Browsing MS Theses - DO NOT EDIT by Author "Wright, Matthew"
Now showing items 1-20 of 31
-
A NEW REAL-TIME APPROACH FOR WEBSITE PHISHING DETECTION BASED ON VISUAL SIMILARITY
Asudeh, Omid; 0000-0002-5737-1780 (2016-05-10)Phishing attacks cause billions of dollars of loss every year worldwide. Among several solutions proposed for this type of attack, visual similarity detection methods have a good amount of accuracy. These methods exploit ... -
A STUDY OF USING MULTIPLE CUES TO AID PEOPLE WITH LEARNING DISABILITIES IN LEARNING SYSTEM-ASSIGNED PASSWORDS
Marne, Sonali Tukaram (2017-06-06)Traditional user-chosen passwords often offer weak password security and are prone to password reuse and password patterns whereas system-assigned passwords are secure but fail to provide sufficient memorability. LDs are ... -
Dovetail: Stronger Anonymity In Next-generation Internet Routing
Sankey, Jody Mark (Computer Science & Engineering, 2013-07-22)Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than this ... -
The Dynamics Of Salsa: A Structured Approach To Large-scale Anonymity
Khan, Safwan Mahmud (Computer Science & Engineering, 2008-09-17)Anonymity provides a technical solution for protecting one's online privacy. Highly distributed peer-to-peer (P2P) anonymous systems should have better distribution of trust and more scalability than centralized approaches, ... -
Evading Existing Stepping Stone Detection Methods Using Buffering
Venkateshaiah, Madhu (Computer Science & Engineering, 2007-08-23)To gain anonymity and complicate their apprehension, attackers launch attacks not from their own systems but from previously compromised systems called stepping stones. An effective way to detect stepping stones is by ... -
EVALUATION OF HTML TAG SUSCEPTIBILITY TO STATISTICAL FINGERPRINTING FOR USE IN CENSORSHIP EVASION
French, Kelly Scott (2016-12-08)The ability to speak freely has always been a source of conflict between rulers and the people over which they exert power. This conflict usually takes the form of State-sponsored censorship with occasional instances of ... -
Fast And Energy-efficient Technique For Jammed Region Mapping In Wireless Sensor Networks
Rahman, Nabila (Computer Science & Engineering, 2010-11-01)Wireless sensor networks (WSNs) have great practical importance for surveillance systems to perform monitoring by acquiring and sending information about intrusions into a secured area. Very little human intervention is ... -
The Impact Of Different Cues on the Memorability Of System-assigned Recognition-based Textual Passwords
Fatema, KanisTo ensure memorability, users employ predictable patterns when creating new passwords. These patterns make passwords easy to guess, which not only increases risks to users but also for the entire system. In contrast, ... -
Improving Memorization and Long Term Recall of System Assigned Passwords
Doolani, Jayesh; 0000-0003-0926-1373 (2016-12-20)Systems assigned password have guaranteed robustness against guessing attacks, but they are hard to memorize. To make system assigned passwords more usable, it is of prime importance that systems that assign random password ... -
Improving Tor Performance By Modifying Path Selection
Amirabadi, Mehrdad (Computer Science & Engineering, 2014-12)Tor is a popular volunteer-based overlay network that provides anonymity andprivacy for Internet users. Using the Onion Proxy (OP) client, users connect to anetwork of Onion Routers (ORs) and send their traffic through an ... -
Lilac: Architecture For Anonymous Light Weight Communication
Upadhyaya, Ankit (Computer Science & Engineering, 2013-10-23)We present lilac; a circuit based low latency anonymous light weight instant messaging communication system. This browser based chat platform provides anonymity in context with unlinkability and unobservability for the ... -
LILAC: THE SECOND GENERATION LIGHTWEIGHT LOW-LATENCY ANONYMOUS CHAT.
Pobala, Revanth Rao (2016-08-15)Instant messaging is one of the most used modes of communication and there are many instant messaging systems available online. Studies from the Electronic Frontier Foundation show that there are only a few instant messengers ... -
Liquid: A Detection Resistant Covert Timing Channel Based On Ipd Shaping
Walls, Robert J. (Computer Science & Engineering, 2009-09-16)Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-security level to an entity in a lower level. The difficulty of detecting or eliminating such channels makes them a desirable ... -
Measurements Of A Latency-biased Expander Topology In The Tor Anonymity System
Dutta Chowdhuri, Subhasish (Computer Science & Engineering, 2013-03-20)Anonymous communication systems protect the privacy of their users by hiding who is communicating with whom. With the widespread use of the Internet, anonymity systems are all the more essential to support applications ... -
A Method To Evade Keyword Based Censorship
Patil, Ritu R. (Computer Science & Engineering, 2014-12)Many countries block the content of web pages which are deemed against the morals, religious rules or policies set by government or organization. Countries like China block the post which is against their government interest. ... -
Mimic: An Active Covert Channel That Evades Regularity-based Detection
Kothari, Kush (Computer Science & Engineering, 2010-07-19)A covert timing channel is a hidden communication channel based on network timing that an attacker can use to sneak secrets out of a secure system. Active covert channels, in which the attacker uses a program to automatically ... -
Modeling An Intelligent Intruder In A Region Monitored By A Wireless Sensor Network
Srinivasan, Sriram (Computer Science & Engineering, 2014-03-12)Monitoring to detect unauthorized border crossing is very important for protecting national security. To accomplish this by continuous physical monitoring by border patrol agents is impractical. Networks of low-cost wireless ... -
Peon: Privacy-enhanced Opportunistic Networks With Applications In Assistive Environments
Vakde, Gauri (Computer Science & Engineering, 2010-07-19)Opportunistic Networking holds a great deal of potential for making communications easier and more flexible in pervasive assistive environments. However, security and privacy must be addressed to make these communications ... -
Privacy For Location Based Services With Smartphones
Spargo, James Nathaniel (Computer Science & Engineering, 2011-07-14)In recent years, mobile devices and smartphones enabled with GPS and Inter-net access have become extremely common. People use these devices as they woulda personal computer for easy access to information. Location Based ... -
The Reputation System For Robust, Structured P2p Systems
Dhadphale, Apurv Ashok (Computer Science & Engineering, 2010-03-03)Structured peer-to-peer systems are distributed communication systems that typically use Distributed Hash Table (DHT) indexing to efficiently locate the resources. These networks are highly scalable and can route the ...