Searched for: +
(1 - 20 of 51)

Pages

document
Keyser, S. (author), Velzeboer, T. (author)
The RFID guardian is an embedded device to protect the privacy of people using their RFID (Radio Frequency IDentification) enabled products. This BSc. project is about how version 2 of the RFID Guardian hardware was designed. Besides the description about the hardware it handles some obligatory paperwork for the design flow which was used during...
bachelor thesis 2009
document
van Driel, Ronald (author), van der Hout, Justin (author), van der Wel, Marissa (author), Houtman, Marco (author)
As of this moment there is a lack of data about rainfall in cities. To collect such data, IBM has started the Sense Umbrella Connection and Desensitisation project. For this project an umbrella was equipped with a piezoelectric sensor and a Bluetooth device to record the rain that falls on the surface of this umbrella. One downside of this...
bachelor thesis 2017
document
Nagtegaal, M.A. (author)
I propose an implementation of the quantum private query protocol as described in an article using a photon to encode a question and reflectionor transmission of the photon as answer options. Each question is represented by a photon in a transmission line with both ends returning to the user, and the answer is represented by reflection or...
bachelor thesis 2015
document
Darbari, Shubhankar (author)
The expansion of the Internet and wireless access has led to a widespread increase of Internet of Things applications. These smart devices are becoming a daily aspect of our lives. All the convenient and automated services provided by smart devices come from a centralized service provider. This service provider has access to all the personal...
bachelor thesis 2021
document
Ştefan, Andrei (author)
Collaboration is a key technique in modern supply chains, both for building trust with other companies, but also for reducing costs or maximizing profits. It is an approach which provides all involved parties with benefits that they could not possibly achieve on their own. Collaboration, however, requires abundant information, including...
bachelor thesis 2021
document
van der Poel, Cesar (author)
Information-Centric Networking (ICN) is a networking paradigm proposed to replace the current IP network. It uses in-network caching to enhance availability. However, as a clean slate approach is unlikely to work, an architecture that allows for the two paradigms to coexist needs to me used to facilitate the transition. Several such...
bachelor thesis 2021
document
Arora, Shruti (author)
Information-centric Networking (ICN) is the revolution of the internet due to its many benefit over the current internet infrastructure, namely caching, location-independent routing, and data-centric security. ICN ensures seamless data transfer due to its content-centric nature. Due to its content-centric nature, it is a must to ensure that...
bachelor thesis 2021
document
van de Poel, I.R. (author)
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by distinguishing four important value clusters that should be considered when deciding on cybersecurity measures. These clusters are security, privacy, fairness and accountability. Each cluster consists of a range of further values, which can be...
book chapter 2020
document
Yin, Y. (author), Zuiderwijk-van Eijk, A.M.G. (author), Van Ossenbruggen, Jacco (author), Jeffery, Keith (author), Luthfi, A. (author), Janssen, M.F.W.H.A. (author)
Governments and publicly-funded research institutions increasingly open up data collected and created through research. One way to share and use data obtained through research is through Virtual Research Environments (VREs). Insights obtained through open data use in VREs can subsequently provide input for policy making. However, this process...
conference paper 2018
document
Blenn, N. (author), Doerr, C. (author), Shadravan, N. (author), Van Mieghem, P. (author)
After the early land rush and fast exponential growth of online social networking platforms, concerns about how data placed in online social networks may be exploited and abused have begun to appear among mainstream users. Social networking sites have responded to these new public sentiments by introducing privacy filters to their site, allowing...
conference paper 2012
document
Dijkhuis, Sander (author), van Wijk, R. (author), Dorhout, Hidde (author), Bharosa, N. (author)
As a frequent participant in eSociety, Willeke is often preoccupied with paperwork because there is no easy to use, affordable way to act as a qualified person in the digital world. Confidential interactions take place over insecure channels like e-mail and post. This situation poses risks and costs for service providers, civilians and...
conference paper 2018
document
Strucks, Christopher (author), Slokom, M. (author), Larson, M.A. (author)
Past research has demonstrated that removing implicit gender information from the user-item matrix does not result in substantial performance losses. Such results point towards promising solutions for protecting users’ privacy without compromising prediction performance, which are of particular interest in multistakeholder environments. Here,...
conference paper 2019
document
Bierens, R.H. (author), Klievink, A.J. (author), van den Berg, J. (author)
Today’s increasing connectivity creates cyber risks at personal, organizational up to societal level. Societal cyber risks require mitigation by all kinds of actors where government should take the lead due to its responsibility to protect its citizens. Since no formal global governance exists, the governmental responsibility should start at the...
conference paper 2017
document
Luthfi, A. (author), Janssen, M.F.W.H.A. (author), Crompvoets, Joep (author)
Open government data initiatives result in the expectation of having open data available. Nevertheless, some potential risks like sensitivity, privacy, ownership, misinterpretation, and misuse of the data result in the reluctance of governments to open their data. At this moment, there is no comprehensive overview nor a model to understand the...
conference paper 2018
document
Najafian, S. (author), Inel, O. (author), Tintarev, N. (author)
Explanations can be used to supply transparency in recommender systems (RSs). However, when presenting a shared explanation to a group, we need to balance users' need for privacy with their need for transparency. This is particularly challenging when group members have highly diverging tastes and individuals are confronted with items they do not...
conference paper 2020
document
Shishkov, Boris (author), Janssen, M.F.W.H.A. (author)
Networked physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity, allow for run-time acquisition of user data. This in turn can enable information systems which capture the “current” user state and act accordingly. The use of this data would result in context...
conference paper 2018
document
Domanski, Rob (author), Estevez, Elsa (author), Styrin, Evgeny (author), Alfano, M.R. (author), Harrison, Teresa M. (author)
In this panel, scholars discuss involving data, computational analysis, and information technology that hasthe potential to present ethical quandaries in the course of decision making related to digital government. More specifically, the presentations focus on algorithm-based decision making, personally identifiable information, and the...
conference paper 2018
document
Dekker, Florine W. (author), Erkin, Z. (author)
Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption...
conference paper 2021
document
Gedrojc, B. (author)
The objective of this thesis is to preserve privacy for the user while untrustworthy proxies are involved in the communication and computation i.e. private computing. A basic example of private computing is an access control system (proxy) which grants access (or not) to users based on fingerprints. For privacy reasons the user does not want to...
doctoral thesis 2011
document
Erkin, Z. (author)
Recent advances in technology provided a suitable environment for the people in which they can benefit from online services in their daily lives. Despite several advantages, online services also constitute serious privacy risks for their users as the main input to algorithms are privacy sensitive such as demographic information, shopping...
doctoral thesis 2010
Searched for: +
(1 - 20 of 51)

Pages