Browsing Mathematics (Faculty of) by Subject "Security"
Now showing items 1-10 of 10
-
Anonymous, Secure and Efficient Vehicular Communications
(University of Waterloo, 2007-09-20)Vehicular communication networking is a promising approach for facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, it is subject to various malicious abuses and ... -
Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios
(University of Waterloo, 2016-08-10)Smartphones contain a wealth of personal and corporate data. Several surveys have reported that about half of the smartphone owners do not configure primary authentication mechanisms (such as PINs, passwords, and fingerprint- ... -
A Fuzzy-logic based Alert Prioritization Engine for IDSs: Architecture and Configuration
(University of Waterloo, 2008-01-16)Intrusion Detection Systems (IDSs) are designed to monitor a networked environment and generate alerts whenever abnormal activities are detected. The number of these alerts can be very large making their evaluation by ... -
Harnessing the Power of Generative Models for Mobile Continuous and Implicit Authentication
(University of Waterloo, 2021-06-30)Authenticating a user's identity lies at the heart of securing any information system. A trade off exists currently between user experience and the level of security the system abides by. Using Continuous and Implicit ... -
MAC Constructions: Security Bounds and Distinguishing Attacks
(University of Waterloo, 2007-05-18)We provide a simple and improved security analysis of PMAC, a Parallelizable MAC (Message Authentication Code) defined over arbitrary messages. A similar kind of result was shown by Bellare, Pietrzak and Rogaway at ... -
Monitoring and Enforcement of Safety Hyperproperties
(University of Waterloo, 2015-10-30)Certain important security policies such as information flow characterize system-wide behaviors and are not properties of individual executions. It is known that such security policies cannot be expressed in trace-based ... -
Novel Secret Sharing and Commitment Schemes for Cryptographic Applications
(University of Waterloo, 2012-08-15)In the second chapter, the notion of a social secret sharing (SSS) scheme is introduced in which shares are allocated based on a player's reputation and the way she interacts with other parties. In other words, this scheme ... -
PLOX: A Secure Serverless Framework for the Smart Home
(University of Waterloo, 2021-08-17)Smart hubs play a key role in the modern smart home in executing code on behalf of devices locally or on the cloud. Unfortunately, smart hubs are prone to security problems due to misconfigurations, device over permissioning ... -
Privacy and Security Attitudes, Beliefs and Behaviours: Informing Future Tool Design
(University of Waterloo, 2010-08-26)Usable privacy and security has become a significant area of interest for many people in both industry and academia. A better understanding of the knowledge and motivation is an important factor in the design of privacy ... -
Verifying Mutable Systems
(University of Waterloo, 2017-10-23)Model checking has had much success in the verification of single-process and multi-process programs. However, model checkers assume an immutable topology which limits the verification in several areas. Consider the security ...