To see the other types of publications on this topic, follow the link: ENHANCING SECURITY.

Dissertations / Theses on the topic 'ENHANCING SECURITY'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'ENHANCING SECURITY.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Linfan, and Shuang Zheng. "Enhancing QR Code Security." Thesis, Högskolan Kristianstad, Sektionen för hälsa och samhälle, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-14145.

Full text
Abstract:
Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come after. We also give an objective evaluation on the outcome in comparison to existing QR products. They ar
APA, Harvard, Vancouver, ISO, and other styles
2

Yue, Chuan. "Enhancing Web Browsing Security." W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623575.

Full text
Abstract:
Web browsing has become an integral part of our lives, and we use browsers to perform many important activities almost everyday and everywhere. However, due to the vulnerabilities in Web browsers and Web applications and also due to Web users' lack of security knowledge, browser-based attacks are rampant over the Internet and have caused substantial damage to both Web users and service providers. Enhancing Web browsing security is therefore of great need and importance.;This dissertation concentrates on enhancing the Web browsing security through exploring and experimenting with new approaches
APA, Harvard, Vancouver, ISO, and other styles
3

H, Fruchter Nathaniel. "Enhancing ISP-consumer security notifications." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122916.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (pages 79-85).<br>Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malici
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammed, Ali, Sachin Sama, and Majeed Mohammed. "Enhancing Network Security in Linux Environment." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17144.

Full text
Abstract:
Designing a secured network is the most important task in any enterprise or organization development. Securing a network mainly involves applying policies and procedures to protect different network devices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the important devices in a network. Therefore, securing these servers is the first and foremost step followed in every security implementation mechanism. To implement this, it is very important to analyse and study the security mechanisms provided by the operating system. This makes it easier for se
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Ying. "Enhancing security for XML Web services." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27531.

Full text
Abstract:
The XML-based interoperable characteristics make enhancing security for XML Web Services a lot different from that of the traditional network-based applications. SSL VPN gateways are usually used to provide security for traditional network-based applications, but not for Web Services. This thesis presents an integrated security solution for securing both traditional network-based applications and Web Services. The integrated security solution includes a VPN framework and a Web Services framework. Considering that we have already had an SSL VPN gateway developed by our lab, we take it as the mo
APA, Harvard, Vancouver, ISO, and other styles
6

Kadhum, Hamza. "Enhancing Zigbee Security for Industrial Implementation." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279559.

Full text
Abstract:
Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. This paper is collaboration with Ericsson to investigate Zigbee network security and implementation. This paper will cover security solutions for Zigbee and touch on how to configure Zigbee network such that it can operate for a long period of time without battery changes. The security solutions will d
APA, Harvard, Vancouver, ISO, and other styles
7

Makkar, Ankush. "Enhancing IoT Security Using 5G Capabilities." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85109.

Full text
Abstract:
Internet of Things (IoT) is an ecosystem comprises CT (Communication Technology),IT (Information Technology) and sometime OT (Operational Technologies) wheredifferent machines and devices can interact with each other and exchange useful datawhich can be processed using different IoT applications to take decisions and performrequired actions. Number of IoT devices and IoT networks are growing exponentially.Security is of utmost importance and without proper security implementation, IoTNetworks with billions of devices will be hacked and used as botnets which can createdisaster. The new IoT use
APA, Harvard, Vancouver, ISO, and other styles
8

Fekete, Florian. "Civil-military relations : enhancing international security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2003.<br>Thesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Kirkham, E., and C. Flew. "Strengthening embargoes and enhancing human security." Thesis, International Alert, Saferworld and University of Bradford, Department of Peace Studies, Centre for International Co-operation and Security, 2003. http://hdl.handle.net/10454/4275.

Full text
Abstract:
yes<br>Arms embargoes are one of the principal tools of states in seeking to prevent, limit and bring an end to armed conflict and human rights abuses. Despite the frequency with which arms embargoes have been imposed, there are significant problems with their implementation. Pressure is therefore growing for the international governmental community to act in order to ensure that the political commitment embodied by the imposition of arms embargoes is matched by the commitment to ensure their rigorous enforcement and to achieve enhanced human security on the ground. Increasing the effecti
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Man Hee. "Architectural support for enhancing security in clusters." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Beygo, Ömer Kerem, and Cihan Eraslan. "Enhancing Security and Usability Features of NFC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5620.

Full text
Abstract:
Near Field Communication (NFC) is a short range wireless communication protocol which is primarily intended to be used on mobile phones. Building upon existing infrastructure of RFID, NFC brings simplicity for connection of mobile devices, service initiation, mobile payment and ticketing. However, NFC still remains as a field that number of researches done are limited. The aim of this paper was to provide solutions for the problems of NFC that cause security risks and hurt user experience. To reach this goal we have reviewed the current literature and implemented an NFC application that we hav
APA, Harvard, Vancouver, ISO, and other styles
12

Assora, Mohammed. "Enhancing the Security of web commerce transactions." Thesis, Anglia Ruskin University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.478891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Khu-Smith, Vorpranee. "Enhancing the security of electronic commerce transactions." Thesis, Royal Holloway, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Alsaid, Adil. "Enhancing end user security : attacks and solutions." Thesis, Royal Holloway, University of London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Malan, LP, and Rooyen EJ van. "Community partnerships- enhancing municipal food security policy." Journal of Public Administration, 2010. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001174.

Full text
Abstract:
Whilst many developing countries engage in sound policy processes on macro level as far as economic and social development are concerned, the day-to-day victual needs of impoverished communities also depend on sound policies as well as appropriate arrangements, which take effect in the municipal sphere. Such needs, as food security, is dependant on the establishment of effective partnership agreements among all stakeholders, including local councils, district councils as well as metropolitan councils; the actual entities that are responsible to create the enabling environment in which food sec
APA, Harvard, Vancouver, ISO, and other styles
16

Krupp, Brian Michael. "Enhancing Security And Privacy For Mobile Systems." Cleveland State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=csu1432156543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hussein, Nesrin. "Enhancing Software Security through Modeling Attacker Profiles." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1523635219435409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Smedlund, Kristoffer. "Enhancing the security of an audit log." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-372076.

Full text
Abstract:
In todays society data breaches have become an all too common issue. Insecure databases allows intruders to access sensitive data. This thesis examines how to enhance the security of a relational database. The database is used as an audit log in a system platform at LeanOn AB. The security enhancements are made by implementing cryptographic hash sums to ensure that the data in the database can’t be altered without detection, and by implementing symmetric cryptography to ensure that only authorized people can read and write the data. Some basic security features that the database management sys
APA, Harvard, Vancouver, ISO, and other styles
19

Al-Hamar, Aisha. "Enhancing information security in organisations in Qatar." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33541.

Full text
Abstract:
Due to the universal use of technology and its pervasive connection to the world, organisations have become more exposed to frequent and various threats. Therefore, organisations today are giving more attention to information security as it has become a vital and challenging issue. Many researchers have noted that the significance of information security, particularly information security policies and awareness, is growing due to increasing use of IT and computerization. In the last 15 years, the State of Qatar has witnessed remarkable growth and development of its civilization, having embrace
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Yue. "On Enhancing Security of Password-Based Authentication." W&M ScholarWorks, 2019. https://scholarworks.wm.edu/etd/1563898928.

Full text
Abstract:
Password has been the dominant authentication scheme for more than 30 years, and it will not be easily replaced in the foreseeable future. However, password authentication has long been plagued by the dilemma between security and usability, mainly due to human memory limitations. For example, a user often chooses an easy-to-guess (weak) password since it is easier to remember. The ever increasing number of online accounts per user even exacerbates this problem. In this dissertation, we present four research projects that focus on the security of password authentication and its ecosystem. Firs
APA, Harvard, Vancouver, ISO, and other styles
21

Fischer-Hübner, Simone. "IT-security and privacy : design and use of privacy-enhancing security mechanisms /." Berlin [u.a.] : Springer, 2001. http://www.loc.gov/catdir/enhancements/fy0812/2001034161-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Zaaba, Zarul Fitri. "Enhancing usability using automated security interface adaptation (ASIA)." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3025.

Full text
Abstract:
Many users are now significantly dependent upon computer application. Whilst many aspects are now used very successfully, an area in which usability difficulties continue to be encountered is in relation to security. Thus can become particularly acute in situations where users are required to interact and make decisions, and a key context here is typically when they need to respond to security warnings. The current implementation of security warnings can often be considered as an attempt to offer a one size fits all solution. However, it can be argued that many implementations are still lackin
APA, Harvard, Vancouver, ISO, and other styles
23

Al-Talabani, Ali Mohammed Noori Hasan. "Enhancing physical layer security in cognitive radio networks." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/enhancing-physical-layer-security-in-cognitive-radio-networks(d9036158-5310-4292-b93d-f542354269a7).html.

Full text
Abstract:
A cognitive radio is an intelligent wireless communication system that improves spectrum utilisation by allowing secondary users to use the idle radio spectrum from primary licensed networks or to share the spectrum with primary users. Due to several significant challenges for cryptographic approaches of upper layers in protocol stacks | for example, private key management complexity and key transmission security issues | physical layer (PHY) security has drawn significant attention as an alternative for cryptographic approaches at the upper layers of the protocol stack. Security threats may a
APA, Harvard, Vancouver, ISO, and other styles
24

Jokhio, Imran Ali. "A scalable scheme for enhancing EPC network security." Thesis, University of Leeds, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.530830.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Cooney, Geoffrey T. (Geoffrey Thomas) 1980. "Optimizing neural networks for enhancing air traffic security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28382.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (leaves 81-83).<br>This thesis contains the process and results related to optimizing a neural network to predict future positions of airplanes in the vicinity of airports. These predicted positions are then used to calculate future separation distances between pairs of airplanes. The predicted values of the separation distance are used to ensure adequate distances between adjacent aircrafts in the air and, if necessary, to create early war
APA, Harvard, Vancouver, ISO, and other styles
26

Cadar, Cristian. "Enhancing availability and security through boundless memory blocks." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/33123.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.<br>Includes bibliographical references (leaves 49-52).<br>We present a new technique, boundless memory blocks, that automatically eliminates buffer overflow errors, enabling programs to continue to execute through memory errors without memory corruption. Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt other data structures. The standard way to exploit a
APA, Harvard, Vancouver, ISO, and other styles
27

Frantz, Miles Eugene. "Enhancing CryptoGuard's Deployability for Continuous Software Security Scanning." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98521.

Full text
Abstract:
The increasing development speed via Agile may introduce overlooked security steps in the process, with an example being the Iowa Caucus application. Verifying the protection of confidential information such as social security numbers requires security at all levels, providing protection through any connected applications. CryptoGuard is a static code analyzer for Java. This program verifies that developers do not leave vulnerabilities in their application. The program aids the developer by identifying cryptographic misuses such as hard-coded keys, weak program hashes, and using insecure proto
APA, Harvard, Vancouver, ISO, and other styles
28

Al-Shareeda, Sarah Yaseen Abdulrazzaq. "Enhancing Security, Privacy, and Efficiency of Vehicular Networks." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu150032914711847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Van, Balen Nicolas Jorge. "Enhancing Usability and Security through Alternative Authentication Methods." W&M ScholarWorks, 2017. https://scholarworks.wm.edu/etd/1516639579.

Full text
Abstract:
With the expanding popularity of various Internet services, online users have be- come more vulnerable to malicious attacks as more of their private information is accessible on the Internet. The primary defense protecting private information is user authentication, which currently relies on less than ideal methods such as text passwords and PIN numbers. Alternative methods such as graphical passwords and behavioral biometrics have been proposed, but with too many limitations to replace current methods. However, with enhancements to overcome these limitations and harden existing methods, alter
APA, Harvard, Vancouver, ISO, and other styles
30

Yi, Shanhe. "Enhancing Usability, Security, and Performance in Mobile Computing." W&M ScholarWorks, 2018. https://scholarworks.wm.edu/etd/1530192793.

Full text
Abstract:
We have witnessed the prevalence of smart devices in every aspect of human life. However, the ever-growing smart devices present significant challenges in terms of usability, security, and performance. First, we need to design new interfaces to improve the device usability which has been neglected during the rapid shift from hand-held mobile devices to wearables. Second, we need to protect smart devices with abundant private data against unauthorized users. Last, new applications with compute-intensive tasks demand the integration of emerging mobile backend infrastructure. This dissertation fo
APA, Harvard, Vancouver, ISO, and other styles
31

Liyanage, M. (Madhusanka). "Enhancing security and scalability of Virtual Private LAN Services." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213767.

Full text
Abstract:
Abstract Ethernet based VPLS (Virtual Private LAN Service) is a transparent, protocol independent, multipoint L2VPN (Layer 2 Virtual Private Network) mechanism to interconnect remote customer sites over IP (Internet Protocol) or MPLS (Multiprotocol Label Switching) based provider networks. VPLS networks are now becoming attractive in many Enterprise applications, such as DCI (data center interconnect), voice over IP (VoIP) and videoconferencing services due to their simple, protocol-independent and cost efficient operation. However, these new VPLS applications demand additional requirements, s
APA, Harvard, Vancouver, ISO, and other styles
32

Saed, Mustafa. "Techniques for Enhancing the Security of Future Smart Grids." Thesis, University of Detroit Mercy, 2019. http://pqdtopen.proquest.com/#viewpdf?dispub=10793626.

Full text
Abstract:
<p> The smart grid is a new technology that uses new and sophisticated techniques for electrical transmission and distribution in order to provide excellent electrical service to customers, and allow them to manage their electricity consumption in a two-way communication. The idea of the &ldquo;Smart Grid&rdquo; was most likely invented by researchers and engineers at the U.S. Department of Energy, who were concerned with increasing the level of functionalities and intelligence of the contemporary electrical grid. Some of these functionalities typically include knowledge about generation, the
APA, Harvard, Vancouver, ISO, and other styles
33

Dresser, Eric L. (Eric Lane). "The effectiveness and economic impact of enhancing container security." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/33424.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Ocean Engineering, 2004.<br>Includes bibliographical references (p. 96-101).<br>Over the past few decades, international containerized shipping has evolved to become the main artery of global trade, providing both convenient and inexpensive access to goods from markets around the world. Yet the very size and efficiencies that have made container shipping such an attractive means of transport have also created a system that is highly vulnerable to terrorist exploitation. This paper outlines the current initiatives taken by both the
APA, Harvard, Vancouver, ISO, and other styles
34

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.

Full text
Abstract:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramif
APA, Harvard, Vancouver, ISO, and other styles
35

Wild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems." Doctoral thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-217284.

Full text
Abstract:
Web systems have become an integral part in daily life of billions of people. Social is a key characteristic today’s web projects need to feature in order to be successful in the social age. To benefit from an improved user experience, individual persons are continually invited to reveal more and more personal data to web systems. With a rising severity of attacks on web systems, it is evident that their security is inadequate for the amount of accumulated personal data. Numerous threat reports indicate that social media has become a top-ranking attack target, with climbing impacts, with ramif
APA, Harvard, Vancouver, ISO, and other styles
36

Lee, Danielle. "Enhancing national security by strengthening the legal immigration system." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLee_Danielle.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense)--Naval Postgraduate School, December 2009.<br>Thesis Advisor(s): Bach, Robert; Joyce, Nola. "December 2009." Description based on title screen as viewed on January 26, 2009. Author(s) subject terms: U.S. Citizenship and Immigration Services (USCIS), immigration, benefit, fraud, terrorism, border security, watch list, immigration reform. Includes bibliographical references (p. 83-91). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
37

Bi, Ying. "Enhancing Physical-Layer Security in Wireless Powered Communication Networks." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/16890.

Full text
Abstract:
In modern society, the communications sector is a critical enabler of economic and social activity. Despite the benefit of the improved ubiquitousness, the rapid diffusion of communications technologies is driving one to question the security of communications networks and systems. It is this situation which has motivated the research and development work to be reported in this thesis. Especially, this thesis consists of two parts: The first part focuses on our main research under the umbrella of physical-layer security (PLS), and the second part presents our work on security and data manageme
APA, Harvard, Vancouver, ISO, and other styles
38

Reid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16379/1/Jason_Reid_Thesis.pdf.

Full text
Abstract:
The need to increase the hostile attack resilience of distributed and internet-worked computer systems is critical and pressing. This thesis contributes to concrete improvements in distributed systems trustworthiness through an enhanced understanding of a technical approach known as trusted computing hardware. Because of its physical and logical protection features, trusted computing hardware can reliably enforce a security policy in a threat model where the authorised user is untrusted or when the device is placed in a hostile environment. We present a critical analysis of vulnerabilit
APA, Harvard, Vancouver, ISO, and other styles
39

Reid, Jason Frederick. "Enhancing security in distributed systems with trusted computing hardware." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16379/.

Full text
Abstract:
The need to increase the hostile attack resilience of distributed and internet-worked computer systems is critical and pressing. This thesis contributes to concrete improvements in distributed systems trustworthiness through an enhanced understanding of a technical approach known as trusted computing hardware. Because of its physical and logical protection features, trusted computing hardware can reliably enforce a security policy in a threat model where the authorised user is untrusted or when the device is placed in a hostile environment. We present a critical analysis of vulnerabilit
APA, Harvard, Vancouver, ISO, and other styles
40

Miguel, Moneo Jorge. "An information security model based on trustworthiness for enhancing security in on-line collaborative learning." Doctoral thesis, Universitat Oberta de Catalunya, 2015. http://hdl.handle.net/10803/399030.

Full text
Abstract:
L'objectiu principal d'aquesta tesi és incorporar propietats i serveis de la seguretat en sistemes d'informació en l'aprenentatge col·laboratiu en línia, seguint un model funcional basat en la valoració i predicció de la confiança. Aquesta tesi estableix com a punt de partença el disseny d'una solució de seguretat innovadora, basada en una metodologia pròpia per a oferir als dissenyadors i gestors de l'e-learning les línies mestres per a incorporar mesures de seguretat en l'aprenentatge col·laboratiu en línia. Aquestes guies cobreixen tots els aspectes sobre el disseny i la gestió que s'han de
APA, Harvard, Vancouver, ISO, and other styles
41

Nia, Ramadianti Putri Mganga, and Medard Charles. "Enhancing Information Security in Cloud Computing Services using SLA based metrics." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1999.

Full text
Abstract:
Context: Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and regulatory risks. As an initiative to address such risks, organizations can develop and implement SLA to establish common expectations and goals between the cloud provider and customer. Organizations can base on the SLA to measure the achievement of the outsource
APA, Harvard, Vancouver, ISO, and other styles
42

Guymon, Daniel Wade. "Cyber-physical Algorithms for Enhancing Collaboration." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/31919.

Full text
Abstract:
The research presented in this thesis covers two specific problems within the larger domain of cyber-physical algorithms for enhancing collaboration between one or more people. The two specific problems are 1) determining when people are going to arrive late to a meeting and 2) creating ad-hoc secure pairing protocols for short-range communication. The domain was broken down at opposite extremes in order to derive these problems to work on: 1) collaborations that are planned long in advance and deviations from the plan need to be detected and 2) collaborations that are not planned and need t
APA, Harvard, Vancouver, ISO, and other styles
43

Feng, Yuhui. "Enhancing Efficiency of Beaconing in VANETs." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1461253651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

KANADE, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-01057728.

Full text
Abstract:
Securing information during its storage and transmission is an important and widely addressed issue. Generally, cryptographic techniques are used for information security. Cryptography requires long keys which need to be kept secret in order to protect the information. The drawback of cryptography is that these keys are not strongly linked to the user identity. In order to strengthen the link between the user's identity and his cryptographic keys, biometrics is combined with cryptography. In this thesis, we present various methods to combine biometrics with cryptography. With this combination,
APA, Harvard, Vancouver, ISO, and other styles
45

Kanade, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography." Thesis, Evry, Institut national des télécommunications, 2010. http://www.theses.fr/2010TELE0022/document.

Full text
Abstract:
La sécurité est un enjeu majeur de notre société numérique. En règle générale, les techniques cryptographiques sont utilisées pour sécuriser l'information avec des clés cryptographiques. Un inconvénient majeur de ces systèmes est le faible lien entre les clés et l’utilisateur. Avec la biométrie on a une preuve plus forte de la présence physique d’un individu, mais ces systèmes possèdent aussi leurs inconvénients, tels que la non-révocabilité ainsi que le potentiel de compromettre notre vie privée. Un axe de recherche multidisciplinaire se profile depuis 1998, la crypto-biométrie. Dans cette th
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Weigang. "Enhancing physical layer security in wireless networks with cooperative approaches." Thesis, University of Edinburgh, 2016. http://hdl.handle.net/1842/19565.

Full text
Abstract:
Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the pr
APA, Harvard, Vancouver, ISO, and other styles
47

Shepherd, Lynsay A. "Enhancing security risk awareness in end-users via affective feedback." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/e5af92fb-4936-43d2-878e-fbc16711e36d.

Full text
Abstract:
Background: Risky security behaviour displayed by end-users has the potential to leave devices vulnerable to compromise, despite the availability of security tools designed to aid users in defending themselves against potential online threats. This indicates a need to modify the behaviour of end-users, allowing them to consider the security implications of their actions online. Previous research has indicated affective feedback may serve as a successful method of educating users about risky security behaviours. Thus, by influencing end-users via affective feedback it may be possible to engage
APA, Harvard, Vancouver, ISO, and other styles
48

Spencer, David K. "Enhancing the European Union's development strategy in Afghanistan." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FSpencer.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Europe and Eurasia))--Naval Postgraduate School, June 2010.<br>Thesis Advisor(s): Spencer, David K.; Siegel, Scott N. "June 2010." Description based on title screen as viewed on July 14, 2010. Author(s) subject terms: European Union, Afghanistan, regional development strategy, sustainable economic growth, development coordination, private sector, European Commission, European Council, EU member states, value chain, ANDS, Afghanistan National Development Strategy, UNAMA, JCMB, Nangarhar Inc, Provincial Development Plan, PDP, Lisbon Treaty, NGO, super envoy,
APA, Harvard, Vancouver, ISO, and other styles
49

Vilarinho, Thomas Carlyle. "Trusted secure service design : Enhancing trust with the future sim-cards." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9013.

Full text
Abstract:
<p>The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This thesis assess how this new SIM capabilities together with its pervasiveness and security can support the development and design of trust-based applications. It reviews the new trust possibilities based on the identity factor, connectivity and context-awareness sensors on the SIM. Moreover, we present a specific use-case around a seamless trust builder for social networks, which makes use of sensed
APA, Harvard, Vancouver, ISO, and other styles
50

Gill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.

Full text
Abstract:
Home automation systems (HASs)seek to improve the quality of life for individuals through the automation of household devices. Recently, there has been a trend, in academia and industry, to research and develop low-cost Wireless Sensor Network (WSN) based HASs (Varchola et al. 2007). WSNs are designed to achieve a low-cost wireless networking solution, through the incorporation of limited processing, memory, and power resources. Consequently, providing secure and reliable remote access for resource limited WSNs, such as WSN based HASs, poses a significant challenge (Perrig et al. 2004). This t
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!