Now showing items 12887-12906 of 15526

    • Side Channel Analysis of a Java-­based Contactless Smart Card 

      Mateos Santillan, Edgar (University of Waterloo, 2012-04-30)
      Smart cards are widely used in different areas of modern life including identification, banking, and transportation cards. Some types of cards are able to store data and process information as well. A number of them can ...
    • Side Channel Attack on Low Power FPGA Platform 

      Faraj, Mustafa (University of Waterloo, 2016-08-31)
      In today's advanced electronic age, people have become accustomed to using electronic devices to store and process their information. There is a general belief that the information is safe, due to the use of mathematically ...
    • Side Channel Information Leakage: Design and Implementation of Hardware Countermeasure 

      Khatib Zadeh, Amirali (University of Waterloo, 2010-01-21)
      Deployment of Dynamic Differential Logics (DDL) appears to be a promising choice for providing resistance against leakage of side channel information. However, the resistance provided by these logics is too costly for ...
    • Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging 

      Moreno, Carlos (University of Waterloo, 2013-05-01)
      Side-Channel Analysis plays an important role in cryptology, as it represents an important class of attacks against cryptographic implementations, especially in the context of embedded systems such as hand-held mobile ...
    • Side-Channel Monitoring of Contactless Java Cards 

      Berkes, Jem (University of Waterloo, 2008-01-24)
      Smart cards are small, portable, tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks, which use clues from timing, ...
    • The Sidney Effect: Competitive Youth Hockey and Fantasy Relationships 

      Theoret, Matthew John Ross (University of Waterloo, 2009-04-30)
      This thesis explores how a group of 17 male youth athletes, and their families, experience competitive hockey. Many of the youths seem to forge fantasy relationships with hockey celebrities, heroes, and stars -- e.g. ...
    • Sidon and Kronecker-like sets in compact abelian groups 

      Yang, Xu (University of Waterloo, 2019-06-07)
      Let $G$ be a compact abelian group and $\Ga$ be its discrete dual group. In this thesis we study various types of interpolation sets. A subset $E \subset \Ga$ is Sidon if every bounded function on $E$ can be interpolated ...
    • Sift 

      Kernohan, Sarah (University of Waterloo, 2015-05-01)
      Sift is a suite of drawings that serves as a personal record of a long hike in Iceland. Through an exploration of sediment as a metaphor, and the use of sedimentation as a drawing process, I am sifting through matter and ...
    • Sift: Achieving Resource-Efficient Consensus with RDMA 

      Kazhamiaka, Mikhail (University of Waterloo, 2019-04-30)
      Sift is a new consensus protocol for replicating state machines. It disaggregates CPU and memory consumption by creating a novel system architecture enabled by one-sided RDMA operations. We show that this system architecture ...
    • SiGe/Si Heterojunction Internal Photoemission Separate Absorption and Multiplication Avalanche Middle Wavelength Infrared Photodiode 

      Zhang, Yuan (University of Waterloo, 2014-08-29)
      Separate-absorption-and-multiplication (SAM) Avalanche PhotoDiode (APD) is widely accepted in optical communication systems due to the presence of large photocurrent gain. In this thesis, a designed SAM middle wavelength ...
    • The Sigma-Delta Modulator as a Chaotic Nonlinear Dynamical System 

      Campbell, Donald O. (University of Waterloo, 2007-01-23)
      The sigma-delta modulator is a popular signal amplitude quantization error (or noise) shaper used in oversampling analogue-to-digital and digital-to-analogue converter systems. The shaping of the noise frequency spectrum ...
    • Signal Processing for Trace-based Anomaly Detection in Embedded Software 

      Zeinali Zadeh Ranjbar, Mohammad Mehdi (University of Waterloo, 2016-01-21)
      Embedded operating systems generate a log of operating system function calls which we refer to as traces. Trace-based anomaly detection deals with the problem of determining whether or not an instance of traces represents ...
    • Signaling in Frequency Selective Gaussian Interference Channels 

      Ebrahimzadeh Houlasou, Ehsan (University of Waterloo, 2013-08-22)
      Sharing communication resources in wireless communication networks, due to the ever increasing growth in the number of users and the growing demand for higher data rates, appears to be inevitable. Consequently, present ...
    • Signature Event C*ntext 

      Effinger, Elizabeth (University of Waterloo, 2008-01-25)
      This thesis examines how context in Derridean signature theory is taboo and underutilized, and calls signature theory to embrace the contaminating mark of context. Signature theory, as proposed by Jacques Derrida and Peggy ...
    • Signature Schemes in the Quantum Random-Oracle Model 

      Eaton, Edward (University of Waterloo, 2017-04-25)
      A signature scheme is a fundamental component in modern digital communication. It allows for authenticated messages, without which it would be nearly impossible to ensure security when using most modern technologies. ...
    • Signatures of New Physics from the Primordial Universe 

      Ashoorioon, Amjad (University of Waterloo, 2007-08-29)
      During inflation quantum fluctuations of the field driving inflation, known as inflaton, were stretched by inflationary expansion to galactic size scales or even larger. A possible implication of inflation -- if it is ...
    • Significance of Methylthioadenosine Metabolism to Plant Growth and Development 

      Waduwara-Jayabahu, Chammika Ishari (University of Waterloo, 2012-01-24)
      Arabidopsis thaliana contains two genes annotated as methylthioadenosine nucleosidases (MTN): MTN1, At4g38800 and MTN2, At4g34840. This enzyme activity hydrolyzes the methylthioadenosine (MTA) produced by nicotianamine ...
    • The Significance of Place in the Contemporary Theological Discourse of Heaven 

      Wijnands, Kyle (University of Waterloo, 2015-01-07)
      This study will offer a critical assessment of the hearings of heaven in contemporary theological discourse. After engaging with various eschatological perspectives that pertain to the contemporary discussion of heaven, I ...
    • Significant Feature Clustering 

      Whissell, John (University of Waterloo, 2006)
      In this thesis, we present a new clustering algorithm we call <em>Significance Feature Clustering</em>, which is designed to cluster text documents. Its central premise is the mapping of raw frequency count vectors ...
    • Signing with Codes 

      Masárová, Zuzana (University of Waterloo, 2014-01-22)
      Code-based cryptography is an area of classical cryptography in which cryptographic primitives rely on hard problems and trapdoor functions related to linear error-correcting codes. Since its inception in 1978, the area ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages