Coastal and riparian flooding are costly and disruptive natural hazards and already a regular part of life in some areas of the USA. Flooding events caused by sea-level rise and climate change are expected to increase in frequency and severity in the future, creating social, ecological, and economic problems at...
The experiment was conducted to compare multiple pest (weed, soil arthropod and diseases) suppression by cereal cover crops in 'Selva' and 'Totem' strawberry. In addition, perlite was used to compare improvement of soil and root aeration which might modify strawberry black root rot complex. Small-seeded summer annual weeds were suppressed...
This publication reviews the growth stages of grapes. For each growth stage (or group of growth stages), the document lists the more effective pesticides used to control insects and disease, their rates, and application timing for Oregon grape growers. It also covers the effectiveness of various fungicides for control of...
This publication reviews the growth stages of grapes. For each growth stage (or group of growth stages), the document lists the more effective pesticides used to control insects and disease, their rates, and application timing for Oregon grape growers. It also covers the effectiveness of various fungicides for control of...
A secret sharing scheme allows a dealer to distribute a secret with a set of parties, such that only a certain subset of parties can collaborate and learn the shared secret. Traditional secret sharing schemes have been used as building blocks in various subdomains of cryptography. Recently, two new extensions...
One of the pervasive problems arising in our modern, digital world surrounds data breaches where an adversary, through zero-day exploitations, phishing, or old-fashioned social engineering attacks, gains access to a service’s data stores. Our society increasingly relies on these cloud-based services for everything from our taxes to personal communication. As...
Two experiments were conducted from 1987 to 1990 to study the effect of date of renovation on strawberry yield and yield components. In the first experiment, 'Benton' plants were renovated from July 6, 1988 (1 week after harvest - WAH) to August 24, 1988 (8 WAH). In the second experiment...
Internet of Things (IoT) is an integral part of application domains such as smart-home, digital healthcare, smart grid systems and vehicular networks. Various standard public key cryptography techniques (e.g., key exchange, public key encryption, digital signature) are available to provide fundamental security services for IoTs. However, despite their pervasiveness and...
Hardware cryptography offers a reliable way to provide security for data that is sent over networks. Security processors have taken the stage in the movement for secure computing. Some of the more prominent security processors belong to the S1 family created by Motorola. The primary goal of this thesis is...