16 research outputs found
Two Factor Authentication Made Easy
Authentication on the Web is a challenge that can have a negative effect on user experience if it becomes overly complicated and cumbersome. This experience is even more crucial for older and visually impaired users due to their functional abilities. Web applications typically authenticate users by requesting for information that only the user knows (e.g. password). To enhance security, two-factor authentication (2FA) are increasingly implemented, which require the user to manually transfer information between 2FA devices and the Web application. This process can impose usability barriers and stress on human’s memory. This paper proposes a technique to mitigate such issues by using wearables as the 2FA device, and to allow authentication information to be transferred seamlessly and automatically from the device to the Web application. From our preliminary results, older users found our approach less stressful on the human’s memory and easier to use
Bunker procurement strategies of liner companies part II financial strategies to tackle volatile bunkers
Bunkers are predominantly one of the main drivers of the shipping industry. Without them, vessels would be unable to carry out daily operations and the maritime industry would come to a grinding halt. However, as much as businesses are dependent on bunkers, this dependence poses a major problem to them, especially those in the operation of liners. Bunkers are distillates of crude oil, thus sharing a direct relation to the crude’s volatility, which hit highs following the 2008 and 2009 recession and more recently in April 2011. Furthermore, an increased focus on carbon footprint reduction in the maritime industry has led to the need in burning low sulphur but higher costing bunkers in certain areas. In view of the situation, liner businesses are facing the mounting pressure to identify ways to lower bunker procurement costs. Hence this dissertation will review and evaluate current measures in place with the aim to propose a holistic solution of through operational and risk management aspects.Bachelor of Science (Maritime Studies
Towards inconspicuous security
This dissertation presents novel ideas on the design and analysis of techniques to provide security while being minimally conspicuous. The author identifies three key areas in which such techniques can be used, and evaluates the performance of the techniques when used. The three areas identified are the areas of information anti-forensics, mobile system anti-forensics, and threat mitigation in disruption tolerant networks. Additionally, the author proposes a technique to utilize a Trusted Platform Module to enhance the security of the key generating authority in a Shamir identity-based signature scheme.DOCTOR OF PHILOSOPHY (SCSE
Threat mitigation in tactical-level disruption tolerant networks
In disruption tolerant networks (DTNs), nodes exchange beacon messages to set up links via a process known as neighbor discovery. However as it is, beacon messages are susceptible to forgery and tampering that could be exploited to attack and participate in the network. This paper outlines a protocol to 1) protect beacon messages in tactical-level DTNs from forgery and tampering utilizing an identity-based signature scheme (IBS), and 2) provide capabilities for nodes that are compromised or captured to signal its state discreetly to other DTN nodes. The protocol maintains the same amount of message overhead as without it
