Searched for: +
(1 - 13 of 13)
document
van Engelenburg, S.H. (author), Janssen, M.F.W.H.A. (author), Klievink, A.J. (author)
Toensurepublicsafetyandsecurity,itisvitallyimportantforgovernmentstocol- lect information from businesses and analyse it. Such information can be used to determine whether transported goods might be suspicious and therefore require physical inspection. Although businesses are obliged to report some information, they are reluctant to share addi-...
journal article 2017
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
E-commerce platforms incorporate reputation systems that allow customers to rate suppliers following financial transactions. Existing reputation systems cannot defend the centralized server against arbitrarily tampering with the supplier’s reputation. Furthermore, they do not offer reputation access across platforms. Rates are faced with privacy...
journal article 2021
document
Kumar, Gulshan (author), Saha, Rahul (author), Lal, C. (author), Conti, M. (author)
Digital forensic in Internet-of-Thing (IoT) paradigm is critical due to its heterogeneity and lack of transparency of evidence processing. Moreover, cross-border legalization makes a hindrance in such process pertaining to the cloud forensic issues. This urges a forensic framework for IoT which provides distributed computing, decentralization...
journal article 2021
document
de Klerk, Leon (author)
The domain name system (DNS) and public key infrastructure (PKI) provide the core services for the Internet. The use of these systems requires trust in institutions to provide proper services, which they can fail to provide. Centralized management allows these institutions to perform censorship. Additionally, these legacy systems have seen...
bachelor thesis 2021
document
Filip, Eduard (author)
Federated Learning starts to give a new perspective regarding the applicability of machine learning in real-life scenarios. Its main goal is to train the model while keeping the participants' data in their devices, thus guaranteeing the privacy of their data. One of the main architectures is the Horizontal Federated Learning, which is the most...
bachelor thesis 2021
document
Dikmen, Cemal (author)
With the growing scale of the IoT, many industries enjoy the benefit of automation. The IoT consists of an interconnected network of devices that sense their surroundings and share data among other IoT devices. However, this data can be sensitive and private in nature, making security within the ever-growing IoT network a high priority. Because...
bachelor thesis 2021
document
Slager, Cheyenne (author)
GoQuorum is an enterprise blockchain platform that supports smart contracts and allows for private transactions. Smart contracts enable automated payment while eliminating the need for third-party involvement. Previous attacks on smart contracts have already shown that existing vulnerabilities can lead to great financial losses. Yet, a study...
bachelor thesis 2021
document
Yu, Xinghuo (author), Tang, Changbing (author), Palensky, P. (author), Colombo, Armando (author)
Imagine you want to send money to a friend overseas. Wouldn't it be good if you didn't have to pay hefty fees to the intermediaries, and your friend received the funds very quickly? Now imagine ordering parts to make a product in your manufacturing plant. Wouldn't it be great if you were able to verify where each part comes from and have...
journal article 2022
document
Park, Chaiwon (author)
A rise in the use of blockchain systems implies an increase in smart contract usage. Blockchain systems can easily be found these days, most notably in cryptocurrencies and financial management. Furthermore, the Internet of Things (IoT) is being developed with blockchain, since blockchain ensures trust in IoT data and adds great flexibility....
bachelor thesis 2022
document
Grishkov, Ilya (author)
This paper offers a prototype of a smart-contract-based encryption scheme meant to improve the security of user data being uploaded to the ledger. A new extension to the self-encryption scheme was introduced by integrating identity into the encryption process. Such integration allows to permanently preserve ownership of the original file and...
bachelor thesis 2022
document
Gordijn, Daan (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the...
conference paper 2023
document
Grishkov, I. (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This paper offers a prototype of a Hyperledger Fabric-IPFS based network architecture including a smart contract based encryption scheme that meant to improve the security of user’s data that is being uploaded to the distributed ledger. A new extension to the self-encryption scheme was deployed by integrating data owner’s identity into the...
conference paper 2023
document
van den Eeden, Lars (author)
The Internet of Things industry is expanding rapidly. However, many security breaches occur, and privacy is often at stake in traditional IoT networks. These centralized systems will not be able to cope with dynamically changing environments. In light of these risks, it is crucial to prevent and minimize the chances of attacks occurring....
bachelor thesis 2023
Searched for: +
(1 - 13 of 13)