Browsing UMBC Center for Information Security and Assurance (CISA) by Title
Now showing items 8-24 of 24
-
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
(IEEE, 2003-05-21)We present, implement, and analyze a new scalable centralized algorithm, called OFT, for establishing shared cryptographic keys in large, dynamically changing groups. Our algorithm is based on a novel application of one-way ... -
On the Independent Verification of a Punchscan Election
(2007)Punchscan is a cryptographic voting system providing full transparency throughout the entire election process: a mandatory pre-election public audit, a mandatory post-election public audit, and the ability for a voter ... -
On the Origins and Variations of Blockchain Technologies
(2018-10-15)We explore the origins of blockchain technologies to better understand the enduring needs they address. We identify the five key elements of a blockchain, show embodiments of these elements, and examine how these elements ... -
The PnchScan Voting System
(2006-08-20) -
Private Virtual Infrastructure for Cloud Computing
(2009)Cloud computing places an organization’s sensitive data in the control of a third party, introducing a significant level of risk on the privacy and security of the data. We propose a new management and security model for ... -
Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing
Private Virtual Infrastructure is a security architecture for cloud computing which uses a new trust model to share the responsibility of security in cloud computing between the service provider and client, decreasing the ... -
Punchscan in Practice: An E2E Election Case Study
This paper presents a case study of the E2E voting system Punchscan and its first use in a binding election. The election was held in March 2007 at the University of Ottawa for several offices within the university’s ... -
Punchscan with Independent Ballot Sheets: Simplifying Ballot Printing and Distribution with Independently Selected Ballot Halves
(2007-06-15)We propose and implement a modification to the Punchscan protocol that simplifies ballot printing and distribution. In this improved version, each voter creates a ballot at the polling location by combining independently ... -
Punchscan: Introduction and System Definition of a High-Integrity Election System
(2006-05)Punchscan is a unique hybrid paper/electronic voting system concept. As a receipt-based system, Punchscan provides high voter privacy and election integrity, yet it does not rely on the complex and fragile electronic voting ... -
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
(2009-11-03)On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for the mayor and city council members using the Scantegrity II voting system—the first time any end-to-end (E2E) voting system with ballot privacy has ... -
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes
(2008-07-01)We introduce Scantegrity II, a practical enhancement for optical scan voting systems that achieves increased election integrity through the novel use of confirmation codes printed on ballots in invisible ink. Voters mark ... -
Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability
(2017)Building on lessons learned from the November 2009 Scantegrity II election in Takoma Park, MD, we propose improvements to the Scantegrity II voting system that (1) automatically print trustworthy receipts for easier on-line ... -
The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students
(2018-11-12)May 30-June 2, 2017, Scholarship for Service (SFS) scholars at the University of Maryland, Baltimore County (UMBC) analyzed the security of a targeted aspect of the UMBC computer systems. During this hands-on study, with ... -
Statistical Techniques For Language Recognition: An Empirical Study Using Real And Simulated English
(Taylor & Francis, 2010-06-04)Computer experiments compare the effectiveness of five test statistics at recognizing and distinguishing several types of real and simulated English strings. These experiments measure the statistical power and robustness ... -
Statistical Techniques for Language Recognition: An Introduction and Guide for Cryptanalysts
(Taylor & Francis Online, 2010-06-04)We explain how to apply statistical techniques to solve several language-recognition problems that arise in cryptanalysis and other domains. Language recognition is important in cryptanalysis because, among other applications, ... -
Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
(2011-05-25)The inevitable vulnerabilities and criminal targeting of cloud environments demand an understanding of how digital forensic investigations of the cloud can be accomplished. We present two hypothetical case studies of cloud ...