Cheryl V. Hinds

Learn More
To gain access to computer systems, users are required to be authenticated. This is usually accomplished by having the user enter an alphanumeric username and password. Users are usually required to remember multiple passwords for different systems and this poses such problems as usability, memorabilty and secuurity. Passwords are usually difficult to(More)
Distributed Computer Systems (DCS) are autonomous processing sites which may reside in geographically different locations. These nodes communicate with each other along networks, in order to share system resources and to work on a set of related or unrelated jobs. In a DCS it is essential that the performance of the system be at some acceptable level. It is(More)
In order to design robust systems for security and forensics of Wireless LANs (WLANs), real-time channel measurements are imperative. We introduce a WLAN Forensics (WiFo) system that uses a grid of WiFi sensors to generate a real-time channel model as well as locate each user within one of the grid areas surrounded by four sensors (or two sensors and the(More)
As users of many different types of software, one of the last things we think about when deciding which is best for the task at hand is the security of the software. This of course depends on the type of software as well. If it is banking or tax software then, security is of concern. However, in most cases the thought rarely crosses the average users mind.(More)
Wireless environments have been researched considerably over many years. Initially, such applications involve the use of radios but have later evolved into satellites, cellular phones and global positioning systems. One detail involving wireless environments is the need to have them restricted only to those who have a need to use a wireless environment.(More)
In this paper we discuss three location determination mechanisms for WLANs based on geolocation models (Global Positioning System, Angle of Arrival, Timebased Models and a Signal Strength based model). We also present a new mechanism that determines the location of a WLAN station within a triangle or quadrangle with probabilistically the strongest vertices.(More)
  • 1