Now showing items 1-10 of 10

    • BridgeSPA: A Single Packet Authorization System for Tor Bridges 

      Smits, Rob (University of Waterloo, 2012-01-10)
      Tor is a network designed for low-latency anonymous communications. Tor clients form circuits through relays that are listed in a public directory, and then relay their encrypted traffic through these circuits. This ...
    • Differentially Private Learning with Noisy Labels 

      Mohapatra, Shubhankar (University of Waterloo, 2020-05-28)
      Supervised machine learning tasks require large labelled datasets. However, obtaining such datasets is a difficult task and often leads to noisy labels due to human errors or adversarial perturbation. Recent studies have ...
    • Differentially Private Searchable Symmetric Encryption Scheme with Configurable Pattern Leakage 

      Shang, Zhiwei (University of Waterloo, 2019-12-19)
      Searchable symmetric encryption (SSE) allows a data owner to outsource its data to a cloud server while maintaining the ability to search over it. Most existing SSE schemes leak access-pattern leakage, and thus are vulnerable ...
    • Improving Tor using a TCP-over-DTLS Tunnel 

      Reardon, Joel (University of Waterloo, 2008-09-24)
      The Tor network gives anonymity to Internet users by relaying their traffic through the world over a variety of routers. This incurs latency, and this thesis first explores where this latency occurs. Experiments discount ...
    • Large-Scale Emulation of Anonymous Communication Networks 

      Singh, Sukhbir (University of Waterloo, 2014-08-15)
      Tor is the most popular low-latency anonymous communication system for the Internet, helping people to protect their privacy online and circumvent Internet censorship. Its low- latency anonymity and distributed design ...
    • Muddler: Using Oblivious RAM For A Privacy Preserving Location-Based Service 

      Mehmood, Danish (University of Waterloo, 2014-10-23)
      As smartphones become ever more prevalent, context aware applications are becoming increasingly popular. Location-based services such as Foursquare have been among the leaders of this trend. Some of the most popular ...
    • Nymbler: Privacy-enhanced Protection from Abuses of Anonymity 

      Henry, Ryan (University of Waterloo, 2011-01-05)
      Anonymous communications networks help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service ...
    • PLOX: A Secure Serverless Framework for the Smart Home 

      Friesen, Micheal (University of Waterloo, 2021-08-17)
      Smart hubs play a key role in the modern smart home in executing code on behalf of devices locally or on the cloud. Unfortunately, smart hubs are prone to security problems due to misconfigurations, device over permissioning ...
    • Privacy and Security Attitudes, Beliefs and Behaviours: Informing Future Tool Design 

      Weber, Janna-Lynn (University of Waterloo, 2010-08-26)
      Usable privacy and security has become a significant area of interest for many people in both industry and academia. A better understanding of the knowledge and motivation is an important factor in the design of privacy ...
    • StyleCounsel: Seeing the (Random) Forest for the Trees in Adversarial Code Stylometry 

      McKnight, Christopher (University of Waterloo, 2018-01-12)
      Authorship attribution has piqued the interest of scholars for centuries, but had historically remained a matter of subjective opinion, based upon examination of handwriting and the physical document. Midway through the ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages