Searched for: +
(1 - 3 of 3)
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
By utilizing the properties of quantum mechanics, quantum computers have the potential to factor a key pair of a large prime number and break some of the core cryptographic primitives that most information infrastructures depend on. This means that today's widely used cryptographic algorithms can soon become unsafe and need to be modified...
journal article 2024
document
Luthra, Sunil (author), Janssen, M.F.W.H.A. (author), Rana, Nripendra P. (author), Yadav, Gunjan (author), Dwivedi, Yogesh K. (author)
Purpose: Blockchain technology (BCT) can be used for a wide variety of applications across domains and can bring many benefits. BCT-based applications can be beneficial for the government as well as businesses. Despite the many promises, BCT implementation lags behind. The purpose of this research is to identify a roadmap of critical...
journal article 2022
document
Janssen, S.K.H. (author), Vreugdenhil, H.S.I. (author), Hermans, L.M. (author), Slinger, J (author)
Nature-based flood defence is an innovative design alternative for achieving protection against flooding. Despite significant advancements in science, models and concepts, routine implementation beyond pilot projects remains limited. To better understand why, we have looked into the complexities of nature-based flood defence implementation...
journal article 2020