Searched for: +
(1 - 20 of 20)
document
Keyser, S. (author), Velzeboer, T. (author)
The RFID guardian is an embedded device to protect the privacy of people using their RFID (Radio Frequency IDentification) enabled products. This BSc. project is about how version 2 of the RFID Guardian hardware was designed. Besides the description about the hardware it handles some obligatory paperwork for the design flow which was used during...
bachelor thesis 2009
document
van Driel, Ronald (author), van der Hout, Justin (author), van der Wel, Marissa (author), Houtman, Marco (author)
As of this moment there is a lack of data about rainfall in cities. To collect such data, IBM has started the Sense Umbrella Connection and Desensitisation project. For this project an umbrella was equipped with a piezoelectric sensor and a Bluetooth device to record the rain that falls on the surface of this umbrella. One downside of this...
bachelor thesis 2017
document
Nagtegaal, M.A. (author)
I propose an implementation of the quantum private query protocol as described in an article using a photon to encode a question and reflectionor transmission of the photon as answer options. Each question is represented by a photon in a transmission line with both ends returning to the user, and the answer is represented by reflection or...
bachelor thesis 2015
document
Darbari, Shubhankar (author)
The expansion of the Internet and wireless access has led to a widespread increase of Internet of Things applications. These smart devices are becoming a daily aspect of our lives. All the convenient and automated services provided by smart devices come from a centralized service provider. This service provider has access to all the personal...
bachelor thesis 2021
document
Ştefan, Andrei (author)
Collaboration is a key technique in modern supply chains, both for building trust with other companies, but also for reducing costs or maximizing profits. It is an approach which provides all involved parties with benefits that they could not possibly achieve on their own. Collaboration, however, requires abundant information, including...
bachelor thesis 2021
document
van der Poel, Cesar (author)
Information-Centric Networking (ICN) is a networking paradigm proposed to replace the current IP network. It uses in-network caching to enhance availability. However, as a clean slate approach is unlikely to work, an architecture that allows for the two paradigms to coexist needs to me used to facilitate the transition. Several such...
bachelor thesis 2021
document
Arora, Shruti (author)
Information-centric Networking (ICN) is the revolution of the internet due to its many benefit over the current internet infrastructure, namely caching, location-independent routing, and data-centric security. ICN ensures seamless data transfer due to its content-centric nature. Due to its content-centric nature, it is a must to ensure that...
bachelor thesis 2021
document
Van Bergen, A.T.M. (author)
While travelling with their RV, campers want to have the same comfort as their home. That includes the use of toilets. European RVs use a system where the human-wastes are contained in a waste-holding tank until those wastes are dumped. The dumping needs to be done manually, the RV user has to remove the tank from the RV, bring the tank to a...
master thesis 2015
document
van der Meulen, Sietske (author)
Digitalization and automation brings many amazing things; games, social media, navigation. However, it also makes us more vulnerable. The facelessness of cyber space and the emancipation of place makes it hard to grasp. Additionally, our personal data becomes more valuable and thereby more lucrative to criminalize. The combination of these...
master thesis 2019
document
Prahesa Kusuma Setia, Prahesa (author)
Current interconnected society provides us with numerous devices communicating with one another. Exchange of data thus become an integral part in our live. Data become valuable commodity in today's setting because of their usage by individual and other interested parties. Several parties may be interested in computing a function over their data...
master thesis 2017
document
Dekker, F.W. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
master thesis 2020
document
Prasad, Nivedita (author)
People like to travel in groups to visit places. Group recommendation systems can be used to recommend an itinerary of "places of interests" (POIs) in an ordered sequence. The order of POIs in the sequence can be explained to group members to increase acceptance of the recommended items. There is a possibility that explanations which reveal...
master thesis 2019
document
Shriram, Sharad (author)
Modern web information systems use machine learning models to provide personalized user services and experiences. However, machine learning models require annotated data for training, and creating annotated data is done through crowdsourcing tasks. The content used in annotation crowdsourcing tasks like medical records and images might contain...
master thesis 2019
document
Rovers, Tim (author)
This master thesis explores to what degree information about a company's commitment to privacy can be extracted from a privacy statement. To do this, firstly a new database of more than 1500 privacy statements is created using Amazon Mechanical Turk. Next, 72 different aspects related to privacy of the statements are enumerated by using natural...
master thesis 2019
document
Kitkauskas, Mantas (author)
Armenia faces international conflicts especially with Azerbaijan and Turkey. There is always a chance of a sudden intensification of conflicts what results in extreme militarization of country as well as strengthened social control. Social control gains new level as the relation between government and society is also complicated. As a...
master thesis 2018
document
Nasrullah, I.H. (author)
Detecting and tracking of objects by a tracking device can be considered a breach of privacy when an unauthorised party can associate certain tracking information outputted by the tracker to the identity of an individual. Therefore, when this privacy-sensitive information is stored in a database, it is desired that this is done in a secure...
master thesis 2009
document
van de Kamp, Lars (author)
Machine learning techniques receive significant responsibilities, despite growing privacy concerns. Early-stage autonomous vehicles are increasingly appearing on the streets, carrying the burden of transporting human-lives to their destination. Meanwhile, doctors are involving Artificial Intelligence (AI) in their medical diagnoses, basing...
master thesis 2018
document
de Jong, Alex (author)
This study aims to provide insight into how factors relating to privacy and incentives influence people's willingness to participate in sharing their vehicle based sensing data with governmental parties for the purposes of improved dynamic traffic management in the Netherlands. Through the use of a stated preference experiment data is gathered...
master thesis 2019
document
Turcios Rodriguez, Elsa (author)
Tracking is a pervasive mechanism across the web which is capable to trace and collect users’ online data. One of the most widely used mechanisms for tracking are cookies, and they are used to deliver online behavioral advertisement. Since these mechanisms pose a threat to privacy, the E-Privacy Directive was created as the regional legal...
master thesis 2018
document
van Tetering, Daphne (author)
The convenient service offered by credit cards and the technological advances in e-commerce have caused the number of online payment transactions to increase daily. With this rising number, the opportunity for fraudsters to obtain cardholder details via online credit card fraud has also increased. As a result, according to the European Central...
master thesis 2021
Searched for: +
(1 - 20 of 20)