- document
-
Maesen, Palle (author)The media watermarking technique domain has had the last 30 years to develop itself. The non-media side, however, is a way newer sub-domain. [1] The data-gathering process for machine learning algorithms is a tedious and time consuming task. This becomes worse as the scale of these algorithms increases. Thus, protecting the datasets against...bachelor thesis 2023
- document
-
Hristov, Tsvetomir (author)Although digital watermarking has been a well-researched topic for the past decades and has seen numerous implementations for relational databases, it still lacks research for non-relational schema-less databases. In this paper, we explore proposed techniques for non-relational database watermarking and introduce an improved technique for NoSQL...bachelor thesis 2023
- document
-
Nierop, Jaden (author)Digital watermarking has been used extensively in media in recent years. Yet, there are still relatively few techniques for watermarking 3D meshes. In this paper we implement a watermarking algorithm proposed by O. Benedens that encodes a bit string in the distribution of the normals of the faces of the mesh and investigate a method to improve...bachelor thesis 2023
- document
-
Porsius Martins, Célio (author)Money laundering is the process of hiding the origin of funds obtained through illicit activities. It is a major problem that has significant impacts on the global financial system and undermines the integrity of financial institutions. To combat this, the Dutch government planning to make it easier for banks to share data to improve the...master thesis 2023
- document
-
de With, Wim (author)Recommender systems usually base their predictions on user-item interaction, a technique known as collaborative filtering. Vendors that utilize collaborative filtering generally exclusively use their own user-item interactions, but the accuracy of the recommendations may improve if several vendors share their data. Since user-item interaction...master thesis 2022
- document
-
Palazzo, Marco (author)Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These data can be aggregated to compute useful statistics from multiple sources using data aggregation protocols. However, oftentimes these data contain private information that must be protected from misuse. Privacy-preserving protocols can help to...master thesis 2022
- document
-
Shen, Yu (author)Payment channel networks (PCNs) are a promising solution to the blockchain scalability problem. They move payments off-chain, i.e., not all payments have to be included in the blockchain. Thus, they do not require that every payment is broadcast to all participants and verified by them. Not requiring global consensus reduces latency, computation...master thesis 2022
- document
-
Karahan, Asli (author)Healthcare recommender systems emerged to help patients make better decisions for their health, leveraging the vast amount of data and patient experience. One type of this system focuses on recommending the most appropriate physician based on previous patient feedback in the form of ratings. Such advice can be challenging to generate for new...master thesis 2022
- document
-
Memar Zahedani, Armin (author)Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auctioneer aggregates the offers into demand and supply curves to...master thesis 2022
- document
-
Xu, Li (author)Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usage of third-party verified credentials bring us convenience in authentication. The Verifiable Credential (VC) data model is a new standard proposed by the W3C association to ease the expression and verification of third-party verified credentials...master thesis 2022
- document
-
Hondelink, Dieuwer (author)Digital signatures are used everywhere around us. They are well-studied and have been standardized since 1994. In 2002, Johnson et al. introduced the notion of homomorphic digital signatures, allowing one to perform computations on signed data. These signatures are especially useful for linear network coding, a technique used to improve...master thesis 2022
- document
-
Hendrikx, Roemer (author)In the past 8 years, Bitcoin has dominated the cryptocurrency markets and drawn attention from academia, developers and legislators alike. Bitcoin has been praised for its impact on decentralizing trust and currencies but also criticized for its volatility and energy-inefficient consensus mechanism. To improve its limitations, in 2016, payment...master thesis 2022
- document
-
Kester, David (author)Modern railway signalling systems are based on a wireless communication link between train and trackside entities. Secure communication between these entities is established using cryptographic symmetric keys loaded beforehand. Train and trackside entities across Europe are maintained by different Key Management Centres (KMC), making the...master thesis 2021
- document
-
Băbeanu, Alexandru (author)Online advertisement is a multi-billion dollar industry that constitutes a primary source of income for most publishers offering free content on the Web. Online behavioural advertisement refers to the practice of serving targeted ads to online users based on their potential interests. In order to infer these interests, online advertisers...master thesis 2021
- document
-
Magnúsdóttir, Ásta (author)Swiss watches are known around the world as a luxury product. Due to the fact that the product is considered a status symbol of wealth the market for counterfeit watches is a continuing concern of the industry. Historically the watches have primarily been manufactured in Switzerland. In recent years, however, manufacturing is done all over the...master thesis 2021
- document
-
Wiemers, Marina (author)With recent advances in performance and complexity, multi-party computation, a privacy-preserving technology which allows for joint processing of hidden input data, has lately been found to be applicable in a number of use cases. Despite existing implementations for secure data aggregation, substantial adoptions of the technology remain limited...bachelor thesis 2021
- document
-
Latyšov, Sever (author)Around the world millions of people get injured due to traffic accidents. Autonomous vehicles are expected to significantly reduce these numbers. To increase safety, autonomous vehicle communication can be used. Current vehicle communication networks called VANETs have security and privacy protection problems and the vehicle industry is...bachelor thesis 2021
- document
-
Kolar, Brontë (author)Social determinants such as a person’s race, level of education, and income can be responsible for their health outcomes. Consequently, we see that discrimination along the social spectrum results in health disparities. In an effort to close the gaps in healthcare systems, these determinants have been heavily researched. Open questions remain...bachelor thesis 2021
- document
-
Maas, Wouter (author)Globally, citizens’ assemblies have been gaining momentum as a way to counter dissatisfaction in democracies. Central to the citizens’ assembly is sortition, the process of randomly selecting political representatives given certain demographic criteria. In order to have an assembly representative of the population, personal data is necessary to...bachelor thesis 2021
- document
-
Kollár, Eniko (author)Globally, it is estimated by the UN that 2% - 5% of the annual GDP is lost to money laundering. Cur-rent anti-money laundering efforts are hindered by both the lack of trust between financial institutions internationally and the presence of local privacy regulations like GDPR. This makes it unfeasible to share plain transaction data between...bachelor thesis 2021