Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Security and authentication in large computing environments
Download
075711.pdf
Date
1998
Author
Göktaş, Ahmet Hakan
Metadata
Show full item record
Item Usage Stats
61
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/1933
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Security in IP networks and an authentication server design
Şentürk, Muzaffer; Bilgen, Semih; Department of Electrical and Electronics Engineering (1995)
Security analysis of electronic signature applications and test suite study
Ergun, Tamer; Özbudak, Ferruh; Department of Cryptography (2013)
Digital signature technology is used widely for security and trust in electronic business and communications. Nowadays it becomes commonly used especially in government agencies. From this point of view, it is crucial to implement correct applications to create and verify digital signatures. CEN (European Commitee for Standardization) has introduced the security requirements for signature applications but neither proposed a PKI model nor implemented a test suite to evaluate the accuracy of signature applica...
Security and service quality analysis for cluster-based wireless sensor networks
Tomur, Emrah; Erten, Y. Murat (2007-05-25)
In this study, we analyze security and quality of service (QoS) issues in cluster-based wireless sensor networks (WSN). Taking spatial resolution as the main QoS metric and limiting the security definition to data integrity and authentication, we present a control strategy to maintain desired QoS and security levels during the entire operation of a cluster-based sensor network. Besides, our proposed strategy considers some other WSN QoS attributes such as coverage, packet collision and system lifetime. It p...
Security Attacks and Countermeasures in Surveillance Wireless Sensor Networks
Sert, Seyyit Alper; Onur, Ertan; Yazıcı, Adnan (2015-10-16)
Surveillance has always been an important task for human beings either for protecting a precious asset or gathering information from the surrounding environment. However, things to be monitored are increasing with a huge rate due to the changing requirements day by day. As a result, it becomes nearly impossible for individuals to do this task manually. To be able to fulfill such requirements, Surveillance Wireless Sensor Networks (SWSNs) have emerged. An SWSN is comprised of tiny nodes geared with various s...
Security and quality of service for wireless sensor networks
Tomur, Emrah; Bilgen, Semih; Department of Information Systems (2008)
Security and quality of service (QoS) issues in cluster-based wireless sensor networks are investigated. The QoS perspective is mostly at application level consisting of four attributes, which are spatial resolution, coverage, system lifetime and packet loss due to collisions. The addressed security aspects are message integrity and authentication. Under this scope, the interactions between security and service quality are analyzed with particular emphasis on the tradeoff between security and spatial resolu...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
A. H. Göktaş, “Security and authentication in large computing environments,” Middle East Technical University, 1998.