Browsing by Subject "Security"
Now showing items 1-17 of 17
-
Coercion-Resistant Verifiable Web-based Elections in Linear Time
(2019-08-21)Voter coercion broadly includes any attempt to influence the secrecy of a voter’s ballot, including bribery, vote stealing, and forced abstention. This risk, which affects the fundamentals of privacy in a democracy, is ... -
COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING
(2014-12-03)Cloud computing is a technology that facilitates the storing and managing of data in a decentralized manner. However, since the data is out of the owner’s control, concerns have arisen with regards to data confidentiality. ... -
AN E-PRESCRIPTION SYSTEM FRAMEWORK TO LOWER PRESCRIBING AND MEDICATION DISPENSING ERRORS USING BLOCKCHAIN, MACHINE LEARNING, AND NEAR FIELD COMMUNICATION (NFC)
(2021-08-26)Medication errors are among the most significant risks facing the pharmaceutical industry. These errors can result from various issues such as a heavy workload, the misinterpretation of a prescriber’s handwriting, or ... -
Federal Security Interests
(Law Commission of Canada, 2000-06) -
IMPROVING MOBILE MALWARE DETECTORS USING CO-EVOLUTION TO CREATE AN ARTIFICIAL ARMS RACES
(2018-08-21)On the Internet today, mobile malware is one of the most common attack methods. These attacks are usually established via malicious mobile apps. One technique used to combat this threat is the deployment of mobile malware ... -
In Search of Security: The Future of Policing in Canada
(Law Commission of Canada, 2006) -
Leveraging Knowledge Assets: Reducing Uncertainty for Security Interests in Intellectual Property
(Law Commission of Canada, 2004) -
MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS
(2013-04-16)Radio Frequency Identification (RFID) systems are rapidly becoming popular in a variety of applications such as supply chain management, storage management and healthcare. Such a system consists of a tag with a unique ... -
A Novel Scalable Key Management Protocol for Wireless Sensor Networks
(2013-04-08)Wireless Sensor Networks (WSNs) are ad-hoc networks consisting of tiny battery- operated wireless sensors. The sensor nodes are lightweight in terms of memory, computation, energy and communication. These networks are ... -
Performance Analysis of Cryptographic Functions on Programmable NICs
(2022-08-12)The development of programmable network interface cards (also known as SmartNICs) often come with multiple computing cores and multi-hundred Gbps bandwidth that can be used as an enhancement of network computing to extend ... -
The Prison Landscape: Redefining Built Form to Support Rehabilitation
(2020-08-19)Correctional institutions of Correctional Services Canada have been developed to maximize efficiency in security, control, circulation, cost, and use of resources. Often this utilitarian and functionalist approach fails ... -
Securing Multi-party Crypto Wallets
(2023-04-27)Threshold Signature Scheme (TSS) is part of the Multi-Party Computation (MPC) problem, which enables multiple parties to generate digital signatures without revealing any secret information. Avoiding a single point of ... -
A SECURITY FRAMEWORK BASED ON FLOW MARKING IP-TRACEBACK TECHNIQUES
(2016-08-23)Distributed-Denial-Of-Service (DDoS) attacks are one of the more challenging security issues on the Internet today. They can easily exhaust the resources of the potential victims. The problem is even more exacerbated since ... -
Security Framework for Combining Confidentiality and Integrity
(2015-05-08)Radio Frequency Identification (RFID) technology represents objects uniquely in order to track their movement in the real world. To avoid an unauthorized entity tracking the object and to offer security, RFID systems require ... -
Systems Analysis at Capital District Health Authority
(2012-07-31)Health Informaticians are faced with a tough challenge in today’s healthcare environment – to deliver innovative solutions for improving the way we deliver healthcare, while keeping within a strict budget. Capital District ... -
Three Party Authentication Scheme for RFID Systems in IoT
(2017-08-15)Radio Frequency Identification (RFID) systems have become a significant part of Internet of Things(IoT) ever since its emergence. RFID systems have been used for identifying objects, tracking assets and remote monitoring ... -
User Comprehension of Password Reuse Risks and Mitigations in Password Managers
(2020-04-08)Passwords are a familiar and cheap way to authenticate the users of online services. Most users have many online accounts, but just a few unique passwords, resorting to strategies for the creation and recall of passwords ...