- document
-
Memar Zahedani, Armin (author)Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auctioneer aggregates the offers into demand and supply curves to...master thesis 2022
- document
-
Stobbe, Pieter (author)Currently, encryption is part of daily life, from commercial to industrial applications. Secure, long-distance communication is vital to the safe and reliable operation of industrial feedback control. Utilising public networks as a medium is often cost-effective at the risk of a security breach. Current industrial feedback control systems...master thesis 2022
- document
-
Joosen, Floor (author)Privacy and security are important topics in data aggregation, as companies are aggregating large amounts of sensitive data from their users. The aim of this paper is to improve the security and privacy of data aggregation using smart contracts, homomorphic encryption and post-quantum encryption methods on Hyperledger Fabric. After a literature...bachelor thesis 2022
- document
-
Băbeanu, Alexandru (author)Online advertisement is a multi-billion dollar industry that constitutes a primary source of income for most publishers offering free content on the Web. Online behavioural advertisement refers to the practice of serving targeted ads to online users based on their potential interests. In order to infer these interests, online advertisers...master thesis 2021
- document
-
Vos, Jelle (author)In our increasingly digital society, we are making a growing amount of data available to computers, networks and third parties. As a consequence, our sensitive data is in danger of getting exposed. The field of multi-party computation attempts to mitigate this by studying protocols that enable parties to perform their operations digitally,...master thesis 2021
- document
-
van der Ende, Dieuwke (author)Decision-tree evaluation is a widely-used classification approach known for its simplicity and effectiveness. Decision-tree models are shown to be helpful in classifying instances of fraud, malware, or diseases and can be used to make dynamic, flexible access decisions within an access-control system. These applications often require sensitive...master thesis 2021
- document
-
Govers, Jurriaan (author)This thesis is focused on protecting sensitive data in optimization-based control methods. We propose a novel Privacy-preserving Model Predictive Controller (PMPC) where multiple agents are controlled by an untrusted external coordinator. By using the Paillier additively Homomorphic Encryption (HE) scheme, our PMPC allows the coordinator to...master thesis 2020
- document
-
Helsloot, L.J. (author)Online advertising is a multi-billion dollar industry, forming one of the primary sources of income for many publishers that offer free web content. Online Behavioural Advertising (OBA), the practice of showing advertisements based on individual users' web browsing behaviours, greatly improves the expected effectiveness of advertisements, and is...master thesis 2017