Browsing by Subject "Security"
Now showing items 1-11 of 11
-
COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING
(2014-12-03)Cloud computing is a technology that facilitates the storing and managing of data in a decentralized manner. However, since the data is out of the owner’s control, concerns have arisen with regards to data confidentiality. ... -
Federal Security Interests
(Law Commission of Canada, 2000-06) -
IMPROVING MOBILE MALWARE DETECTORS USING CO-EVOLUTION TO CREATE AN ARTIFICIAL ARMS RACES
On the Internet today, mobile malware is one of the most common attack methods. These attacks are usually established via malicious mobile apps. One technique used to combat this threat is the deployment of mobile malware ... -
In Search of Security: The Future of Policing in Canada
(Law Commission of Canada, 2006) -
Leveraging Knowledge Assets: Reducing Uncertainty for Security Interests in Intellectual Property
(Law Commission of Canada, 2004) -
MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS
(2013-04-16)Radio Frequency Identification (RFID) systems are rapidly becoming popular in a variety of applications such as supply chain management, storage management and healthcare. Such a system consists of a tag with a unique ... -
A Novel Scalable Key Management Protocol for Wireless Sensor Networks
(2013-04-08)Wireless Sensor Networks (WSNs) are ad-hoc networks consisting of tiny battery- operated wireless sensors. The sensor nodes are lightweight in terms of memory, computation, energy and communication. These networks are ... -
A SECURITY FRAMEWORK BASED ON FLOW MARKING IP-TRACEBACK TECHNIQUES
Distributed-Denial-Of-Service (DDoS) attacks are one of the more challenging security issues on the Internet today. They can easily exhaust the resources of the potential victims. The problem is even more exacerbated since ... -
Security Framework for Combining Confidentiality and Integrity
(2015-05-08)Radio Frequency Identification (RFID) technology represents objects uniquely in order to track their movement in the real world. To avoid an unauthorized entity tracking the object and to offer security, RFID systems require ... -
Systems Analysis at Capital District Health Authority
(2012-07-31)Health Informaticians are faced with a tough challenge in today’s healthcare environment – to deliver innovative solutions for improving the way we deliver healthcare, while keeping within a strict budget. Capital District ... -
Three Party Authentication Scheme for RFID Systems in IoT
Radio Frequency Identification (RFID) systems have become a significant part of Internet of Things(IoT) ever since its emergence. RFID systems have been used for identifying objects, tracking assets and remote monitoring ...