Browsing University of Waterloo by Title
Now showing items 15368-15387 of 18844
-
Secure and Privacy-Preserving Vehicular Communications
(University of Waterloo, 2008-05-13)Road safety has been drawing increasing attention in the public, and has been subject to extensive efforts from both industry and academia in mitigating the impact of traffic accidents. Recent advances in wireless technology ... -
Secure and Unclonable Integrated Circuits
(University of Waterloo, 2022-09-26)Semiconductor manufacturing is increasingly reliant in offshore foundries, which has raised concerns with counterfeiting, piracy, and unauthorized overproduction by the contract foundry. The recent shortage of semiconductors ... -
A Secure Business Framework for File Purchasing Application in Vehicular Ad Hoc Networks
(University of Waterloo, 2008-06-20)Vehicular ad hoc networks (VANETs) are gaining growing interest from both industry and academia. Driven by road safety requirements, the car manufacturers, transportation authorities and communications standards organizations ... -
Secure Cloud Storage
(University of Waterloo, 2014-05-27)The rapid growth of Cloud based services on the Internet invited many critical security attacks. Consumers and corporations who use the Cloud to store their data encounter a difficult trade-off of accepting and bearing the ... -
Secure Comics: An Interactive Comic Series for Improving Cyber Security and Privacy
(Scienceopen, 2017-07)We designed, illustrated, and developed Secure Comics, an online educational interactive comic series about cyber security and privacy. The three-part comic was evaluated with adults and children, and had positive effects ... -
Secure Computation and Proportionally Fair Collaboration in Federated Learning of Histopathology Images
(University of Waterloo, 2023-01-24)The prediction power of deep learning models depends on the size and quality of the training data. Having access to large-scale datasets enables the model to more precisely estimate the underlying distribution of the data. ... -
Secure Data Acquisition for Physics-based Side Channel Cybersecurity
(University of Waterloo, 2023-08-18)Cyber-physical systems (CPSs), such as planes and water treatment plants, are increasingly connected to the Internet. Connecting CPSs to the Internet allows for greater productivity but also increases the attack surface ... -
Secure Data Aggregation and Access Control in Cloud Assisted eHealth Care System
(University of Waterloo, 2014-09-11)Recently electronic health (eHealth) care system has drawn a lot of attention from the research community and the industry to face the challenge of rapidly growing elderly population and ever rising health care spending. ... -
Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
(University of Waterloo, 2007-09-27)Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical ... -
Secure Harmonized Speed Under Byzantine Faults for Autonomous Vehicle Platoons Using Blockchain Technology
(University of Waterloo, 2023-08-31)Autonomous Vehicle (AV) platooning holds the promise of safer and more efficient road transportation. By coordinating the movements of a group of vehicles, platooning offers benefits such as reduced energy consumption, ... -
Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks
(University of Waterloo, 2015-07-21)The term sensor network is used to refer to a broad class of networks where several small devices, called sensors, are deployed in order to gather data and report back to one or more base stations. Traditionally, sensors ... -
Secure Provision of Reactive Power Ancillary Services in Competitive Electricity Markets
(University of Waterloo, 2008-05-09)The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate ... -
Secure Schemes for Semi-Trusted Environment
(University of Waterloo, 2012-01-13)In recent years, two distributed system technologies have emerged: Peer-to-Peer (P2P) and cloud computing. For the former, the computers at the edge of networks share their resources, i.e., computing power, data, and network ... -
Securing Cloud Computations with Oblivious Primitives from Intel SGX
(University of Waterloo, 2017-12-12)We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious data-structures and ... -
Securing IP Mobility Management for Vehicular Ad Hoc Networks
(University of Waterloo, 2013-04-17)The proliferation of Intelligent Transportation Systems (ITSs) applications, such as Internet access and Infotainment, highlights the requirements for improving the underlying mobility management protocols for Vehicular ... -
Securing the Northern Region of Ghana? Development Aid and Security Interventions
(University of Waterloo, 2013-12-16)This dissertation offers a perspective through which we can explore the processes of joint development and security interventions in conflict-prone regions. In employing the experiences of the Northern Region of Ghana as ... -
Securing Vehicular Networks: A Rules-Based CAN Intrusion Detection System Using IoT Edge Architecture
(University of Waterloo, 2024-01-17)The increasing interconnectivity of modern safety-critical embedded systems has led to an ever-increasing attack surface. The automotive and maritime industries are but two industries that use safety-critical embedded ... -
The Securitization and Commodification of the Consumer-Citizen: Biopolitics of the Credit Card Industry
(University of Waterloo, 2018-08-07)This thesis examines the biopolitics of the credit card industry and its governance of consumers through consumer-citizenship obligations and the transformation of consumer data into valuable information commodities. ... -
Securitizing Systems
(University of Waterloo, 2012-09-07)Securitization is the process by which subjects move from the mundane to “worth securing”. What a group of people consider to be “worth securing” reflects how they understand that subject’s value in relation to their lives. ... -
Security Analysis Methods for Detection and Repair of DoS Vulnerabilities in Smart Contracts
(University of Waterloo, 2021-04-19)In recent years we have witnessed a dramatic increase in the applications of blockchain and smart contracts in a variety of contexts, including supply-chain, decentralized finance, and international money transfers. However, ...