Browsing Theses by Title
Now showing items 12789-12808 of 15697
-
Secure Data Aggregation and Access Control in Cloud Assisted eHealth Care System
(University of Waterloo, 2014-09-11)Recently electronic health (eHealth) care system has drawn a lot of attention from the research community and the industry to face the challenge of rapidly growing elderly population and ever rising health care spending. ... -
Secure Data Aggregation Protocol with Byzantine Robustness for Wireless Sensor Networks
(University of Waterloo, 2007-09-27)Sensor networks are dense wireless networks constituting of small and low-cost sensors that collect and disseminate sensory data. They have gained great attention in recent years due to their ability to offer economical ... -
Secure Harmonized Speed Under Byzantine Faults for Autonomous Vehicle Platoons Using Blockchain Technology
(University of Waterloo, 2023-08-31)Autonomous Vehicle (AV) platooning holds the promise of safer and more efficient road transportation. By coordinating the movements of a group of vehicles, platooning offers benefits such as reduced energy consumption, ... -
Secure Protocols for Key Pre-distribution, Network Discovery, and Aggregation in Wireless Sensor Networks
(University of Waterloo, 2015-07-21)The term sensor network is used to refer to a broad class of networks where several small devices, called sensors, are deployed in order to gather data and report back to one or more base stations. Traditionally, sensors ... -
Secure Provision of Reactive Power Ancillary Services in Competitive Electricity Markets
(University of Waterloo, 2008-05-09)The research work presented in this thesis discusses various complex issues associated with reactive power management and pricing in the context of new operating paradigms in deregulated power systems, proposing appropriate ... -
Secure Schemes for Semi-Trusted Environment
(University of Waterloo, 2012-01-13)In recent years, two distributed system technologies have emerged: Peer-to-Peer (P2P) and cloud computing. For the former, the computers at the edge of networks share their resources, i.e., computing power, data, and network ... -
Securing Cloud Computations with Oblivious Primitives from Intel SGX
(University of Waterloo, 2017-12-12)We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious data-structures and ... -
Securing IP Mobility Management for Vehicular Ad Hoc Networks
(University of Waterloo, 2013-04-17)The proliferation of Intelligent Transportation Systems (ITSs) applications, such as Internet access and Infotainment, highlights the requirements for improving the underlying mobility management protocols for Vehicular ... -
Securing the Northern Region of Ghana? Development Aid and Security Interventions
(University of Waterloo, 2013-12-16)This dissertation offers a perspective through which we can explore the processes of joint development and security interventions in conflict-prone regions. In employing the experiences of the Northern Region of Ghana as ... -
Securing Vehicular Networks: A Rules-Based CAN Intrusion Detection System Using IoT Edge Architecture
(University of Waterloo, 2024-01-17)The increasing interconnectivity of modern safety-critical embedded systems has led to an ever-increasing attack surface. The automotive and maritime industries are but two industries that use safety-critical embedded ... -
The Securitization and Commodification of the Consumer-Citizen: Biopolitics of the Credit Card Industry
(University of Waterloo, 2018-08-07)This thesis examines the biopolitics of the credit card industry and its governance of consumers through consumer-citizenship obligations and the transformation of consumer data into valuable information commodities. ... -
Securitizing Systems
(University of Waterloo, 2012-09-07)Securitization is the process by which subjects move from the mundane to “worth securing”. What a group of people consider to be “worth securing” reflects how they understand that subject’s value in relation to their lives. ... -
Security Analysis Methods for Detection and Repair of DoS Vulnerabilities in Smart Contracts
(University of Waterloo, 2021-04-19)In recent years we have witnessed a dramatic increase in the applications of blockchain and smart contracts in a variety of contexts, including supply-chain, decentralized finance, and international money transfers. However, ... -
Security Analysis of Isogeny-Based Cryptosystems
(University of Waterloo, 2020-08-20)Let $E$ be a supersingular elliptic curve over a finite field. In this document we study public-key encryption schemes which use non-constant rational maps from $E$. The purpose of this study is to determine if such ... -
Security Analysis of Quantum Key Distribution: Methods and Applications
(University of Waterloo, 2021-09-27)Quantum key distribution (QKD) can be proved to be secure by laws of quantum mechanics. In this thesis, we review security proof methods in Renner's framework and discuss numerical methods to calculate asymptotic and finite ... -
A Security Analysis of Some Physical Content Distribution Systems
(University of Waterloo, 2008-05-21)Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. Physical content distribution systems form a subset of content distribution ... -
Security and Interpretability in Automotive Systems
(University of Waterloo, 2022-04-06)Controller area network (CAN) is the most commonly found bus protocol in automotive systems. The two-wire bus protocol helps accomplish sophisticated vehicle services in real-time through complex interactions between ... -
Security and Ownership Verification in Deep Reinforcement Learning
(University of Waterloo, 2022-07-15)Deep reinforcement learning (DRL) has seen many successes in complex tasks such as robot manipulation, autonomous driving, and competitive games. However, there are few studies on the security threats against DRL systems. ... -
Security and Planning: A Canadian Case Study Analysis
(University of Waterloo, 2013-02-01)This thesis explores security planning policy in Canada. It provides a historical overview of the securing of cities from the threat of mass violence and demonstrates how violence affects urban populations and the form ... -
Security and Privacy Analysis of Employee Monitoring Applications
(University of Waterloo, 2023-08-21)Workplace surveillance is not a new issue; however, recently there has been increasing adoption of Employee Monitoring Applications (EMAs) that observe employees' digital behaviour. This trend was advanced by the increase ...