Searched for: +
(21 - 40 of 106)

Pages

document
de Vos, Adriaan (author), Brighente, Alessandro (author), Conti, M. (author)
IEEE 802.1CB provides a standard for reliable packet delivery within Time-Sensitive Networking (TSN). As this standard is envisioned to be used in mission-critical networks in the near future, it has to be protected against security threats. The integrity of the network communication should be the biggest focus as guaranteed delivery is...
conference paper 2023
document
Chen, E. (author), Zhu, Yan (author), Liang, K. (author), Yin, Hongjian (author)
The increasing popularity of remote Cloud File Sharing (CFS) has become a major concern for privacy breach of sensitive data. Aiming at this concern, we present a new resource sharing framework by integrating enterprise-side Attribute-Based Access Control/eXtensible Access Control Markup Language (ABAC/XACML) model, client-side Ciphertext...
journal article 2023
document
Galvan Hernández, Jan Andres (author)
The recent advances in the semiconductor industry have given rise to the development of highly scalable, wireless and battery-free neural-implant interfaces that enable brain monitoring and brain stimulation with high spatial and temporal resolution. Such implants are referred to as Free-Floating Neural Implants (FFNI), as the small size and...
master thesis 2022
document
Huisman, Rick (author)
Research has shown that the Border Gateway Protocol (BGP) is vulnerable to a new attack that exploits the community attribute. These community attacks can influence BGP routing in unintended ways. Currently, there are no effective mitigations against these attacks which do not limit the normal usage of BGP communities or offer cryptographic...
master thesis 2022
document
Ivaşcu, Darius (author)
The Software Defined Network (SDN) is a relatively new paradigm that aims to tackle the lack of centralization in the existing network by separating the control centre from the programming data plane. The controller keeps an overview of the structure of the whole network, which makes it vulnerable to possible topology poisoning attacks. Topology...
bachelor thesis 2022
document
Grishkov, Ilya (author)
This paper offers a prototype of a smart-contract-based encryption scheme meant to improve the security of user data being uploaded to the ledger. A new extension to the self-encryption scheme was introduced by integrating identity into the encryption process. Such integration allows to permanently preserve ownership of the original file and...
bachelor thesis 2022
document
Park, Chaiwon (author)
A rise in the use of blockchain systems implies an increase in smart contract usage. Blockchain systems can easily be found these days, most notably in cryptocurrencies and financial management. Furthermore, the Internet of Things (IoT) is being developed with blockchain, since blockchain ensures trust in IoT data and adds great flexibility....
bachelor thesis 2022
document
Comes, M. (author), Alexander, David (author), Boin, Arjen (author), Eckert, Claudia (author), Elmqvist, Thomas (author), Fochesato, Mattia (author), Helbing, Dirk (author), Latusek-Jurczak, Dominika (author), Lauta, Kristian (author), Meriläinen, Eija (author), Nikkari, Simo (author), Papadimitratos, Panos (author), Renn, Ortwin (author), Rios Insua, David (author), Rizza, Caroline (author), Zio, Enrico (author)
The evidence review report from SAPEA presents the latest scientific evidence on the subject of crisis management, and evidence-based policy options for action.<br/><br/>The European Union is confronted with an increasing number of crises with growing complexity. Their effects can cascade and ripple to all parts of society, the economy, and the...
book 2022
document
Bellizio, Federica (author), Xu, Wangkun (author), Qiu, Dawei (author), Ye, Yujian (author), Papadaskalopoulos, Dimitrios (author), Cremer, Jochen (author), Teng, Fei (author), Strbac, Goran (author)
Digitalization is one of the key drivers for energy system transformation. The advances in communication technologies and measurement devices render available a large amount of operational data and enable the centralization of such data storage and processing. The greater access to data opens up new opportunities for a more efficient and...
journal article 2022
document
He, Daojing (author), Du, Runmeng (author), Zhu, Shanshan (author), Zhang, Min (author), Liang, K. (author), Chan, Sammy (author)
Data island effectively blocks the practical application of machine learning. To meet this challenge, a new framework known as federated learning was created. It allows model training on a large amount of scattered data owned by different data providers. This article presents a parallel solution for computing logistic regression based on...
journal article 2022
document
El-Zawawy, Mohamed A. (author), Brighente, Alessandro (author), Conti, M. (author)
Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet of vehicles) envision the simultaneous collection of multiple data types. Although authentication may prevent unauthorized users to access the collected data, existing...
journal article 2022
document
Pirani, Mohammad (author), Baldi, S. (author), Johansson, Karl Henrik (author)
This paper presents a comprehensive study on the impact of information flow topologies on the resilience of distributed algorithms that are widely used for estimation and control in vehicle platoons. In the state of the art, the influence of information flow topology on both internal and string stability of vehicle platoons has been well...
journal article 2022
document
Yu, Xinghuo (author), Tang, Changbing (author), Palensky, P. (author), Colombo, Armando (author)
Imagine you want to send money to a friend overseas. Wouldn't it be good if you didn't have to pay hefty fees to the intermediaries, and your friend received the funds very quickly? Now imagine ordering parts to make a product in your manufacturing plant. Wouldn't it be great if you were able to verify where each part comes from and have...
journal article 2022
document
Zheng, Yubo (author), Xu, Peng (author), Wang, Wei (author), Chen, Tianyang (author), Susilo, Willy (author), Liang, K. (author), Jin, Hai (author)
Many practical secure systems have been designed to prevent real-world attacks via maximizing the attacking cost so as to reduce attack intentions. Inspired by this philosophy, we propose a new concept named delay encryption with keyword search (DEKS) to resist the notorious keyword guessing attack (KGA), in the context of secure cloud-based...
conference paper 2022
document
Li, Meng (author), Gao, Jianbo (author), Zhang, Zijian (author), Fu, Chaoping (author), Lal, C. (author), Conti, M. (author)
Shortest distance queries over large-scale graphs bring great benefits to various applications, i.e., save planning time and travelling expenses. To protect the sensitive nodes and edges in the graph, a user outsources an encrypted graph to an untrusted server without losing the query ability. However, no prior work has considered the user...
conference paper 2022
document
Pletinckx, Stijn (author)
Security misconfigurations and neglected updates commonly lead to systems being vulnerable. Ranging from default passwords to unpatched software, many systems, such as websites or databases, are being compromised due to these pitfalls. Often stemming from human error, it is difficult to avoid these misconfigurations, which is why they are...
master thesis 2021
document
Slager, Cheyenne (author)
GoQuorum is an enterprise blockchain platform that supports smart contracts and allows for private transactions. Smart contracts enable automated payment while eliminating the need for third-party involvement. Previous attacks on smart contracts have already shown that existing vulnerabilities can lead to great financial losses. Yet, a study...
bachelor thesis 2021
document
Hahn, Georg (author)
Medical Body Area Networks (MBANs) are a cluster of possibly heterogeneous devices, communicating with each other in, on or around the human body. Through these devices, medical data is collected, processed in some way and transferred outside of the network. The IEEE 802.15.6 standard aims to govern communications between such devices. It...
master thesis 2021
document
Arora, Shruti (author)
Information-centric Networking (ICN) is the revolution of the internet due to its many benefit over the current internet infrastructure, namely caching, location-independent routing, and data-centric security. ICN ensures seamless data transfer due to its content-centric nature. Due to its content-centric nature, it is a must to ensure that...
bachelor thesis 2021
document
de Klerk, Leon (author)
The domain name system (DNS) and public key infrastructure (PKI) provide the core services for the Internet. The use of these systems requires trust in institutions to provide proper services, which they can fail to provide. Centralized management allows these institutions to perform censorship. Additionally, these legacy systems have seen...
bachelor thesis 2021
Searched for: +
(21 - 40 of 106)

Pages