Searched for: %2520
(1 - 20 of 84)

Pages

document
Khattat, Mostafa (author)
Threshold signatures play a crucial role in the security of blockchain applications. An efficient threshold signature can be applied to enhance the security of wallets and transactions by enforcing multi-device-based authentication, as this requires adversaries to compromise more devices to recover the key. Additionally, threshold signatures can...
master thesis 2024
document
Out, Annabelle (author)
This project explores the prospects for interior design in a dual purpose train that can run both day and night for improved utilization and comfort.<br/><br/>Contemporary trains are categorized as either exclusively for daytime or nighttime use. Their interiors limit them to specific temporal contexts. For instance, in daytime trains,...
master thesis 2024
document
Ghasia, Zahra (author)
The use of Electronic Health Records (EHRs) has seen a breakthrough in clinical research for personalized treatments (Hamburg &amp; Collins, 2010.) Despite the potential advantages of vast EHR data available, constraints of privacy and legislation hinder its use (Rieke et al., 2020.) Health data exists in an interconnected healthcare system ...
master thesis 2024
document
Li, Martin (author)
In recent years, the rapid advancements in big data, machine learning, and artificial intelligence have led to a corresponding rise in privacy concerns. One of the solutions to address these concerns is federated learning. In this thesis, we will look at the setting of vertical federated learning based on tree models. We have built a system that...
master thesis 2024
document
Musick, Geoff (author), Duan, Wen (author), Najafian, S. (author), Sengupta, Subhasree (author), Flathmann, Christopher (author), Knijnenburg, Bart (author), McNeese, Nathan (author)
Newly-formed teams often encounter the challenge of members coming together to collaborate on a project without prior knowledge of each other’s working and communication styles. This lack of familiarity can lead to conflicts and misunderstandings, hindering effective teamwork. Derived from research in social recommender systems, team...
journal article 2024
document
Spanninga, Paulien (author)
In recent years, the medical world has seen rapid digitalisation. Digitalisation of healthcare and the opportunities of remote monitoring can help to keep the healthcare system affordable and accessible. A promising application of remote monitoring is the use of consumer-grade wearables for clinical care. However, vulnerabilities leave consumer...
master thesis 2023
document
Humblet Vertongen, Marie (author)
Face recognition using lidar presents challenges arising from high dimensionality and data sparsity, especially at longer distances. This paper proposes a novel approach for face recognition via automotive lidar. The approach leverages a combination of deep learning and point cloud processing techniques. After identification of the facial point...
master thesis 2023
document
Kroskinski, Ivo (author)
Organizations use cloud service providers for outsourcing their data, since this includes advantages such as: scalability, security and no need for in house experts. Therefore, outsourcing data to cloud providers results in reduced costs. <br/>The disadvantage of outsourcing data to a cloud provider, is that organizations are not in control of...
master thesis 2023
document
Yu, Wenrui (author)
Privacy concerns in federated learning have attracted considerable attention recently. In centralized networks, it has been observed that even without directly exchanging raw training data, the exchange of other so-called intermediate parameters such as weights/gradients can still potentially reveal private information. However, there has been...
master thesis 2023
document
Mercier, Arthur (author)
Reconstructing seen images from functional magnetic resonance imaging (fMRI) brain scans has been a growing topic of interest in the field of neuroscience, fostered by innovation in machine learning and AI. This paper investigates the possible presence of personal features allowing the identification of subjects from their reconstructed images....
bachelor thesis 2023
document
Taneva, Aleksandra (author)
Nowadays, the online industry contributes to a multi-billion dollar business, facilitates most of the population's everyday activities, and processes vast amounts of data, including personal data. Current work aims to explore the inconsistency or consistency of the content obtained by the websites to generate cookies based on various data that...
master thesis 2023
document
Kurteva, A.K. (author), Pandit, Harshvardhan J. (author)
Protecting and preserving individuals’ personal data is a legal obligation set out by the European Union’s General Data Protection Regulation (GDPR). However, the process of implementing data governance to support that, in a decentralised ecosystem, is still vague. Motivated by the need for lawful decentralised data processing, this paper...
conference paper 2023
document
Ofe, H.A. (author), Sandberg, Johan (author), Rudmark, Daniel (author), de Reuver, Mark (author)
conference paper 2023
document
Wang, Wei (author), Liu, Dongli (author), Xu, Peng (author), Yang, Laurence Tianruo (author), Liang, K. (author)
It has become a trend for clients to outsource their encrypted databases to remote servers and then leverage the Searchable Encryption technique to perform secure data retrieval. However, the method has yet to be considered a crucial need for replication on searchable encrypted data. It calls for challenging works on Dynamic Searchable...
journal article 2023
document
Memar Zahedani, Armin (author), Vos, J.V. (author), Erkin, Z. (author)
Double auctions are procedures to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Buyers and sellers inform the auctioneer what quantity they want to buy or sell at specific prices. The auctioneer aggregates these offers into demand and supply curves and finds the intersection representing the...
conference paper 2023
document
Gordijn, Daan (author), Kromes, R.G. (author), Giannetsos, Thanassis (author), Liang, K. (author)
This work aims to provide a more secure access control in Hyperledger Fabric blockchain by combining multiple ID’s, attributes, and policies with the components that regulate access control. The access control system currently used by Hyperledger Fabric is first completely analyzed. Next, a new implementation is proposed that builds upon the...
conference paper 2023
document
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...
journal article 2023
document
El-Zawawy, Mohamed A. (author), Lal, C. (author), Conti, M. (author)
With the rapid technological advancement in the Internet of Things (IoT) and Internet of Vehicles (IoV), we witness exponential growth of Connected and Autonomous Vehicles (CAVs). However, these integrations of IoV with other technologies make the IoV network and its interaction between different network components highly complex. Therefore,...
journal article 2023
document
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...
journal article 2023
document
Ding, Aaron Yi (author), van den Boogert, R.J. (author)
With rising numbers of people living in cities leading to increasing congestion and pollution, mobile crowdsensing applications form a potential solution to make transport systems smarter and more efficient. However, sharing data comes with the risk of private information being disclosed. Therefore, a clear incentive is necessary to motivate...
journal article 2023
Searched for: %2520
(1 - 20 of 84)

Pages