Now showing items 12809-12828 of 15697

    • Security and Privacy for Mobile Social Networks 

      Zhang, Kuan (University of Waterloo, 2016-04-28)
      With the ever-increasing demands of people's social interactions, traditional online social networking applications are being shifted to the mobile ones, enabling users' social networking and interactions anywhere anytime. ...
    • Security and Privacy in Smart Grid 

      Abdallah, Asmaa (University of Waterloo, 2016-08-16)
      Smart grid utilizes different communication technologies to enhance the reliability and efficiency of the power grid; it allows bi-directional flow of electricity and information, about grid status and customers requirements, ...
    • Security and Privacy Preservation in Mobile Advertising 

      Liu, Dongxiao (University of Waterloo, 2020-08-28)
      Mobile advertising is emerging as a promising advertising strategy, which leverages prescriptive analytics, location-based distribution, and feedback-driven marketing to engage consumers with timely and targeted advertisements. ...
    • Security and Privacy Preservation in Mobile Crowdsensing 

      Ni, Jianbing (University of Waterloo, 2018-08-09)
      Mobile crowdsensing (MCS) is a compelling paradigm that enables a crowd of individuals to cooperatively collect and share data to measure phenomena or record events of common interest using their mobile devices. Pairing ...
    • Security and Privacy Preservation in Mobile Social Networks 

      Liang, Xiaohui (University of Waterloo, 2013-08-19)
      Social networking extending the social circle of people has already become an important integral part of our daily lives. As reported by ComScore, social networking sites such as Facebook and Twitter have reached 82 percent ...
    • Security and Privacy Preservation in Vehicular Social Networks 

      Lu, Rongxing (University of Waterloo, 2012-04-23)
      Improving road safety and traffic efficiency has been a long-term endeavor for the government, automobile industry and academia. Recently, the U.S. Federal Communication Commission (FCC) has allocated a 75 MHz spectrum at ...
    • Security Configuration Management in Intrusion Detection and Prevention Systems 

      Alsubhi, Khalid (University of Waterloo, 2016-04-18)
      Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. IDPSs ...
    • Security Evaluation of Practical Quantum Communication Systems 

      sajeed, shihan (University of Waterloo, 2017-09-29)
      Modern information and communication technology (ICT), including internet, smart phones, cloud computing, global positioning system, e-commerce, e-Health, global communications and internet of things (IoT), all rely ...
    • Security Evaluations of GitHub's Copilot 

      Asare, Owura (University of Waterloo, 2023-08-11)
      Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of ...
    • Security for Rural Public Computing 

      Ur Rahman, Sumair (University of Waterloo, 2008-09-15)
      Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and ...
    • Security in Delay Tolerant Networks 

      Zhu, Haojin (University of Waterloo, 2009-04-28)
      Delay- and Disruption-tolerant wireless networks (DTN), or opportunistic networks, represent a class of networks where continuous end-to-end connectivity may not be possible. DTN is a well recognized area in networking ...
    • Security in Key Agreement: Two-Party Certificateless Schemes 

      Swanson, Colleen Marie (University of Waterloo, 2008-12-22)
      The main goal of cryptography is to enable secure communication over a public channel; often a secret shared among the communicating parties is used to achieve this. The process by which these parties agree on such a shared ...
    • Security Models and Proofs for Key Establishment Protocols 

      Ng, Eddie M. (University of Waterloo, 2005)
      In this thesis we study the problem of secure key establishment, motivated by the construction of secure channels protocols to protect information transmitted over an open network. In the past, the purported security of ...
    • The Security of Simplified Trusted Relays 

      Stacey, William (University of Waterloo, 2014-08-27)
      This thesis examines the security of performing quantum key distribution (QKD) with a simplified trusted relay (STR). The protocol carries out the quantum phase of a conventional trusted relay, however, reduces the required ...
    • Security of Software-defined Wireless Sensor Networks 

      Ben Yahya, Manaf (University of Waterloo, 2022-05-19)
      Wireless Sensor Network (WSN) using Software Defined Networking (SDN) can achieve several advantages such as flexible and centralized network management and efficient routing. This is because SDN is a logically centralized ...
    • Security proof methods for quantum key distribution protocols 

      Ferenczi, Agnes (University of Waterloo, 2013-04-26)
      In this thesis we develop practical tools for quantum key distribution (QKD) security proofs. We apply the tools to provide security proofs for several protocols, ranging from discrete variable protocols in high dimensions, ...
    • Security Proofs for Quantum Key Distribution Protocols by Numerical Approaches 

      Lin, Jie (University of Waterloo, 2017-10-25)
      This thesis applies numerical methods to analyze the security of quantum key distribution (QKD) protocols. The main theoretical problem in QKD security proofs is to calculate the secret key generation rate. Under certain ...
    • Security Vulnerabilities in Smart Contracts as Specifications in Linear Temporal Logic 

      Ray, Indrani (University of Waterloo, 2021-12-21)
      Ethereum is a distributed computer with a native cryptocurrency. Like other monetary transaction based systems, a problem this platform faces is accounts and transactions being susceptible to theft and other hacks. Smart ...
    • Security-aware Cooperation in Dynamic Spectrum Access 

      Zhang, Ning (University of Waterloo, 2015-04-08)
      We have witnessed a massive growth in wireless data, which almost doubles every year. The wireless data is expected to skyrocket further in the future due to the proliferation of devices and the emerging data-hungry ...
    • A Sediment Budget of an Urban Creek in Toronto 

      Bevan, Vernon (University of Waterloo, 2014-09-02)
      Wilket Creek is a second order stream located in Toronto, Ontario. Over the past decade, management efforts have intensified to protect infrastructure including walking paths, bridges, sanitary sewers and private property. ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages