Searched for: +
(1 - 5 of 5)
document
Ho, Björn (author)
A searchable symmetric encryption (SSE) scheme allows a user to securely perform a keyword search on an encrypted database. This search capability is useful but comes with the price of unintentional information leakage. An attacker abuses leakage to steal confidential information by launching SSE attacks. In this work, our goal is to design a...
master thesis 2023
document
Zou, Jinyi (author)
This thesis aims to assess robustness of networks by evaluating the performance of node attack strategies, the applicability and accuracy of different approaches, and to increase robustness of networks through analysing protecting methods, including link addition and node protection strategies. To be specific, the relative size of the Largest...
master thesis 2023
document
Zhang, Manning (author)
Searchable symmetric encryption (SSE) is an encryption scheme that allows a single user to perform searches over an encrypted dataset. The advent of dynamic SSE has further enhanced this scheme by enabling updates to the encrypted dataset, such as insertions and deletions. In dynamic SSE, attackers have employed file injection attacks, initially...
master thesis 2023
document
Trinh, Eames (author)
Federated learning enables training machine learning models on decentralized data sources without centrally aggregating sensitive information. Continual learning, on the other hand, focuses on learning and adapting to new tasks over time while avoiding the catastrophic forgetting of knowledge from previously encountered tasks. Federated...
bachelor thesis 2023
document
Lambregts, Steven (author)
Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, these leakages are caused by practical designs but are considered an...
master thesis 2022
Searched for: +
(1 - 5 of 5)