SNMPv3 

      Lawrence, Nigel Rhea (Georgia Institute of Technology, 2012-07-10)
      Network monitoring is a necessity for both reducing downtime and ensuring rapid response in the case of software or hardware failure. Unfortunately, one of the most widely used protocols for monitoring networks, the ...
    • When Ruby Met Fedora 

      Zumwalt, Matthew (Georgia Institute of Technology, 2009-05-21)
      This session will provide technical, Fedora-specific background to complement the plenary presentation titled "Many Lightweight Views into Complex Repository Content". We will cover the purpose and features of ActiveFedora, ...