Now showing items 1-4 of 4

    • Making Renewable Energy Certificates Efficient, Trustworthy, and Private 

      Karakashev, Dimcho (University of Waterloo, 2020-08-19)
      Although renewable energy costs are declining rapidly, producers still rely on additional incentives, such as Renewable Energy Certificates (RECs), when making an investment decision. An REC is a proof that a certain amount ...
    • Privately Constrained Testable Pseudorandom Functions 

      Pawlega, Filip (University of Waterloo, 2018-09-20)
      Privately Constrained Pseudorandom Functions allow a PRF key to be delegated to some evaluator in a constrained manner, such that the key’s functionality is restricted with respect to some secret predicate. Variants of ...
    • Securing Cloud Computations with Oblivious Primitives from Intel SGX 

      Sasy, Sajin (University of Waterloo, 2017-12-12)
      We are witnessing a confluence between applied cryptography and secure hardware systems in enabling secure cloud computing. On one hand, work in applied cryptography has enabled efficient, oblivious data-structures and ...
    • User-Controlled Computations in Untrusted Computing Environments 

      Vinayagamurthy, Dhinakaran (University of Waterloo, 2019-01-15)
      Computing infrastructures are challenging and expensive to maintain. This led to the growth of cloud computing with users renting computing resources from centralized cloud providers. There is also a recent promise in ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages