• A classification study of rough sets generalization 

      Shi, Han Yin (2004)
      In the development of rough set theory, many different interpretations and formulations have been proposed and studied. One can classify the studies of rough sets into algebraic and constructive approaches. While algebraic ...
    • Access control scheme for partially ordered set hierarchy with provable security 

      Wu, Jiang (2005)
      In many multi-user information systems, the users are organized as a hierarchy. Each user is a subordinate, superior and/or coordinate of some others. In such systems, a user has access to the information if and only if ...
    • Database anonymization and protections of sensitive attributes 

      Hsu, Shih-Ying Peter (2008)
      The importance of database anonymization has become increasingly critical for organizations that publish their database to the public. Current security measures for anonymization poses different manner of drawbacks. ...
    • Indirect key derivation schemes for key management of access hierarchies 

      Cacic, Brian John (2004)
      In this thesis, we study the problem of key management within an access hierarchy. Our contribution to the key management problem is an indirect key derivation approach we call the HMAC-method. It is called the HMAC-method, ...
    • Joint design of PAPR, PICR and OBP in OFDM systems 

      Yuan, Kewei (2008)
      Orthogonal frequency division multiplexing (OFDM) technique has been adopted by many existing and future wireless communication systems for high-speed data transmission. However, a major problem of OFDM systems is the high ...
    • Searching for incomplete self orthogonal latin squares : a targeted and parallel approach 

      Fenton, Mike (Michael Ryan) (2003)
      The primary purpose of this dissertation is in the search for new methods in which to search for Incomplete Self Orthogonal Latin Squares. As such a full understanding of the structures involved must be examined, ...
    • Secret sharing for mobile agent cryptography 

      Miao, Chung (2003)
      A mobile agent is a multi-threaded autonomous program that can be distributed over a heterogeneous network to perform some predefined task for its hum an creator (user). The independence, flexibility and autonomy offered ...
    • The inference problem in multilevel secure databases 

      Chen, Xue Ying (2005)
      Conventional access control models, such as role-based access control, protect sensitive data from unauthorized disclosure via direct accesses, however, they fail to prevent unauthorized disclosure happening through ...
    • Visual cryptography with cheating shares 

      Huang, Shanfeng (2006)
      Visual cryptography is a technique that applies the human visual system to decode encrypted information, such as text, image and number, without any sophisticated devices and computing capabilities. Therefore, compared ...
    • Wireless sensor network scheduling schemes 

      Wang, Bo (2012-11-10)
      Wireless Sensor Network (WSN) consists of small sensing devices with constrained power and resources. It is widely used for environment monitoring. WSN usually works in hostile environments and performs critical tasks, for ...