Searched for: contributor%3A%22Roos%2C+S.+%28graduation+committee%29%22
(1 - 20 of 23)

Pages

document
Zhu, Chaoyi (author)
Federated Learning is highly susceptible to backdoor and targeted attacks as participants can manipulate their data and models locally without any oversight on whether they follow the correct process. There are a number of server-side defenses that mitigate the attacks by modifying or rejecting local updates submitted by clients. However, we...
master thesis 2023
document
van Schaick, Bart (author)
Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications demand confidentiality, necessitating the development of permissioned...
master thesis 2023
document
Thomas, Jeroen (author)
In a world where more data gets uploaded to the cloud, it is essential that the data gets stored securely. For users to keep search functionality, searchable symmetric encryption has been developed. SSE works by a user sending a token representing a keyword (or a range), after which the server returns the documents that match the keyword (or...
master thesis 2022
document
Shen, Yu (author)
Payment channel networks (PCNs) are a promising solution to the blockchain scalability problem. They move payments off-chain, i.e., not all payments have to be included in the blockchain. Thus, they do not require that every payment is broadcast to all participants and verified by them. Not requiring global consensus reduces latency, computation...
master thesis 2022
document
Memar Zahedani, Armin (author)
Double Auctions are mechanisms to trade commodities such as electricity or parts of the wireless spectrum at optimal prices. Bidders and sellers simultaneously submit quantity-price pairs to an auctioneer, denoting the quantity they want to buy or sell at specific prices. The auctioneer aggregates the offers into demand and supply curves to...
master thesis 2022
document
Lambregts, Steven (author)
Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, these leakages are caused by practical designs but are considered an...
master thesis 2022
document
Baars, Thomas (author)
A problem faced by Tactile Internet (TI) is the distance limitation. A possible solution is to create a simulation of the remote environment, such that the delay experienced by a human operator is reduced. However, to obtain a model of the remote environment, before the user interacts with it, we need to be able to estimate the physical...
bachelor thesis 2022
document
Buijs, Teun (author)
The tactile internet can be described as the next step of the internet. It can empower people, adding physical interactions to what normally is just an audiovisual experience.<br/>It however does need ultra-low latency. <br/>A solution to having delays can be found in environment simulation.<br/>This paper describes a way to find the correct...
bachelor thesis 2022
document
Stuijt Giacaman, Willem (author)
We can see and we can hear through the internet, but not yet touch. Tactile Internet (TI) is the paradigm that will enable the transmission of tactile feedback through the internet. TI requires Ultra Low Latency (ULL) networking to prevent desynchronization. Reaching the ULL requirements for medium to long distances is not possible without...
bachelor thesis 2022
document
Van Acoleyen, Neil (author)
As technology evolves, transmission speeds become faster. Tactile Internet requires ultra-low-latency (ULL) communications to further immerse humans in a remote environment by transmitting movement and force feedback, allowing them to interact with that environment in real-time. However, no transmission speed can be fast enough to support the "1...
bachelor thesis 2022
document
Karayalçin, Sengim (author)
Some of the most prominent types of attacks against modern cryptographic implementations are side-channel attacks. These attacks leverage some unintended, often physical, leakage of the implementation to retrieve secret information. In recent times, a large part of the focus of side-channel research has been on deep learning methods. These...
master thesis 2022
document
Joosen, Floor (author)
Privacy and security are important topics in data aggregation, as companies are aggregating large amounts of sensitive data from their users. The aim of this paper is to improve the security and privacy of data aggregation using smart contracts, homomorphic encryption and post-quantum encryption methods on Hyperledger Fabric. After a literature...
bachelor thesis 2022
document
Park, Chaiwon (author)
A rise in the use of blockchain systems implies an increase in smart contract usage. Blockchain systems can easily be found these days, most notably in cryptocurrencies and financial management. Furthermore, the Internet of Things (IoT) is being developed with blockchain, since blockchain ensures trust in IoT data and adds great flexibility....
bachelor thesis 2022
document
Vega Sanchez, Julio (author)
The increasing demand for sharing Internet of Things (IoT) increases demand for a secure way of sharing data. Smart contracts could provide this because of its distributed nature. Proxy re-encryption is an encryption (PRE) method that can be used to share information. In this paper, a secure data sharing scheme is presented that uses multi-hop...
bachelor thesis 2022
document
Neut, Oliver (author)
Blockchains like Bitcoin are known to be victim of scalability issues. The lack in high throughput and low latency form a great bottleneck to its network. A promis- ing solution are layer 2 protocols, more precisely payment channel networks (PCN). Payment success rates are a common metric in these networks. These rates can be in- creased by...
bachelor thesis 2021
document
Andreescu, Dan (author)
The largest payment channel network, Bitcoin Lightning, shows a potential alternative to cur- rent financial systems, overcoming the scalability limitations of blockchain. Source onion routing is used to route payments, but novel routing protocols claim improved effectiveness by employ- ing strategies not compatible with the current state of...
bachelor thesis 2021
document
da Camara, Jehan (author)
Authentication of domains has been a crucial part of the growth of web browsing, especially for e-commerce and secure browsing. However, the digital space has expanded from web domains to include devices such as smart cars, smart houses, and other IoT devices. The future for these devices is to communicate autonomously with one another, also...
master thesis 2021
document
Faber, Julian (author)
Network covert timing channels are techniques to covertly transmit information over computer networks, by utilizing the time between subsequent network packets. Previous work on the detection of the various techniques has introduced numerous new methods, with high reported success. From these previous works we have noticed that there is little...
master thesis 2021
document
To, Seu Man (author)
The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital signs, making them valuable for use in the healthcare industry. Sharing this information with the user's healthcare provider has the potential to improve medical care by reducing medical misinformation....
master thesis 2020
document
van Driel, R.A. (author)
Solving propositional satisfiability (SAT) and constraint programming (CP) instances has been a fundamental part of a wide range of modern applications. For this reason a lot of research went into improving the efficiency of modern SAT and CP solvers. Recently much of this research has gone into exploring the possibilities of integrating machine...
master thesis 2020
Searched for: contributor%3A%22Roos%2C+S.+%28graduation+committee%29%22
(1 - 20 of 23)

Pages