• Login
    Search 
    •   eScholar Home
    • Graduate & Postdoctoral Studies
    • Search
    •   eScholar Home
    • Graduate & Postdoctoral Studies
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 18

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Determining the effectiveness of nuclear security through computer simulation 

    Chornoboy, Nicholas Jordan (2015-09-01)
    There is a growing concern from both national regulators and the International Atomic Energy Agency (IAEA) about the threat posed by attacks against iconic targets such as nuclear power plants. This has led to an increased ...
    Thumbnail

    Social-based trustworthy data forwarding in vehicular delay tolerant networks 

    Alganas, Abdulelah (2011-03-01)
    Vehicular ad hoc network (VANET) is an emerging new communication technol-ogy which has attracted a lot of research attention from academic community and indus-try. For many applications in VANETs, information has to be ...
    Thumbnail

    Secure and compromise-resilient architecture for advanced metering infrastructure 

    Alfaheid, Khalid (2011-03-01)
    In recent years, the Smart Grid has grown to be the solution for future electrical energy that promises to avoid blackouts as well as to be energy efficient, environmentally and customer-friendly. In Smart Grid, the ...
    Thumbnail

    Claims-aware middleware for securing IoT services 

    George, Vathalloor Merin (2016-04-01)
    Take a look at the world around us. There has been tremendous change in the way of living. With the world around us getting smart, Internet of Things is gaining ground in our life. Applications like smart home and eHealth ...
    Thumbnail

    Design of a secure privacy preserving cloud based framework for sharing electronic health data 

    Ilokah, Munachiso (2020-01-01)
    There exists a need for sharing user health data, especially with institutes for research purposes, in a secure fashion. This is especially true in the case of a system that includes a third party storage service, such as ...
    Thumbnail

    An investigation of semantic patterns in passwords 

    Veras Guimaraes, Rafael (2013-08-01)
    The advent of large password leaks in recent years has exposed the security problems of passwords and enabled deeper empirical investigation of password patterns. Researchers have only touched the surface of patterns in ...
    Thumbnail

    Strategies and applications for creating more memorable passwords 

    MacRae, Brent Alexander (2016-01-01)
    As we continue to learn and grow in an ever evolving technological age, we deepen our understanding of the importance of authentication. There are many different types of authentication, each exhibiting their own strengths ...
    Thumbnail

    Towards secure and privacy preserving e-health data exchanges through consent based access control 

    Bacchus, Abel Bradley Saed (2017-09-01)
    How we administer healthcare continues to evolve alongside the advancement of information technology. As we become more connected, the Internet of Things and our want to share information in a timely manner encourage us ...
    Thumbnail

    Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt 

    Garcia, Ricardo Rodriguez (2013-03-01)
    The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ...
    Thumbnail

    An anomaly detection model utilizing attributes of low powered networks, IEEE 802.15.4e/TSCH and machine learning methods 

    Salgadoe, Sajeeva (2019-12-01)
    The rapid growth in sensors, low-power integrated circuits, and wireless communication standards has enabled a new generation of applications based on ultra-low powered wireless sensor networks. These are employed in many ...
    • 1
    • 2

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of eScholarCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CommunityBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Discover

    AuthorAlfaheid, Khalid (1)Alganas, Abdulelah (1)Alharbi, Khalid (1)Atele-Williams, Tosan (1)Bacchus, Abel Bradley Saed (1)Basudan, Sultan (1)Chornoboy, Nicholas Jordan (1)Defo Aymar, Tala (1)Garcia, Ricardo Rodriguez (1)George, Vathalloor Merin (1)... View MoreSubject
    Security (18)
    Privacy (6)AI (2)Authentication (2)Claims (2)Cryptography (2)Passwords (2)Usability (2)Accuracy (1)Adaptive cyber defence (1)... View MoreDate Issued2020 - 2023 (6)2011 - 2019 (12)Has File(s)Yes (18)

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV