Browsing Engineering (Faculty of) by Subject "Security"
Now showing items 1-20 of 24
-
An Architecture for the AES-GCM Security Standard
(University of Waterloo, 2006)The forth recommendation of symmetric block cipher mode of operation SP800-38D, <em>Galois/Counter Mode of Operation</em> (GCM) was developed by David A McGrew and John Viega. GCM uses an approved symmetric key block ... -
An Attack and a Defence in the Context of Hardware Security
(University of Waterloo, 2013-05-27)The security of digital Integrated Circuits (ICs) is essential to the security of a computer system that comprises them. We present an improved attack on computer hardware that avoids known defence mechanisms and as such ... -
Defense and Civilian Energy Systems: Security, Sustainability and Survivability Considerations for the 21st Century
(University of Waterloo, 2013-09-13)The United States and NATO Allies have a national security problem that is the product of America being the home of inexpensive and plentiful modern energy. A century of cheap and plentiful domestic supplies of oil has ... -
Design and Analysis of Cryptographic Pseudorandom Number/Sequence Generators with Applications in RFID
(University of Waterloo, 2013-08-22)This thesis is concerned with the design and analysis of strong de Bruijn sequences and span n sequences, and nonlinear feedback shift register (NLFSR) based pseudorandom number generators for radio frequency identification ... -
Efficient Packet-Drop Thwarting and User-Privacy Preserving Protocols for Multi-hop Wireless Networks
(University of Waterloo, 2011-05-02)In multi-hop wireless network (MWN), the mobile nodes relay others’ packets for enabling new applications and enhancing the network deployment and performance. However, the selfish nodes drop the packets because packet ... -
Exploring the Tight Asymptotic Bounds of the Trade-off Between Query Anonymity & Communication Cost in Wireless Sensor Network
(University of Waterloo, 2014-12-18)We address query-anonymity in the context of wireless sensor networks. Query-anonymity is the property that the destination of a client’s query is indistinguishable from other potential destinations. Prior work has established ... -
Fault Tolerant Cryptographic Primitives for Space Applications
(University of Waterloo, 2011-04-28)Spacecrafts are extensively used by public and private sectors to support a variety of services. Considering the cost and the strategic importance of these spacecrafts, there has been an increasing demand to utilize strong ... -
A Flexible Ultralight Hardware Security Module for EPC RFID Tags
(University of Waterloo, 2021-10-01)Due to the rapid growth of using Internet of Things (IoT) devices in daily life, the need to achieve an acceptable level of security and privacy for these devices is rising. Security risks may include privacy threats like ... -
Integrating Security Mechanisms in Hard Real-Time Systems
(University of Waterloo, 2015-08-24)Traditionally Real-Time Systems (RTSs) and security have been considered as separate domains. This is mostly because traditional systems employed isolated customized components, while modern systems tend to be highly ... -
Managing and Complementing Public Key Infrastructure for Securing Vehicular Ad Hoc Networks
(University of Waterloo, 2011-06-28)Recently, vehicular ad-hoc network (VANET) has emerged as an excellent candidate to change the life style of the traveling passengers along the roads and highways in terms of improving the safety levels and providing a ... -
Method-Specific Access Control in Java via Proxy Objects using Annotations
(University of Waterloo, 2010-03-31)Partially restricting access to objects enables system designers to finely control the security of their systems. We propose a novel approach that allows granting partial access at method granularity on arbitrary objects ... -
No Common Ground: Atlas of Resistance and Control During the 2010 Toronto G20 Summit
(University of Waterloo, 2015-01-22)Architecture and legislation describe the spaces of the city, and the activities they contain. ‘Security’ can dislodge this public space. This is especially true during gatherings of global leaders within major cities. The ... -
On Achieving Unconditionally Secure Communications Via the Physical Layer Approaches
(University of Waterloo, 2018-02-12)Due to the broadcast nature, wireless links are open to malicious intrusions from outsiders, which makes the security issues a critical concern in the wireless communicationsover them. Physical-layer security techniques, ... -
On Message Authentication in 4G LTE System
(University of Waterloo, 2015-08-26)After decades of evolution, the cellular system has become an indispensable part of modern life. Together with the convenience brought by the cellular system, many security issues have arisen. Message integrity protection ... -
Physical Layer Approach for Securing RFID Systems
(University of Waterloo, 2013-08-15)Radio Frequency IDentification (RFID) is a contactless, automatic identification wireless technology primarily used for identifying and tracking of objects, goods and humans. RFID is not only limited to identification and ... -
Physical Layer Securities in Wireless Communication Systems
(University of Waterloo, 2014-12-10)Due to the tremendous advancement in the semiconductor and microelectronics technologies, wireless technologies have blossomed in the recent decades. The large scale deployment of wireless networks have revolutionized the ... -
Relating Declarative Semantics and Usability in Access Control
(University of Waterloo, 2012-08-29)This thesis addresses the problem of usability in the context of administration of access control systems. We seek to relate the notion of declarative semantics, a recurring theme in research in access control, with ... -
Replication, Security, and Integrity of Outsourced Data in Cloud Computing Systems
(University of Waterloo, 2013-02-21)In the current era of digital world, the amount of sensitive data produced by many organizations is outpacing their storage ability. The management of such huge amount of data is quite expensive due to the requirements of ... -
Secure Schemes for Semi-Trusted Environment
(University of Waterloo, 2012-01-13)In recent years, two distributed system technologies have emerged: Peer-to-Peer (P2P) and cloud computing. For the former, the computers at the edge of networks share their resources, i.e., computing power, data, and network ... -
Security and Privacy for Mobile Social Networks
(University of Waterloo, 2016-04-28)With the ever-increasing demands of people's social interactions, traditional online social networking applications are being shifted to the mobile ones, enabling users' social networking and interactions anywhere anytime. ...