• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • Tagged with
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Cryptography and Computer Communications Security. Extending the Human Security Perimeter through a Web of Trust

Adeka, Muhammad I. January 2015 (has links)
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret data; as against sharing the data itself. This is significant in cloud computing, especially with homomorphic encryption. Using web design, the resultant scheme practically globalises secret sharing with authentications and inherent secondary applications. The work aims at improving cybersecurity via a joint exploitation of human factors and technology; a human-centred cybersecurity design as opposed to technology-centred. The completed functional scheme is tagged CDRSAS. The literature on secret sharing schemes is reviewed together with the concepts of human factors, trust, cyberspace/cryptology and an analysis on a 3-factor security assessment process. This is followed by the relevance of passwords within the context of human factors. The main research design/implementation and system performance are analysed, together with a proposal for a new antidote against 419 fraudsters. Two twin equations were invented in the investigation process; a pair each for secret sharing and a risk-centred security assessment technique. The building blocks/software used for the CDRSAS include Shamir’s algorithm, MD5, HTML5, PHP, Java, Servlets, JSP, Javascript, MySQL, JQuery, CSS, MATLAB, MS Excel, MS Visio, and Photoshop. The codes are developed in Eclipse IDE, and the Java-based system runs on Tomcat and Apache, using XAMPP Server. Its code units have passed JUnit tests. The system compares favourably with SSSS. Defeating socio-cryptanalysis in cyberspace requires strategies that are centred on human trust, trust-related human attributes, and technology. The PhD research is completed but there is scope for future work. / Petroleum Technology Development Fund (PTDF), Abuja, Nigeria.
2

Cryptography and computer communications security : extending the human security perimeter through a web of trust

Adeka, Muhammad I. January 2015 (has links)
This work modifies Shamir’s algorithm by sharing a random key that is used to lock up the secret data; as against sharing the data itself. This is significant in cloud computing, especially with homomorphic encryption. Using web design, the resultant scheme practically globalises secret sharing with authentications and inherent secondary applications. The work aims at improving cybersecurity via a joint exploitation of human factors and technology; a human-centred cybersecurity design as opposed to technology-centred. The completed functional scheme is tagged CDRSAS. The literature on secret sharing schemes is reviewed together with the concepts of human factors, trust, cyberspace/cryptology and an analysis on a 3-factor security assessment process. This is followed by the relevance of passwords within the context of human factors. The main research design/implementation and system performance are analysed, together with a proposal for a new antidote against 419 fraudsters. Two twin equations were invented in the investigation process; a pair each for secret sharing and a risk-centred security assessment technique. The building blocks/software used for the CDRSAS include Shamir’s algorithm, MD5, HTML5, PHP, Java, Servlets, JSP, Javascript, MySQL, JQuery, CSS, MATLAB, MS Excel, MS Visio, and Photoshop. The codes are developed in Eclipse IDE, and the Java-based system runs on Tomcat and Apache, using XAMPP Server. Its code units have passed JUnit tests. The system compares favourably with SSSS. Defeating socio-cryptanalysis in cyberspace requires strategies that are centred on human trust, trust-related human attributes, and technology. The PhD research is completed but there is scope for future work.
3

Three Essays on Demographic Changes and International Trade

Zhang, Qi January 2015 (has links)
Chapter 1: A Population Aging Analysis for Canada Using the National Transfer Accounts Approach: This analysis develops a new data set for Canada using an accounting methodology called National Transfer Accounts (NTA). NTA permits building an accounting system that introduces age into national accounts. NTA is consistent with the conventional national accounts and allows the estimation of lifecycle patterns for labour income and consumption from private and public sources. It also allows the calculation of per capita and aggregate lifecycle deficits (LCD) or surpluses (LCS) in an economy. In this chapter we calculate Canada’s per capita and aggregate LCD for 2006. Using demographic projections for the next five decades, we present the aggregate LCD in Canada for the period 2006 to 2056 assuming a constant per capital LCD during this time horizon. The projection results show that labour income needs to increase rapidly or consumption needs to be cut significantly to compensate for the pressure on the aggregate lifecycle deficit as a result of population aging. Chapter 2: An Overlapping Generations Computable General Equilibrium (OLG-CGE) Model with Age-dependent Rates of Time Preference: This analysis develops a methodology to introduce an age-dependent rate of time preference to calibrate an OLG-CGE model with per capita age profile consumption path derived from the NTA framework of Chapter 1. The results show that the economic impact from an aging population will be significant. The living standard will decline by 15% from the present to 2050 and decline by 20% by the year 2105. To reduce such a decline, the Canadian government may introduce policies that could encourage labour force participation. We analyze the impact of: a) an increase in the general labour force participation rate for age 20 to 64; b) an increase in the labour force participation rate for workers aged 50 to 64; c) late retirement. Our results suggest that maintaining the current standard of living will be extremely difficult after 2026. Nevertheless, this would help reduce the economic pressure from population aging. Chapter 3: 9/11 Security Measures and North American Security Perimeter: A Computable General Equilibrium Analysis: The objective of this analysis is to assess the impact of the North American Security Perimeter (NASP) on both the Canadian and the U.S. economies. The NASP is a change in Canada-U.S. security paradigm that would allow the liberalization of the post 9/11 security measures at the Canada-U.S. border. This study applies a multi-sector and multi-region general equilibrium model together with econometric analysis. After simulating the NASP, Canada’s capital market was found to become more attractive. Under the NASP, the welfare of Canada is estimated to increase by $19 billion or 1.8% of GDP, and that of the U.S. is estimated to increase by $32 billion or 0.3% of GDP.
4

A Versatile and Ubiquitous Secret Sharing: A cloud data repository secure access

Adeka, Muhammad I., Shepherd, Simon J., Abd-Alhameed, Raed, Ahmed, N.A.S. January 2015 (has links)
No / The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing scheme is a method by which a dealer distributes shares of a secret data to trustees, such that only authorised subsets of the trustees can reconstruct the secret. This paper gives a brief summary of the layout and functions of a 15-page secure server-based website prototype; the main focus of a PhD research effort titled ‘Cryptography and Computer Communications Security: Extending the Human Security Perimeter through a Web of Trust’. The prototype, which has been successfully tested, has globalised the distribution and reconstruction processes. / Petroleum Technology Development Fund
5

Extending the security perimeter through a web of trust: the impact of GPS technology on location-based authentication techniques

Adeka, Muhammad I., Shepherd, Simon J., Abd-Alhameed, Raed January 2013 (has links)
No / Security is a function of the trust that is associated with the active variables in a system. Thus, the human factor being the most critical element in security systems, the security perimeter could be defined in relation to the human trust level. Trust level could be measured via positive identification of the person/device on the other side of the interaction medium, using various authentication schemes; location-based being one of the latest. As for the location-based services, the identity of a customer remains hazy as long as his location is unknown; he virtually remains a ghost in the air, with implications on trust. This paper reviews the various location-based authentication techniques with a focus on the role that GPS could play in optimising this authentication approach. It advocates the urgent need to make all transmission devices GPS-compliant as a way forward, despite the privacy issues that might arise.

Page generated in 0.0684 seconds