Tom Dowling

Learn More
It has previously been noted that, for conventional machine code, there is a strong relationship between static and dynamic code measurements. One of the goals of this paper is to examine whether this same relationship is true of Java programs at the bytecode level. To this end, the hypothesis of a linear correlation between static and dynamic frequencies(More)
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in a legal dispute over whether a contract had been signed or not by a user. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of Fuzzy extractors [7] to generate(More)
Self-healing key distribution deals with the problem of distributing session keys for secure communication to a dynamic group of users over an unreliable, lossy network in a manner that is resistant to packet lost and collusion attacks. Self-healing property enables a user who has been off-line for some period to recover the lost session keys immediately(More)
Traditionally, the emphasis among computer scientists has been on the more rigorous and theoretical modes of worst-case and average-case analysis of algorithms. However, theoretical analysis cannot tell the full story about real-world performance of algorithms. This has resulted in a growing interest in experimental analysis. This paper presents the(More)
We analyze optical encryption systems using the techniques of conventional cryptography. All conventional block encryption algorithms are vulnerable to attack, and often they employ secure modes of operation as one way to increase security. We introduce the concept of conventional secure modes to optical encryption and analyze the results in the context of(More)