Now showing items 2830-2849 of 3388

    • Secret sharing over a public channel from correlated random variables 

      Chou, Rémi (IEEE, 2018)
      We consider a model for secret sharing, where a dealer distributes the shares of a secret among a set of participants with the constraint that only predetermined subsets of participants must be able to reconstruct the ...
    • Secret-key generation in many-to-one networks: an integrated game-theoretic and information-theoretic approach 

      Chou, Rémi; Yener, Aylin (IEEE, 2019-08)
      This paper considers secret-key generation between several agents and a base station that observe independent and identically distributed realizations of correlated random variables. Each agent wishes to generate the longest ...
    • Secure and robust key management scheme for ad-hoc sensor networks 

      Nagesh, A.S. (Wichita State University. Graduate School., 2005-04-22)
    • A secure architecture for the management of Radio Frequency Identification at home 

      Rao, Shantanu (Wichita State University, 2007-07)
      Radio Frequency Identification (RFID) is an object identification technology that is being adopted rapidly by industry and government organizations, such as the United States Department of Defense, consumer products ...
    • A secure architecture for the use of RFID at home 

      Rao, Shantanu (Wichita State University. Graduate School., 2007-04-27)
      Radio Frequency Identification (RFID) tags are being adopted rapidly for item-level identification by retail giants such as Walmart. While this technology brings many benefits to consumers, it has also caused a lot of ...
    • Secure cloud computing for pairwise sequence alignment 

      Salinas Monroy, Sergio A.; Li, Pan (Association for Computing Machinery, 2017)
      Today's massive amount of biological sequence data has the potential to rapidly advance our understanding of life's processes. However, since analyzing biological sequences is a very expensive computing task, users face a ...
    • Secure data storage resilient against compromised users via an access structure 

      ZivariFard, Hassan; Chou, Rémi A. (IEEE, 2022-11-09)
      Consider a source and multiple users who observe the independent and identically distributed (i.i.d.) copies of correlated Gaussian random variables. The source wishes to compress and store its observation in a public ...
    • Secure distributed storage: rate-privacy trade-off and XOR-based coding scheme 

      Chou, Rémi; Kliewer, Jorg (IEEE, 2020-06)
      We consider the problem of storing data in a distributed manner over T servers. We require the data (i) to be recoverable from the T servers, and (ii) to remain private from any T -1 colluding servers, where privacy is ...
    • Secure reboots for real-time cyber-physical systems 

      Banerjee, Vijay; Hounsinou, Sena; Olufowobi, Habeeb; Hasan, Monowar; Bloom, Gedare (Association for Computing Machinery, 2022-11-07)
      Cyber-Physical Systems (CPS) such as industrial control systems, automobiles, and medical devices often consist of applications with real-time properties. Due to the safety-critical nature of the application domain, multiple ...
    • Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis 

      Joshi, Deepti; Namuduri, Kameswara; Pendse, Ravi (Hindawi Publishing Corporation, 2005-05)
      Security poses a major challenge in ad hoc networks today due to the lack of fixed or organizational infrastructure. This paper proposes a modification to the existing “fully distributed certificate authority” scheme for ...
    • Security and privacy of cyber and physical user interactions in the age of wearable computing 

      Maiti, Anindya (Wichita State University, 2018-05)
      Wearable devices are a new form of technology that is quickly gaining popularity among mobile users. These \smart" wearable devices are equipped with a variety of high-precision sensors that enable the collection of rich ...
    • Security in IP storage networks 

      Pulugurta, Ushaditya; Jasti, Amarnath; Namuduri, Kameswara; Pendse, Ravi (Wichita State University. Graduate School., 2007-04-27)
      Network security is a very important parameter and is always been a challenge for the emerging technologies especially for high-speed data networks. The storage industry is sprouting at a faster pace with efficient and ...
    • Security in live Virtual Machine migration 

      Shah, Payal Hemchand (Wichita State University, 2011-12)
      Virtualization has become an essential technology for organizations. With on-demand services from vendors, a substantial rise in the use of virtualization has been noticed. Today there are various kinds of virtualization ...
    • Security in multi-tenancy cloud 

      Jasti, Amarnath; Shah, Payal Hemchand; Nagaraj, Rajeev; Pendse, Ravi (IEEE, 2010-10-05)
      Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks like data security within the cloud. Several common security threats like data leakage, insecure ...
    • Security issues in airplane data networks 

      Ali, Muhammad Sabeeh; Ragothaman, Vijay; Bhagavathula, Ravi; Pendse, Ravi (Wichita State University, 2005-04-22)
    • Security, internet connectivity and aircraft data networks 

      Thanthry, Nagaraja; Ali, Muhammad Sabeeh; Pendse, Ravi (2006-05)
      Internet connectivity which was in experimental stages only a few years ago is a reality today. Current implementations allow passengers to access Internet for pleasure and in some cases secure VPN access is provided to ...
    • A security-aware Near Field Communication architecture 

      Asaduzzaman, Abu; Mazumder, Shanta; Salinas Monroy, Sergio A.; Mridha, Muhammad F. (IEEE, 2017)
      Due to the popularity of the Near Field Communication (NFC) applications, NFC technology is being adopted by a wide variety of devices suitable for the Internet of things (IoT). However, NFC is vulnerable to numerous ...
    • Seer Grid: privacy and utility implications of two-level load prediction in smart grids 

      Boustani, Arash; Maiti, Anindya; Jazi, Sina Yousefian; Jadliwala, Murtuza Shabbir; Namboodiri, Vinod (IEEE, 2017-02-01)
      We propose "Seer Grid", a novel two-level energy consumption prediction framework for smart grids, aimed to decrease the trade-off between privacy requirements (of the customer) and data utility requirements (of the energy ...
    • Segregated polymeric nanocomposites with tunable three-dimensional network of nanoparticles by controlling the dispersion and distribution 

      Geng, Bing; Wang, Yu; Li, Bin; Zhong, Wei-Hong (Royal Society of Chemistry, 2014-10-09)
      A tunable three-dimensional network of nanoparticles was for the first time realized in a segregated polymeric nanocomposite by controlling the dispersion and distribution of nanoparticles in an emulsion system. The results ...
    • Selecting a multicriteria inventory classification model to improve customer order fill rate 

      Iqbal, Qamar; Malzahn, Don E.; Whitman, Lawrence E. (Hindawi Limited, 2017-04-5)
      Multicriteria models have been proposed for inventory classification in previous studies. However, it is important to make a decision when a particular multicriteria inventory classification model should be preferred over ...