Now showing items 1-10 of 10

    • Anonymous, Secure and Efficient Vehicular Communications 

      Sun, Xiaoting (University of Waterloo, 2007-09-20)
      Vehicular communication networking is a promising approach for facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, it is subject to various malicious abuses and ...
    • Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios 

      Khan, Hassan (University of Waterloo, 2016-08-10)
      Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication mechanisms (such as PINs, passwords, and fingerprint- ...
    • A Fuzzy-logic based Alert Prioritization Engine for IDSs: Architecture and Configuration 

      Alsubhi, Khalid (University of Waterloo, 2008-01-16)
      Intrusion Detection Systems (IDSs) are designed to monitor a networked environment and generate alerts whenever abnormal activities are detected. The number of these alerts can be very large making their evaluation by ...
    • Harnessing the Power of Generative Models for Mobile Continuous and Implicit Authentication 

      Tahoun, Ezzeldin (University of Waterloo, 2021-06-30)
      Authenticating a user's identity lies at the heart of securing any information system. A trade off exists currently between user experience and the level of security the system abides by. Using Continuous and Implicit ...
    • MAC Constructions: Security Bounds and Distinguishing Attacks 

      Mandal, Avradip (University of Waterloo, 2007-05-18)
      We provide a simple and improved security analysis of PMAC, a Parallelizable MAC (Message Authentication Code) defined over arbitrary messages. A similar kind of result was shown by Bellare, Pietrzak and Rogaway at ...
    • Monitoring and Enforcement of Safety Hyperproperties 

      Agrawal, Shreya (University of Waterloo, 2015-10-30)
      Certain important security policies such as information flow characterize system-wide behaviors and are not properties of individual executions. It is known that such security policies cannot be expressed in trace-based ...
    • Novel Secret Sharing and Commitment Schemes for Cryptographic Applications 

      Nojoumian, Mehrdad (University of Waterloo, 2012-08-15)
      In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which shares are allocated based on a player's reputation and the way she interacts with other parties. In other words, this scheme ...
    • PLOX: A Secure Serverless Framework for the Smart Home 

      Friesen, Micheal (University of Waterloo, 2021-08-17)
      Smart hubs play a key role in the modern smart home in executing code on behalf of devices locally or on the cloud. Unfortunately, smart hubs are prone to security problems due to misconfigurations, device over permissioning ...
    • Privacy and Security Attitudes, Beliefs and Behaviours: Informing Future Tool Design 

      Weber, Janna-Lynn (University of Waterloo, 2010-08-26)
      Usable privacy and security has become a significant area of interest for many people in both industry and academia. A better understanding of the knowledge and motivation is an important factor in the design of privacy ...
    • Verifying Mutable Systems 

      Scott, Joseph (University of Waterloo, 2017-10-23)
      Model checking has had much success in the verification of single-process and multi-process programs. However, model checkers assume an immutable topology which limits the verification in several areas. Consider the security ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages