Now showing items 12669-12688 of 15522

    • Security Evaluations of GitHub's Copilot 

      Asare, Owura (University of Waterloo, 2023-08-11)
      Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of ...
    • Security for Rural Public Computing 

      Ur Rahman, Sumair (University of Waterloo, 2008-09-15)
      Current research on securing public computing infrastructure like Internet kiosks has focused on the use of smartphones to establish trust in a computing platform or to offload the processing of sensitive information, and ...
    • Security in Delay Tolerant Networks 

      Zhu, Haojin (University of Waterloo, 2009-04-28)
      Delay- and Disruption-tolerant wireless networks (DTN), or opportunistic networks, represent a class of networks where continuous end-to-end connectivity may not be possible. DTN is a well recognized area in networking ...
    • Security in Key Agreement: Two-Party Certificateless Schemes 

      Swanson, Colleen Marie (University of Waterloo, 2008-12-22)
      The main goal of cryptography is to enable secure communication over a public channel; often a secret shared among the communicating parties is used to achieve this. The process by which these parties agree on such a shared ...
    • Security Models and Proofs for Key Establishment Protocols 

      Ng, Eddie M. (University of Waterloo, 2005)
      In this thesis we study the problem of secure key establishment, motivated by the construction of secure channels protocols to protect information transmitted over an open network. In the past, the purported security of ...
    • The Security of Simplified Trusted Relays 

      Stacey, William (University of Waterloo, 2014-08-27)
      This thesis examines the security of performing quantum key distribution (QKD) with a simplified trusted relay (STR). The protocol carries out the quantum phase of a conventional trusted relay, however, reduces the required ...
    • Security of Software-defined Wireless Sensor Networks 

      Ben Yahya, Manaf (University of Waterloo, 2022-05-19)
      Wireless Sensor Network (WSN) using Software Defined Networking (SDN) can achieve several advantages such as flexible and centralized network management and efficient routing. This is because SDN is a logically centralized ...
    • Security proof methods for quantum key distribution protocols 

      Ferenczi, Agnes (University of Waterloo, 2013-04-26)
      In this thesis we develop practical tools for quantum key distribution (QKD) security proofs. We apply the tools to provide security proofs for several protocols, ranging from discrete variable protocols in high dimensions, ...
    • Security Proofs for Quantum Key Distribution Protocols by Numerical Approaches 

      Lin, Jie (University of Waterloo, 2017-10-25)
      This thesis applies numerical methods to analyze the security of quantum key distribution (QKD) protocols. The main theoretical problem in QKD security proofs is to calculate the secret key generation rate. Under certain ...
    • Security Vulnerabilities in Smart Contracts as Specifications in Linear Temporal Logic 

      Ray, Indrani (University of Waterloo, 2021-12-21)
      Ethereum is a distributed computer with a native cryptocurrency. Like other monetary transaction based systems, a problem this platform faces is accounts and transactions being susceptible to theft and other hacks. Smart ...
    • Security-aware Cooperation in Dynamic Spectrum Access 

      Zhang, Ning (University of Waterloo, 2015-04-08)
      We have witnessed a massive growth in wireless data, which almost doubles every year. The wireless data is expected to skyrocket further in the future due to the proliferation of devices and the emerging data-hungry ...
    • A Sediment Budget of an Urban Creek in Toronto 

      Bevan, Vernon (University of Waterloo, 2014-09-02)
      Wilket Creek is a second order stream located in Toronto, Ontario. Over the past decade, management efforts have intensified to protect infrastructure including walking paths, bridges, sanitary sewers and private property. ...
    • Sediment Transport and Metals Modeling in an Urban Stream - The Don River, Toronto 

      Mansoor, Sannan Zahid (University of Waterloo, 2015-09-28)
      The Don River watershed has been subjected to rapid urbanization over the last few decades. As a result, vast area of built-up land has shifted the watershed’s hydrologic cycle towards lower infiltration and higher runoff ...
    • Seeding Induced Assembly of Ionic-Complementary Peptide EAK16-II 

      Dhadwar, Sukhdeep (University of Waterloo, 2004)
      Seeding is an important variable in controlling or directing the assembly of peptides. The presence of impurities, responsible for creating a 'dip' in the surface tension versus peptide concentration profile, is used to ...
    • Seedlings 

      Galarneau, Sarah (University of Waterloo, 2022-05-05)
      Seedlings is a fictional, constructed ecosystem. It is a garden-like installation consisting of a coming-together of numerous printed, gathered, gifted, and reconstituted components that “cross-pollinate” the gallery space. ...
    • Seedlings of Temperate Tree Species Show Plastic Responses to Water Deficit and Heat Stress, But They Do Not Prevent Decline in Growth 

      Aragón Baquero, Lina Marcela (University of Waterloo, 2022-10-03)
      Species response to climate change is difficult to predict because warming involves the interaction of multiple stressors whose effects are simultaneous and therefore difficult to disentangle. To address this gap, I studied ...
    • SEEDS: Secure Decentralized Storage for Authentication Material 

      Dukovac, Stefanie (University of Waterloo, 2022-03-03)
      Applications that use passwords or cryptographic keys to authenticate users or perform cryptographic operations rely on centralized solutions. Trusted Platform Modules (TPMs) do not offer a way to replicate material, making ...
    • Seeking Middle Ground: Reconciling two trajectories for food system relocalization 

      Glaros, Alesandros (University of Waterloo, 2018-09-25)
      As food systems expand in scale and scope, the sources of their negative externalities are less effectively identified. Globally, this diffusion has resulted in a plethora of paradoxes, as well as a decrease in overall ...
    • Seeking Renewal: The Value of Nature and Pausing in Shifting our Focus Inward 

      Burgsma, Erica (University of Waterloo, 2020-09-10)
      We live in a society that is overly fixated on our outer conditions and stimuli rather than our inner state, which is seen through one of the behaviours this outward focus produces, busyness. So often we choose filling ...
    • Seeking Safety: The Perceived Function and Consequences of Safety Behaviour Use in Social Anxiety 

      Zabara, Nick (University of Waterloo, 2017-08-29)
      This study was designed to examine the perceived self-protective function and consequences of safety behaviour use in social anxiety. The research explores how individuals’ selection and use of different types of safety ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages