Now showing items 1-16 of 16

    • The Best of Both Worlds: Combining Information-Theoretic and Computational Private Information Retrieval for Communication Efficiency 

      Devet, Casey (University of Waterloo, 2014-08-15)
      The goal of Private Information Retrieval (PIR) is the ability to query a database successfully without the operator of the database server discovering which record(s) of the database the querier is interested in. There ...
    • A Dynamic Risk-Based Access Control Approach: Model and Implementation 

      Savinov, Sergey (University of Waterloo, 2017-05-18)
      Access control (AC) refers to mechanisms and policies that restrict access to resources, thus regulating access to physical or virtual resources of an information system. AC approaches are used to represent these mechanisms ...
    • End-to-End Encrypted Group Messaging with Insider Security 

      Unger, Nik (University of Waterloo, 2021-08-11)
      Our society has become heavily dependent on electronic communication, and preserving the integrity of this communication has never been more important. Cryptography is a tool that can help to protect the security and privacy ...
    • Ghost Recommendations: A Protocol for Efficiently Enhancing User Privacy 

      Iyer, Kritika (University of Waterloo, 2024-04-30)
      As the amount of online information accessible to users keeps increasing, we have come to rely more on services such as Netflix, Amazon, and eBay that are successful in recommending choices to users. The main goal of such ...
    • Lox: Protecting the Social Graph in Bridge Distribution 

      Tulloch, Lindsey (University of Waterloo, 2022-05-26)
      Access to the open Internet, free from surveillance and censorship, is an important part of fulfilling the right to privacy. Despite this, in many regions of the world, censorship of the Internet is used to limit access ...
    • A Privacy-Friendly Architecture for Mobile Social Networking Applications 

      Pidcock, Sarah Nancy (University of Waterloo, 2013-01-23)
      The resources and localization abilities available in modern smartphones have provided a huge boost to the popularity of location-based applications. In these applications, users send their current locations to a central ...
    • PRSONA: Private Reputation Supporting Ongoing Network Avatars 

      Gurtler, Stan (University of Waterloo, 2021-12-09)
      Trust and user-generated feedback have become increasingly vital to the normal functioning of the modern internet. However, deployed systems that currently incorporate such feedback do not guarantee users much in the way ...
    • Re-encoding Resistance: Towards Robust Covert Channels over WebRTC Video Streaming 

      Cruzat La Rosa, Adrian (University of Waterloo, 2024-01-18)
      Internet censorship is an ongoing phenomenon, where state level agents attempt to control the free access to information on the internet for purposes like dissent suppression and control. In response, research has been ...
    • Recipes for Resistance: A Censorship Circumvention Cookbook 

      Bocovich, Cecylia (University of Waterloo, 2018-08-16)
      The increasing centralization of Internet infrastructure and web services, along with advancements in the application of machine learning techniques to analyze and classify network traffic, have enabled the growth and ...
    • Robot Social Engineering 

      Postnikoff, Brittany (University of Waterloo, 2020-07-06)
      This thesis establishes the new field of Robot Social Engineering. We define Robot Social Engineering as the use of social abilities and techniques by robots to manipulate others in order to achieve a goal. We build the ...
    • Security and Privacy Analysis of Employee Monitoring Applications 

      Campbell, Adam (University of Waterloo, 2023-08-21)
      Workplace surveillance is not a new issue; however, recently there has been increasing adoption of Employee Monitoring Applications (EMAs) that observe employees' digital behaviour. This trend was advanced by the increase ...
    • The Theory and Applications of Homomorphic Cryptography 

      Henry, Kevin John (University of Waterloo, 2008-08-27)
      Homomorphic cryptography provides a third party with the ability to perform simple computations on encrypted data without revealing any information about the data itself. Typically, a third party can calculate one of the ...
    • Toward an Interoperable and Centralized Consent Centric Access Control Model for Healthcare Resources: Model and Implementation 

      Mousaid, Hassan (University of Waterloo, 2020-09-29)
      Although patients have the legal right in Canada and many other countries to specify how, when and by whom their medical records can be accessed, the harsh reality is that in almost all cases using existing systems and ...
    • Towards a New Generation of Permissioned Blockchain Systems 

      Gorenflo, Christian (University of Waterloo, 2020-05-14)
      With the release of Satoshi Nakamoto's Bitcoin system in 2008 a new decentralized computation paradigm, known as blockchain, was born. Bitcoin promised a trading network for virtual coins, publicly available for anyone to ...
    • Walking Onions: Scaling Distribution of Information Safely in Anonymity Networks 

      Komlo, Chelsea (University of Waterloo, 2020-08-07)
      Scaling anonymity networks offers unique security challenges, as attackers can exploit differing views of the network’s topology to perform epistemic and route capture attacks. Anonymity networks in practice, such as ...
    • Website Fingerprinting: Attacks and Defenses 

      Wang, Tao (University of Waterloo, 2016-01-13)
      Website fingerprinting attacks allow a local, passive eavesdropper to determine a client's web activity by leveraging features from her packet sequence. These attacks break the privacy expected by users of privacy technologies, ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages