• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1109
  • 379
  • 210
  • 133
  • 95
  • 75
  • 37
  • 19
  • 18
  • 18
  • 16
  • 15
  • 15
  • 15
  • 12
  • Tagged with
  • 2457
  • 610
  • 607
  • 376
  • 324
  • 321
  • 267
  • 257
  • 252
  • 234
  • 226
  • 217
  • 210
  • 204
  • 185
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
381

Online catalogue research and the verbal protocol method

Morrison, Heather January 1999 (has links)
The verbal protocol method is used extensively in computer usability studies. This study was designed to test the feasibility of using the verbal protocol method as a means of conducting field research on the online catalogue. Ten undergraduate students conducted their own research on DRA’s Infogate. As they searched, they talked aloud about what keys they were pressing, what was happening on the screen, and their reactions. Transcripts of sessions were analyzed. A total of 65 different problems or comments were noted during search sessions, with 11 problems or comments noted in three or more sessions. This supports the hypothesis that the verbal protocol method is a valuable means of identifying common problems for users. It is suggested that the verbal protocol method offers great potential as a research tool in librarianship, for example in the area of interface design.
382

ENERGY EFFICIENT SECURITY FOR WIRELESS SENSOR NETWORKS

Moh'd, Abidalrahman 18 June 2013 (has links)
This thesis presents two main achievements. The first is a novel link-layer encryption protocol for wireless sensor networks. The protocol design aims to reduce energy consumption by reducing security-related communication overhead. This is done by merging security-related data of consecutive packets. The merging is based on simple mathematical operations. It helps to reduce energy consumption by eliminating the requirement to transmit security-related fields in the packet. The protocol is named the Compact Security Protocol and is referred to as C-Sec. In addition to energy savings, the C-Sec protocol also includes a unique security feature of hiding the packet header information. This feature makes it more difficult to trace the flow of wireless communication, and helps to minimize the effect of replay attacks. The C-Sec protocol is rigorously tested and compared with well-known related protocols. Performance evaluations demonstrate that C-Sec protocol outperforms other protocols in terms of energy savings. The protocol is evaluated with respect to other performance metrics including queuing delay and error probability. The C-Sec operation requires fast encryption, which leads to a second major contribution: The SN-Sec, a 32-bit RISC secure wireless sensor platform with hardware cryptographic primitives. The security vulnerabilities in current WSNs platforms are scrutinized and the main approaches to implementing their cryptographic primitives are compared in terms of security, time, and energy efficiency. The SN-Sec secures these vulnerabilities and provides more time and energy efficiency. The choice of cryptographic primitives for SN-Sec is based on their compatibility with the constrained nature of WSNs and their security. The AES implementation has the best data-path and S-Box design in the literature. All SHA family members are implemented and compared to choose the most compatible with WSN constraints. An efficient elliptic-curve processor design is proposed. It has the least mathematical operations compared to elliptic-curve processors proposed for WSNs in the literature. It also exploits parallelism among mathematical operations to compute elliptic-curve point multiplication with minimal amount of clock cycles. SN-Sec is implemented using VHDL. Experimental results using synthesis for Spartan-6 low-power FPGA shows that the proposed design has very reasonable computational time and energy consumption.
383

Syntax-based Security Testing for Text-based Communication Protocols

Kam, Ben W. Y. 30 April 2010 (has links)
We introduce a novel Syntax-based Security Testing (SST) framework that uses a protocol specification to effectively perform security testing on text-based communication protocols. A protocol specification of a particular text-based protocol under-tested (TPUT) represents its syntactic grammar and static semantic contracts on the grammar. Mutators written in TXL break the syntactic and semantic constraints of the protocol specification to generate test cases. Different protocol specification testing strategies can be joined together to yield a compositional testing approach. SST is independent of any particular text-based protocols. The power of SST stems from the way it obtains test cases from the protocol specifications. We also use the robust parsing technique with TXL to parse a TPUT. SST has successfully revealed security faults in different text-based protocol applications such as web applications and kOganizer. We also demonstrate SST can mimic the venerable PROTOS Test-Suite: co-http-reply developed by University of Oulu. / Thesis (Ph.D, Computing) -- Queen's University, 2010-04-30 16:01:18.048
384

Policy Based Network management of legacy network elements in next generation networks for Voice Services

Naidoo, Vaughn January 2002 (has links)
No description available.
385

An available bit-rate service class for multicast IP transport over satellite using online measurement and wavelet-based predictive bandwidth allocation

Hrastar, Scott E. 12 1900 (has links)
No description available.
386

Best-effort traffic engineering in multiprotocol label switched networks

Koehler, Bernd G. 05 1900 (has links)
No description available.
387

Congestion avoidance in TCP/IP networks

Arpaci, Mutlu 12 1900 (has links)
No description available.
388

Open architecture control system for a modular reconfigurable machine tool.

Amra, A. Q. M. 12 September 2014 (has links)
The present day manufacturing environment has forced manufacturing systems to be flexible and adaptable to be able to match the product demands and frequent introduction of new products and technologies. This research forms part of a greater research initiative that looks at the development of the reconfigurable manufacturing paradigm. Previous research has shown that the lack of development of a Modular Reconfigurable Manufacturing Tools (MRMT) and Open Architecture Control System (OACS) is currently a key limiting factor to the establishment of Reconfigurable Manufacturing Systems (RMS), which has been the primary motivation for this research. Open Architecture (OA) systems aim to bring the ideas of RMS to control systems for machining systems. An OA system incorporates vendor neutrality, portability, extendibility, scalability and modularity. The research has proposed, designed and developed a novel solution that incorporates these core principles allowing the system to be flexible in mechanical and control architectures. In doing so, the system can be reconfigured at any time to match the specific manufacturing functionality required at that time thereby prolonging the lifecycle of the machine via multiple reconfigurations over time, in addition to decreasing the cost of system modifications due to a well-defined modular system. The reconfiguration and machining variance is achieved by the introduction of mechanical and control modules that extend the Degrees of Freedom (DOF’s) available to the system. The OACS has been developed as a modular solution that links closely to the existing mechanical modularity on the RMT to maximize the reconfigurability of the system. The aim was to create a one to one link between mechanical and electronic hardware and the software system. This has been achieved by the addition of microcontroller based distributed modules which acts as the interface between the electro-mechanical machine axes via hardwired signals and the host PC via the CAN bus communication interface. The distributed modules have been developed on different microcontrollers, which have successfully demonstrated the openness and customizability of the system. On the host PC, the user is presented with a GUI that allows the user to configure the control system based on the MRMT physical configuration. The underlying software algorithms such as, text Interpretation, linear interpolation, PID or PI controllers and determination of kinematic viability are part of the OACS and are used at run time for machine operation. The machining and control performance of the system is evaluated on the previously developed MRMT. The performance evaluation also covers the analysis of the reconfigurability and scalability of the system. The research is concluded with a presentation based on conclusions drawn from the research covering the challenges, limitations and problems that OA and RMS can face before MRMT become readily available for industry. / M.Sc.Eng. University of KwaZulu-Natal, Durban 2013.
389

A Peer to Peer Security Protocol for the Internet of Things : Secure Communication for the SensibleThings Platform

Zhang, Hao January 2014 (has links)
With the rapid development of the Internet connected technologies and applications, people are keen on embracing the convenience and practi-­‐‑ calities they brings. As all kinds of technologies improve, the Internet of Things matures and is able to provide more advanced services to people, which connects a variety of devices, systems and applications beyond traditional machine-­‐‑to-­‐‑machine. However, it covers a variety of devices, protocols and applications, which makes it much more complex than a normal network. Nevertheless, equipped with appropriate security solutions, the Internet of Things is promising to bring us more conven-­‐‑ iences and be widely applied in our daily life. And like the main appli-­‐‑ cation areas, wireless sensor networks with a frequent but short com-­‐‑ munication character, it requires an efficient and flexible protocol to protect the information. To protect the traffic of the Internet of Things is the focal point of this research work. Although many protocols for the Internet have been put forward, it is still not enough to meet the increas-­‐‑ ingly complex requirements from applications. Many of them are not efficient enough to adapt the device diversity and timely communica-­‐‑ tion environment. This research work is trying to address this problem, by proposing a peer-­‐‑to-­‐‑peer security protocol to satisfy this varied environment. Secure communication is implemented on an open sourced platform for the Internet of Things. The philosophy of the platform it implemented on is also inherited to this protocol and the implementation. It avoids unnecessary handshakes between entities, which makes it more efficient in a wireless sensor network. Modulariza-­‐‑ tion and unit test are adapted in implementation to enhance the robust of the system. Its dynamic security level adjustment feature satisfies the realistic demand on one platform this protocol is implemented on. Finally, with a comparison test and an analysis using the BAN logic, the result shows that the proposed protocol is efficient to meet the specific goals and applicable for the platform. / SensibleThings Platform
390

Fuzzy Authorization for Cloud Storage

Zhu, Shasha January 2013 (has links)
It is widely accepted that OAuth is the most popular authorization scheme adopted and implemented by industrial and academic world, however, it is difficult to adapt OAuth to the situation in which online applications registered with one cloud party intends to access data residing in another cloud party. In this thesis, by leveraging Ciphertext-Policy Attribute Based Encryption technique and Elgamal-like mask over the protocol, we propose a reading authorization scheme among diverse clouds, which is called fuzzy authorization, to facilitate an application registered with one cloud party to access to data residing in another cloud party. More importantly, we enable the fuzziness of authorization thus to enhance the scalability and flexibility of file sharing by taking advantage of the innate connections of Linear Secret-Sharing Scheme and Generalized Reed Solomon code. Furthermore, by conducting error checking and error correction, we eliminate operation of satisfying a access tree. In addition, the automatic revocation is realized with update of TimeSlot attribute when data owner modifies the data. We prove the security of our schemes under the selective-attribute security model. The protocol flow of fuzzy authorization is implemented with OMNET++ 4.2.2 and the bi-linear pairing is realized with PBC library. Simulation results show that our scheme can achieve fuzzy authorization among heterogeneous clouds with security and efficiency.

Page generated in 0.0386 seconds