Search Projects: Group Project, June, 2018

Results 41 - 43 of 43



Visible to the public Collaborative Research: CT-M: Privacy, Compliance and Information Risk in Complex Organizational Processes

Modern organizations, such as businesses, non-profits, government agencies, and universities, collect and use personal information from a range of sources, shared with specific expectations about how it will be managed and used. Accordingly, they must find ways to comply with expectations, which may be complex and varied, as well as with relevant privacy laws and regulations, while they minimize operational risk and carry out core functions of the organization efficiently and effectively.


Visible to the public CT-ISG: New Directions in Elliptic Curve, Pairing-Based, and Torus-Based Cryptography

The goal of this research is to solve some important problems in nnnntorus-based, pairing-based, multilinear, and elliptic curve and abelian variety cryptography. Elliptic curve cryptography helps to secure the Internet and is used by the U.S. and other governments and institutions to provide secure communication. Abelian variety cryptography includes elliptic and hyperelliptic curve cryptography, scales well to high security levels, and is especially advantageous in constrained environments.


Visible to the public  DIMACS Special Focus on Algorithmic Foundations of the Internet

The Internet has become a part of our everyday lives. We use it to conduct much of our business, government, and social interactions. However, the scale and heterogeneity of the Internet have far surpassed anyone's expectations, and the Internet is responding by showing signs of strain. Security was not a major goal of the original design of Internet protocols, and it is now far too easy for malicious agents to engage in disruptive activities. The need to manage the network was not in mind from the beginning, making it difficult for network administrators.