Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Grant D. Miller is active.

Publication


Featured researches published by Grant D. Miller.


the internet of things | 2015

Context Sensitive Smart Device Command Recognition and Negotiation

Frank Richard Bauerle; Grant D. Miller; Nader M. Nassar; Tamer M. Nassar; Irene Robin Penney

The Internet of Things (IoT) represents a dramatic shift in how computing and communication interrelate. Devices can potentially connect to anything at any time in any place. While many researchers focus on how to make the IoT seamless, faster, and add more devices into the mesh, our approach is to introduce a new approach whereby devices not only communicate, but also have a level of context awareness that results in optimal intelligence among the mesh of connected devices.


collaboration technologies and systems | 2013

Method for secure credit card transaction

Nader M. Nassar; Grant D. Miller

Traditional credit cards are not secured as the card numbers could be copied and repetitively used for unauthorized transactions. Credit card security is a major concern for any business establishment. With that in mind, it is hard to put the blame of credit card fraud on one entity versus another (card issuer, card holder, card processor, or funds collector) because all share the same risk. The answer to credit card security is to secure the payment process between the card issuer, and the card reader terminal. By securing those two end points and ensuring that card number is not known to any other entity between those two end points, the card itself would not hold any value even if it got lost or stolen. This paper introduces a new approach to credit card security which takes the pardon and the risk away from all entities by securing the card number so that only the issuer and the reader know what it is. Technically this approach reduces the chances of card fraud by exponential magnitude.


collaboration technologies and systems | 2014

Enhanced mobile security using SIM encryption

Nader M. Nassar; Richard J. Newhook; Grant D. Miller

Mobile security is a main topic of concern for the enterprise. Corporate data stored in employees device post a potential security risk of getting lost, stolen or get accessed by unauthorized personal. There are many solutions in the market that addresses this issue. Most of these solutions revolve around applying stronger password, others make use of the encryption of either full or partial hard drive. Data encryption for mobile devices is a known art. However, the existing mobile data encryption solutions share the same methodology with slight implementation variation. The common techniques used to secure mobile data and or mobile code is wither on the application layer using software encryption or on the hardware layer. Our proposed solution introduces a new approach for securing data in mobile devices with encryption technique that is integrated with the mobile SIM card and robust enough to accommodate the common use case of mobile upgrade and yet keep corporate data encrypted.


Archive | 1999

Viewing an information set originated from a distribution media and updating using a remote server

Grant D. Miller; John M. Salvadore; Marc Lawrence Steinbrecher


Archive | 2000

Internet backbone bandwidth enhancement by initiating an additional data stream when individual bandwidth are approximately equal to the backbone limit

Gerald W. Baumann; Terry Dwain Escamilla; Grant D. Miller


Archive | 2002

Automated updates of software and systems

Mark S. Brown; Grant D. Miller


Archive | 2008

Multilevel Hierarchical Associations Between Entities in a Knowledge System

Sandra K. Johnson; Grant D. Miller; Joan L. Mitchell; David Ward


Archive | 2013

DETECTING RELATIVE CROWD DENSITY VIA CLIENT DEVICES

Grant D. Miller; Scott W. Pollyea; Hamza Yaswi


Archive | 2012

TRAFFIC EVENT DATA SOURCE IDENTIFICATION, DATA COLLECTION AND DATA STORAGE

Stephen Y. Chow; Grant D. Miller; Nader M. Nassar; Richard J. Newhook; Erich D. Walls


Archive | 2013

Techniques for Managing Snow Removal Equipment Leveraging Social Media

Scott R. Crowther; Grant D. Miller; Nader M. Nassar; Tamer M. Nassar

Researchain Logo
Decentralizing Knowledge