Implementation of Scalable Secure Multicasting

Implementation of Scalable Secure Multicasting

Access: Use of this item is restricted to the UNT Community.
Date: August 2002
Creator: Vellanki, Ramakrishnaprasad
Description: A large number of applications like multi-player games, video conferencing, chat groups and network management are presently based on multicast communication. As the group communication model is being deployed for mainstream use, it is critical to provide security mechanisms that facilitate confidentiality, authenticity and integrity in group communications. Providing security in multicast communication requires addressing the problem of scalability in group key distribution. Scalability is a concern in group communication due to group membership dynamics. Joining and leaving of members requires the distribution of a new session key to all the existing members of the group. The two approaches to key management namely centralized and distributed approaches are reviewed. A hybrid solution is then provided, which represents a improved scalable and robust approach for a secure multicast framework. This framework then is implemented in an example application of a multicast news service.
Contributing Partner: UNT Libraries
The impact of US-China relations on Taiwan's military spending (1966-1992).

The impact of US-China relations on Taiwan's military spending (1966-1992).

Date: May 2002
Creator: Yu, Tsung-Chi Max
Description: Previous research has shown that Taiwan's military spending is affected either by China's military buildup or the US's military pipeline. This study investigates whether it is also true an ongoing US-China relationship has dynamic effects. Three major findings are obtained from the statistical analyses. First and foremost, the level of US-China conflict has a contemporaneous positive effect on Taiwan's military spending. Second, the analyses also indicate that the volatility of US-China relations has negative effects on Taiwan's military spending. This finding suggests that instability in US-China relations will prompt Taiwan to decrease its military spending due to a higher amount of perceived security on the one hand, and Taiwan wants to avoid further provoking China on the other. Third, analyses indicate that an error correction model fares better than a simple budgetary incremental model in explaining the re-equilibrating effects of GNP growth on Taiwan's military spending. Overall, the results demonstrate the interplay of domestic and international constraints and may help to predict what will be the expected military spending when Taiwan's economy changes. I suggest that Taiwan's military spending is likely to be influenced by US-China relations as well as by foreign investment and domestic economic constraints as long as ...
Contributing Partner: UNT Libraries
Adolescents' Perception of Parental Behavior toward Them and its Relationship with Sex, Delinquency, and Security

Adolescents' Perception of Parental Behavior toward Them and its Relationship with Sex, Delinquency, and Security

Date: May 1972
Creator: Mojallali, Shah, 1938-
Description: This study investigated adolescents' perception of parental behavior toward them and its relationship with sex, delinquency, and security. The subjects chosen for the study were sixty boys and sixty girls from eleventh grade English classes, and sixty boys and sixty girls from two institutions for juvenile delinquents. All subjects were white, they ranged in age from fifteen through eighteen years, and they had two living parents.
Contributing Partner: UNT Libraries
Security: Counterfeit Identification Raises Homeland Security Concerns

Security: Counterfeit Identification Raises Homeland Security Concerns

Date: October 1, 2003
Creator: United States. General Accounting Office.
Description: Testimony issued by the General Accounting Office with an abstract that begins "GAO testified about how homeland security is vulnerable to identity fraud. Today, counterfeit identification is easily produced and used to create fraudulent identities. Tests GAO has performed over the past 3 years demonstrate that counterfeit identification documents can be used to (1) enter the United States; (2) purchase firearms; (3) gain access to government buildings and other facilities; (4) obtain genuine identification for both fictitious and stolen identities; and (5) obtain social security numbers for fictitious identities."
Contributing Partner: UNT Libraries Government Documents Department
DirectShow Approach to Low-Cost Multimedia Security Surveillance System

DirectShow Approach to Low-Cost Multimedia Security Surveillance System

Date: December 2002
Creator: Xiao, Wu
Description: In response to the recent intensive needs for civilian security surveillance, both full and compact versions of a Multimedia Security Surveillance (MSS) system have been built up. The new Microsoft DirectShow technology was applied in implementing the multimedia stream-processing module. Through Microsoft Windows Driver Model interface, the chosen IEEE1394 enabled Fire-i cameras as external sensors are integrated with PC based continuous storage unit. The MSS application also allows multimedia broadcasting and remote controls. Cost analysis is included.
Contributing Partner: UNT Libraries
Chronicles in Preservation Project

Chronicles in Preservation Project

Date: February 2012
Creator: Halbert, Martin & Skinner, Katherine
Description: This paper discusses digital preservation frameworks.
Contributing Partner: UNT Libraries
A Study of the Government's Loyalty and Security Programs

A Study of the Government's Loyalty and Security Programs

Date: 1953
Creator: Johnagin, L. A
Description: The purpose of this study is to show just how a loyalty or security program may affect the government employee or armed service personnel as individuals and as a unit of a department.
Contributing Partner: UNT Libraries
Action Alert Benefits Chart

Action Alert Benefits Chart

Date: March 2010
Creator: unknown
Description: Overview of benefits of renewable energy systems.
Contributing Partner: UNT Libraries
Mobile agent security through multi-agent cryptographic protocols.

Mobile agent security through multi-agent cryptographic protocols.

Date: May 2004
Creator: Xu, Ke
Description: An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the feasibility of a software-only solution to this problem, which had been deemed impossible by some researchers previously. The best result prior to this dissertation is a single-agent protocol which requires the participation of a trusted third party. Our research employs multi-agent protocols to eliminate the trusted third party, resulting in a protocol with minimum trust assumptions. This dissertation presents one of the first formal definitions of secure mobile agent computation, in which the privacy and integrity of the agent code and data as well as the data provided by the host are all protected. We present secure protocols for mobile agent computation against static, semi-honest or malicious adversaries without relying on any third party or trusting any specific participant in the system. The security of ...
Contributing Partner: UNT Libraries
Joint Schemes for Physical Layer Security and Error Correction

Joint Schemes for Physical Layer Security and Error Correction

Date: August 2011
Creator: Adamo, Oluwayomi Bamidele
Description: The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A cipher-based cryptosystem is also presented in this research. The complexity of this scheme is reduced compared to conventional schemes. The securities of the ciphers are analyzed against known-plaintext and chosen-plaintext attacks and are found to be secure. Randomization test was also conducted on these schemes and the results are presented. For the proof of concept, the schemes were implemented in software and hardware and these shows a reduction in hardware usage compared to conventional schemes. As a result, joint schemes for error correction and security provide security to the physical layer of wireless communication systems, a layer in the protocol stack where currently little or no security is implemented. In this physical layer security approach, the properties of powerful error correcting codes are exploited to deliver reliability to the intended parties, high security against eavesdroppers and efficiency in communication system. The notion of a highly secure and reliable ...
Contributing Partner: UNT Libraries
FIRST PREV 1 2 NEXT LAST