The experiment was conducted to compare multiple pest (weed, soil arthropod and diseases) suppression by cereal cover crops in 'Selva' and 'Totem' strawberry. In addition, perlite was used to compare improvement of soil and root aeration which might modify strawberry black root rot complex. Small-seeded summer annual weeds were suppressed...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
Two experiments were conducted from 1987 to 1990 to study the effect of date of renovation on strawberry yield and yield components. In the first experiment, 'Benton' plants were renovated from July 6, 1988 (1 week after harvest - WAH) to August 24, 1988 (8 WAH). In the second experiment...
Internet of Things (IoT) is an integral part of application domains such as smart-home, digital healthcare, smart grid systems and vehicular networks. Various standard public key cryptography techniques (e.g., key exchange, public key encryption, digital signature) are available to provide fundamental security services for IoTs. However, despite their pervasiveness and...
Hardware cryptography offers a reliable way to provide security for data that is sent over networks. Security processors have taken the stage in the movement for secure computing. Some of the more prominent security processors belong to the S1 family created by Motorola. The primary goal of this thesis is...
Private matching (PM) is a key cryptographic primitive in secure computation that allows several parties to jointly compute some functions depending on their private inputs. Indeed, this primitive has many practical applications. For instance, in online advertising, two companies may wish to find their common customers for a joint marketing...
The effect of planting density and nitrogen (N) fertilization on growth, yield, and N partitioning in young and mature 'Bluecrop' blueberry plants was studied over a two year period. Depleted 15N-ammonium sulfate was applied at different rates and on different dates in a mature planting, and at different rates in...
Drought and mandatory water restrictions are limiting the availability of irrigation water in many important blueberry growing regions and new strategies are needed to maintain yield and fruit quality with less water. Three potential options for reducing water use, including deficit irrigation, irrigation cut-offs, and crop thinning, were evaluated for...