Searched for: contributor%3A%22Erkin%2C+Z.+%28mentor%29%22
(1 - 20 of 58)

Pages

document
Hoogerwerf, E. (author)
There exists several applications where it is desirable to produce random numbers such that adding these random numbers yields a publicly known sum. Efficient algorithms are necessary for generating such joint random numbers in an untrusted environment in settings such as, but not restricted to, multi-party computation (MPC). Applications range...
bachelor thesis 2016
document
Kolar, Brontë (author)
Social determinants such as a person’s race, level of education, and income can be responsible for their health outcomes. Consequently, we see that discrimination along the social spectrum results in health disparities. In an effort to close the gaps in healthcare systems, these determinants have been heavily researched. Open questions remain...
bachelor thesis 2021
document
Kollár, Eniko (author)
Globally, it is estimated by the UN that 2% - 5% of the annual GDP is lost to money laundering. Cur-rent anti-money laundering efforts are hindered by both the lack of trust between financial institutions internationally and the presence of local privacy regulations like GDPR. This makes it unfeasible to share plain transaction data between...
bachelor thesis 2021
document
Alkan, Efe (author)
Pseudo-random number generators are the essential part of many security protocols such as signature schemes, key-exchange protocols and encryption algorithms. The security of these protocols is usually dependent on the quality of the generators they use. The generation of unpredictable random numbers supplies refreshment to the protocols, which...
bachelor thesis 2021
document
Berendsen, Dan Dan (author)
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitive data the security for these devices is of greater importance. As these devices are connected with the internet being able to have secure communication is crucial. Some of the major aspects for secure communication are identification and message...
bachelor thesis 2021
document
Joshi, Ayush (author)
Supply chains are vital to the global economy, and so, increasing efficiency in supply chain management is of utmost importance. Modernizing technology has allowed for various uses of machine learning to be possible in several aspects of supply chains, specifically in demand forecasting with prediction models, and customer relations with chat...
bachelor thesis 2021
document
Ştefan, Andrei (author)
Collaboration is a key technique in modern supply chains, both for building trust with other companies, but also for reducing costs or maximizing profits. It is an approach which provides all involved parties with benefits that they could not possibly achieve on their own. Collaboration, however, requires abundant information, including...
bachelor thesis 2021
document
Eckhardt, Thomas (author)
Wireless Sensor Networks(WSN's) are networks of sensor that wirelessly communicate to each other. The communication of these sensors needs to be secured to prevent leaking of potentially sensitive information of the data sent between the user, gateway and sensors. For WSN's lightweight authentication, protocols have been developed in order to...
bachelor thesis 2021
document
Dikmen, Cemal (author)
With the growing scale of the IoT, many industries enjoy the benefit of automation. The IoT consists of an interconnected network of devices that sense their surroundings and share data among other IoT devices. However, this data can be sensitive and private in nature, making security within the ever-growing IoT network a high priority. Because...
bachelor thesis 2021
document
Aué, J. (author), Van Staveren, R.H. (author)
Medical doctors and researchers have to send medical image files to each other. This may be for a consult, because a patient is treated by a different doctor or because the files are to be used for research. The files contain personal health information, and privacy rules have to be satisfied before the files may be sent. To securely send the...
bachelor thesis 2014
document
Latyšov, Sever (author)
Around the world millions of people get injured due to traffic accidents. Autonomous vehicles are expected to significantly reduce these numbers. To increase safety, autonomous vehicle communication can be used. Current vehicle communication networks called VANETs have security and privacy protection problems and the vehicle industry is...
bachelor thesis 2021
document
Cirikka, Selim (author)
Protocols for Loanable Funds (PLFs) are lending protocols that exist in the decentralized finance (DeFi) ecosystem. They provide users the opportunity of lending and borrowing of cryptocurrencies. The economic model used to ensure liquidity in these protocols are variable parameters and incentives to reach an optimal equilibrium and...
bachelor thesis 2021
document
de Camara, J. (author), Jacobino, S. (author)
bachelor thesis 2016
document
Wiemers, Marina (author)
With recent advances in performance and complexity, multi-party computation, a privacy-preserving technology which allows for joint processing of hidden input data, has lately been found to be applicable in a number of use cases. Despite existing implementations for secure data aggregation, substantial adoptions of the technology remain limited...
bachelor thesis 2021
document
Hristov, Tsvetomir (author)
Although digital watermarking has been a well-researched topic for the past decades and has seen numerous implementations for relational databases, it still lacks research for non-relational schema-less databases. In this paper, we explore proposed techniques for non-relational database watermarking and introduce an improved technique for NoSQL...
bachelor thesis 2023
document
Maas, Wouter (author)
Globally, citizens’ assemblies have been gaining momentum as a way to counter dissatisfaction in democracies. Central to the citizens’ assembly is sortition, the process of randomly selecting political representatives given certain demographic criteria. In order to have an assembly representative of the population, personal data is necessary to...
bachelor thesis 2021
document
Amesz, M. (author), Biemans, E. (author), Ruoff, J. (author), Van den Oever, J. (author)
Confidentiality This report contains detailed information about the design and implementation of Charon. The DataDiode, and by extension Charon, is used in many high security environments. They handle highly confidential data, and are used by clients ranging from major companies to governmental organizations. Because of this, the details about...
bachelor thesis 2012
document
Nierop, Jaden (author)
Digital watermarking has been used extensively in media in recent years. Yet, there are still relatively few techniques for watermarking 3D meshes. In this paper we implement a watermarking algorithm proposed by O. Benedens that encodes a bit string in the distribution of the normals of the faces of the mesh and investigate a method to improve...
bachelor thesis 2023
document
Maesen, Palle (author)
The media watermarking technique domain has had the last 30 years to develop itself. The non-media side, however, is a way newer sub-domain. [1] The data-gathering process for machine learning algorithms is a tedious and time consuming task. This becomes worse as the scale of these algorithms increases. Thus, protecting the datasets against...
bachelor thesis 2023
document
Välling, Rasmus (author)
Recently we have been witnesses to a string of controversial elections: the 2016 US Presidential election, the 2016 Brexit referendum, the 2018 Russian presidential election, the 2018 Zimbabwe elections. The controversies surrounding elections are seemingly endless.<br/><br/>Why are these examples relevant? In the 21st century, we are still...
master thesis 2018
Searched for: contributor%3A%22Erkin%2C+Z.+%28mentor%29%22
(1 - 20 of 58)

Pages