Now showing items 1-9 of 9
REDUCED VECTOR TECHNIQUE HOMOMORPHIC ENCRYPTION WITH VERSORS A SURVEY AND A PROPOSED APPROACH
In this research, a new type of homomorphic encryption technique, based on geometric algebra and versors, called Reduced Vector Technique Homomorphic Encryption (RVTHE) is designed, developed and analyzed. This new cipher ...
CAPITALIZING ON THE SECURITY POTENTIAL OF SOFTWARE DEFINED NETWORKING BY PROVIDING A NETWORK CONFIDENCE ASSESSMENT
Author(s):Alcorn, Joshua Andrew
The unauthorized access or theft of sensitive, personal information is becoming a weekly news item. The illegal dissemination of proprietary information to media outlets or competitors costs industry untold millions in ...
Toward secure sensitive data in the cloud
Author(s):Alsolami, Fahad Jazi
Cloud storage and computation have many exciting features such as low cost, scalability, and unbounded resources. These features attract many individuals and organizations to migrate their sensitive data, including biometric ...
Toward secure, trusted, and privacy-enhanced biometrics in the cloud
Biometric technology has been used for decades as a strong method to identify and authenticate individuals. As for its effectiveness and accuracy, biometric technology has gained popularity in a wide range of fields and ...
Remote authentication using vaulted fingerprint verification
Author(s):Alzahrani, Hamdan Ahmed
Fingerprint biometrics are increasingly used for identity verification. However, these require a careful balance of accuracy and privacy that is missing in many implementations. This dissertation describes a new biometric ...
Increasing security for regulatory constrained systems, through new systems and architecture methodologies
In the Department of Defense (DoD) vulnerabilities can result in casualties, destruction of assets, or potentially allow the enemy to either escape or infiltrate a system. This is true for other systems such as those in ...
On community-based authentication factor
Author(s):Alkhattabi, Khalid Hammad
In this thesis, we explore the use of community Information as a factor for authentication and authorization, called it Community-based Factor (CBF), and resent the design and implementation of a Community-based Authentication ...
Advancing Fingerprint-Enhanced Authentication: Consistent, Discerning, and Durable Representation and Matching
Throughout human history, the achievement of security through authentication has been filled with challenges. Technological evolution has created an unprecedented conjunction of scale and artifice that have turned our ...
Critical Infrastructure Asset Identification: A Multi-Criteria Decision System and Aviation Case Study
In a world where terrorism, natural disasters, and unknown unknowns threaten the security posture of various nations, comprehensive risk management remains the recommended action for protection of critical infrastructure. ...