Cheddar Cheese samples (good cheese, weak cheese, cheese made with pasteurized milk, cheese made with heat-shocked milk, cheese from production plant A, cheese from production plant B, cheese made with adjunct culture, and cheese made without adjunct culture), were evaluated during the ripening stage. Proteolysis was studied by a fractionation...
Secure two-party computation (2PC) is the task of performing arbitrary calculations on secret inputs provided by two parties, while maintaining secrecy if at least one party is honest. 2PC has been applied to privacy-preserving record linkage and machine learning, in areas such as medicine where maintaining privacy is crucial. One...
Final program details of Visible Possibilities: The Economics of Sustainable Fisheries, Aquaculture and Seafood Trade, the 16th Biennial Conference of the International Institute of Fisheries Economics & Trade, held July 16-20, 2012 in the Hyatt Regency Kilimanjaro Hotel, Dar es Salaam Tanzania
This is a case study of the cooperative development of an ocean condition forecasting tool by Oregon commercial fishermen, Oregon State University (OSU) scientists, and OSU student software engineers. Ocean condition forecasting models developed by OSU scientists were used to create an online tool to assist decision-making for fishermen. This...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
Private set intersection (PSI) allows two parties, who each hold a set of items, to compute the intersection of those sets without revealing anything about other items. Recent advances in PSI have significantly improved its performance for the case of semi-honest security, making semi-honest PSI a practical alternative to insecure...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
Researchers rely on bioeconomic models to guide research and generate fishery management advice for commercial fisheries. Due partly to a paradigm shift towards ecosystem based fishery management, increasing complexity in the characteristics of the problems has meant that bioeconomic simulation models are becoming more prevalent in the fisheries literature. However...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
In this dissertation I explore the Arms representation and activities for teaching quantum mechanics invented at Oregon State University. In the Arms representation students embody quantum states. The Arms activities are presented as an exemplar of the unique physics classroom culture of the upper-division Paradigms in Physics program. In the...