Now showing items 12649-12668 of 15516

    • Security Analysis of Quantum Key Distribution: Methods and Applications 

      Lin, Jie (University of Waterloo, 2021-09-27)
      Quantum key distribution (QKD) can be proved to be secure by laws of quantum mechanics. In this thesis, we review security proof methods in Renner's framework and discuss numerical methods to calculate asymptotic and finite ...
    • A Security Analysis of Some Physical Content Distribution Systems 

      Jiayuan, Sui (University of Waterloo, 2008-05-21)
      Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. Physical content distribution systems form a subset of content distribution ...
    • Security and Interpretability in Automotive Systems 

      Thakur, Shailja (University of Waterloo, 2022-04-06)
      Controller area network (CAN) is the most commonly found bus protocol in automotive systems. The two-wire bus protocol helps accomplish sophisticated vehicle services in real-time through complex interactions between ...
    • Security and Ownership Verification in Deep Reinforcement Learning 

      Wang, Shelly (University of Waterloo, 2022-07-15)
      Deep reinforcement learning (DRL) has seen many successes in complex tasks such as robot manipulation, autonomous driving, and competitive games. However, there are few studies on the security threats against DRL systems. ...
    • Security and Planning: A Canadian Case Study Analysis 

      Bartolo, Giuseppe (University of Waterloo, 2013-02-01)
      This thesis explores security planning policy in Canada. It provides a historical overview of the securing of cities from the threat of mass violence and demonstrates how violence affects urban populations and the form ...
    • Security and Privacy Analysis of Employee Monitoring Applications 

      Campbell, Adam (University of Waterloo, 2023-08-21)
      Workplace surveillance is not a new issue; however, recently there has been increasing adoption of Employee Monitoring Applications (EMAs) that observe employees' digital behaviour. This trend was advanced by the increase ...
    • Security and Privacy for Mobile Social Networks 

      Zhang, Kuan (University of Waterloo, 2016-04-28)
      With the ever-increasing demands of people's social interactions, traditional online social networking applications are being shifted to the mobile ones, enabling users' social networking and interactions anywhere anytime. ...
    • Security and Privacy in Smart Grid 

      Abdallah, Asmaa (University of Waterloo, 2016-08-16)
      Smart grid utilizes different communication technologies to enhance the reliability and efficiency of the power grid; it allows bi-directional flow of electricity and information, about grid status and customers requirements, ...
    • Security and Privacy Preservation in Mobile Advertising 

      Liu, Dongxiao (University of Waterloo, 2020-08-28)
      Mobile advertising is emerging as a promising advertising strategy, which leverages prescriptive analytics, location-based distribution, and feedback-driven marketing to engage consumers with timely and targeted advertisements. ...
    • Security and Privacy Preservation in Mobile Crowdsensing 

      Ni, Jianbing (University of Waterloo, 2018-08-09)
      Mobile crowdsensing (MCS) is a compelling paradigm that enables a crowd of individuals to cooperatively collect and share data to measure phenomena or record events of common interest using their mobile devices. Pairing ...
    • Security and Privacy Preservation in Mobile Social Networks 

      Liang, Xiaohui (University of Waterloo, 2013-08-19)
      Social networking extending the social circle of people has already become an important integral part of our daily lives. As reported by ComScore, social networking sites such as Facebook and Twitter have reached 82 percent ...
    • Security and Privacy Preservation in Vehicular Social Networks 

      Lu, Rongxing (University of Waterloo, 2012-04-23)
      Improving road safety and traffic efficiency has been a long-term endeavor for the government, automobile industry and academia. Recently, the U.S. Federal Communication Commission (FCC) has allocated a 75 MHz spectrum at ...
    • Security Configuration Management in Intrusion Detection and Prevention Systems 

      Alsubhi, Khalid (University of Waterloo, 2016-04-18)
      Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. IDPSs ...
    • Security Evaluation of Practical Quantum Communication Systems 

      sajeed, shihan (University of Waterloo, 2017-09-29)
      Modern information and communication technology (ICT), including internet, smart phones, cloud computing, global positioning system, e-commerce, e-Health, global communications and internet of things (IoT), all rely ...
    • Security Evaluations of GitHub's Copilot 

      Asare, Owura (University of Waterloo, 2023-08-11)
      Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of ...
    • Security for Rural Public Computing 

      Ur Rahman, Sumair (University of Waterloo, 2008-09-15)
      Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and ...
    • Security in Delay Tolerant Networks 

      Zhu, Haojin (University of Waterloo, 2009-04-28)
      Delay- and Disruption-tolerant wireless networks (DTN), or opportunistic networks, represent a class of networks where continuous end-to-end connectivity may not be possible. DTN is a well recognized area in networking ...
    • Security in Key Agreement: Two-Party Certificateless Schemes 

      Swanson, Colleen Marie (University of Waterloo, 2008-12-22)
      The main goal of cryptography is to enable secure communication over a public channel; often a secret shared among the communicating parties is used to achieve this. The process by which these parties agree on such a shared ...
    • Security Models and Proofs for Key Establishment Protocols 

      Ng, Eddie M. (University of Waterloo, 2005)
      In this thesis we study the problem of secure key establishment, motivated by the construction of secure channels protocols to protect information transmitted over an open network. In the past, the purported security of ...
    • The Security of Simplified Trusted Relays 

      Stacey, William (University of Waterloo, 2014-08-27)
      This thesis examines the security of performing quantum key distribution (QKD) with a simplified trusted relay (STR). The protocol carries out the quantum phase of a conventional trusted relay, however, reduces the required ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages