Searched for: +
(1 - 4 of 4)
document
Khattat, Mostafa (author)
Threshold signatures play a crucial role in the security of blockchain applications. An efficient threshold signature can be applied to enhance the security of wallets and transactions by enforcing multi-device-based authentication, as this requires adversaries to compromise more devices to recover the key. Additionally, threshold signatures can...
master thesis 2024
document
de Klerk, Leon (author)
The domain name system (DNS) and public key infrastructure (PKI) provide the core services for the Internet. The use of these systems requires trust in institutions to provide proper services, which they can fail to provide. Centralized management allows these institutions to perform censorship. Additionally, these legacy systems have seen...
bachelor thesis 2021
document
Dikmen, Cemal (author)
With the growing scale of the IoT, many industries enjoy the benefit of automation. The IoT consists of an interconnected network of devices that sense their surroundings and share data among other IoT devices. However, this data can be sensitive and private in nature, making security within the ever-growing IoT network a high priority. Because...
bachelor thesis 2021
document
Beekhuizen, Michael (author)
IoT devices have grown rapidly over the past few years. IoT devices are mostly connected to a central server that stores the data and handles end-to-end communication. Due to the increase of IoT devices, the latency with the server increases. Furthermore, when using a central server the data is at risk of being deleted or tampered with. To...
bachelor thesis 2021
Searched for: +
(1 - 4 of 4)