Browsing Department of Computer Science and Engineering by Author "Wright, Matthew"
Now showing items 21-36 of 36
-
Modeling An Intelligent Intruder In A Region Monitored By A Wireless Sensor Network
Srinivasan, Sriram (Computer Science & Engineering, 2014-03-12)Monitoring to detect unauthorized border crossing is very important for protecting national security. To accomplish this by continuous physical monitoring by border patrol agents is impractical. Networks of low-cost wireless ... -
Peon: Privacy-enhanced Opportunistic Networks With Applications In Assistive Environments
Vakde, Gauri (Computer Science & Engineering, 2010-07-19)Opportunistic Networking holds a great deal of potential for making communications easier and more flexible in pervasive assistive environments. However, security and privacy must be addressed to make these communications ... -
Privacy For Location Based Services With Smartphones
Spargo, James Nathaniel (Computer Science & Engineering, 2011-07-14)In recent years, mobile devices and smartphones enabled with GPS and Inter-net access have become extremely common. People use these devices as they woulda personal computer for easy access to information. Location Based ... -
The Reputation System For Robust, Structured P2p Systems
Dhadphale, Apurv Ashok (Computer Science & Engineering, 2010-03-03)Structured peer-to-peer systems are distributed communication systems that typically use Distributed Hash Table (DHT) indexing to efficiently locate the resources. These networks are highly scalable and can route the ... -
Selective Cross Correlation In Passive Timing Analysis Attacks Against Low-latency Mixes
Abraham, Titus (Computer Science & Engineering, 2010-07-19)A mix is a communication proxy that hides the relationship between incoming and outgoing messages. Routing traffic through a path of mixes is a powerful tool for providing privacy. When mixes are used for interactive ... -
Selective Grouping Algorithm For Low Latency Anonymous Systems
Gupta, Vishal (Computer Science & Engineering, 2013-03-20)Low latency anonymous communications are prone to timing analysis attacks. It is a technique by which the adversary can de-anonymize the user by correlating packet timing patterns. A recent proposal to stop these attacks ... -
Shaping And Maintenance Of Low-latency Anonymity Systems
Doreswamy, Harsha (Computer Science & Engineering, 2013-03-20)Surveillance of users on the Internet is growing. This makes it increasingly important to protect users' identity when they communicate online, especially for users like journalists, whistleblowers, and military officials. ... -
Shaping Network Topology For Privacy And Performance
Hasan, Md Monjurul (Computer Science & Engineering, 2013-03-20)Anonymity systems provide privacy for Internet communication and are becoming popular. Unfortunately, users experience slow Internet connection through existing systems because paths used to route traffic are selected ... -
Stepping-stone Network Attack Kit (SNEAK) For Evading Timing-based Detection Methods Under The Cloak Of Constant Rate Multimedia Streams
Padhye, Jaideep D. (Computer Science & Engineering, 2008-09-17)With the advent of the Internet, network-based security threats have been constantly on the rise. The source of an attack could be traced by studying the system logs and the source IP address of the attack can be used to ... -
SubRosa 2 : An Experimental Evaluation Of Timing Analysis Attacks And Defenses In Anonymity Systems
Sirinam, Payap (Computer Science & Engineering, 2013-03-20)A circuit-based low-latency anonymous communication service such as Tor helps Internet users hide their IP addresses and thereby conceal their identities when communicating online. However, this kind of service is vulnerable ... -
Subrosa: An Experimental Platform For Studying Timing Analysis Of Real Time Anonymity Systems
Daginawala, Hatim Asger (Computer Science & Engineering, 2008-08-08)Timing analysis poses a significant challenge for the mix based anonymous systems that wish to support low-latency applications like web browsing, instant messaging and Voice over IP (VOIP). Research in this area so far ... -
Sybil Defense For Online Social Networks Using Partial Graph Information
Naresh Jain, Vritant (Computer Science & Engineering, 2012-04-11)Online social networks (OSNs) today are proprietary, in the sense that communication between users requires the users to be part of the same OSN. This raises privacy issues and reliability concerns among users, and calls ... -
The Impact of Cues and User Interaction on the Memorability of System-assigned Random Passwords
Al Ameen, Mahdi Nasrullah (2016-05-02)Given the choice, users produce passwords reflecting common strategies and patterns that ease recall but offer uncertain and often weak security. Addressing this usability-security tension in user authentication remains ... -
Towards A Stronger Peer-to-peer Anonymous System
Nambiar, Arjun R (Computer Science & Engineering, 2007-08-23)Anonymous communications systems on the Internet provides protection against eavesdroppers and others that seek to link users with their communications. These systems have many important applications in areas such as law ... -
Towards An Implementation Of Avoip: Anonymous Voice-over-ip
Gurung, Bikas Raj (Computer Science & Engineering, 2009-09-16)Voice over IP (VoIP) is one of the fastest growing telecommunicaiton market today. However with great popularity comes greater security risk. When we communicate over the Internet we expose our identity to all the prying ... -
Towards Modeling The Behavior Of Physical Intruders In A Region Monitored By A Wireless Sensor Network
Krishnamoorthy, Pranav (Computer Science & Engineering, 2010-07-19)A priority task for homeland security is the coverage of large spans of open border that cannot be continuously physically monitored for intrusion. Low-cost monitoring solutions based on wireless sensor networks have been ...