Searched for: subject%3A%22Anonymity%22
(1 - 20 of 31)

Pages

document
Trap, Cyril (author)
Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it...
master thesis 2023
document
Li, T. (author), Erkin, Z. (author), Lagendijk, R.L. (author)
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7 million packages are stolen or lost every day in the U.S. in 2020, which costs $25 million every day for the lost packages and the service. Information leakage during transportation is an important reason for theft since thieves can identify which truck is...
journal article 2022
document
Heijligers, Jaap (author)
Tor is the most popular tool for anonymous online communication. However, the performance of Tor's volunteer-run network is suboptimal when network congestion occurs. Within Tor, many connections are multiplexed over a single TCP connection between relays, which causes a head-of-line blocking problem, degrading relay performance. In this thesis,...
master thesis 2021
document
Biazin do Nascimento, Francine (author)
There are many valid reasons for someone to choose to stay anonymous online, not least of which is the fact that online privacy is a human right. However, discrimination against users of anonymity networks from web-servers and content distribution networks on the grounds of defense against malicious users often means that genuine users are faced...
bachelor thesis 2021
document
Iacoban, Paula (author)
Anonymity networks, such as The Invisible Internet Project, commonly known as I2P, enable privacy aware users to stay anonymous on the Internet and provide secure methods of communication, as well as multi-layered encryption. Despite the many innocent reasons users opt for online anonymity, these particular networks are censored at times, as...
bachelor thesis 2021
document
Mulder, Jurgen (author)
Users of anonymity networks face differential treatment and sometimes get blocked by websites, it is currently unclear how common this blocking is. This research aims to provide an overview of how common this blocking is while utilizing the AN.ON anonymity network. The analysis is accomplished by utilizing automated web scraping and processing...
bachelor thesis 2021
document
Heemskerk, Joran (author)
The Lightning Network (LN) is a second-layer solution built on top of the Bitcoin protocol, allowing faster and cheaper transactions without compromising on decentralization. LN is also designed to be more anonymous, since less information has to be shared with the entire network. This should, in theory, improve privacy as well. However, recent...
bachelor thesis 2021
document
Kazemi Koohbanani, Paolo Arash (author)
The Bitcoin Lightning Network is a layer-two solution that promises instant payments, scalability, and low transaction fees on top of the Bitcoin blockchain. In case there is no direct channel between the sender and receiver, the routing algorithm uses source routing and a shortest path algorithm to determine the hops in a transaction. However,...
bachelor thesis 2021
document
Özkan, Emre (author)
The LND is currently the most popular routing algorithm used in the Lightning Network, the second layer solution to Bitcoin’s scalability. Despite its popularity, recent studies demonstrate that its deterministic nature compromises the anonymity of the Lightning Network. In other words, threatening parties present in the transaction path can...
bachelor thesis 2021
document
Plotean, Mihai (author)
The Lightning Network is a second layer payment protocol built on top of Bitcoin, which is scalable and has reduced transaction fees. It does so by eliminating the need to broadcast every transaction to the whole network. When one user wants to send a payment to another, the routing protocol generates a path between them that is always fast and...
bachelor thesis 2021
document
de Boer, Rick (author)
The Lightning Network aims to solve Bitcoin's scalability problem by providing a way to transact with minimal use of the blockchain. Instead, payments are routed over payment channel networks. This routing is done by LN clients, which use cost functions to compute the optimal transaction path. With the use of onion routing, LN tries to hide the...
bachelor thesis 2021
document
Prabhu Kumble, S. (author), Epema, D.H.J. (author), Roos, S. (author)
Lightning, the prevailing solution to Bitcoin's scalability issue, uses onion routing to hide senders and recipients of payments. Yet, the path between the sender and the recipient along which payments are routed is selected such that it is short, cost efficient, and fast. The low degree of randomness in the path selection entails that...
conference paper 2021
document
Rustici, Pietro (author)
This study investigates whether an automatic anonymization algorithm that takes as input a 3D model of a human face can produce an output model exempt from General Data Protection Regulation (GDPR) biometric data definition. The algorithm first uses Random Sample Consensus (RANSAC) for registering the source point cloud globally to an oriented...
bachelor thesis 2020
document
van Wegberg, R.S. (author)
Many scientific studies and industry reports have observed the emergence of so-called cybercrime-as-a-service. The idea is that specialized suppliers in the underground economy cater to criminal entrepreneurs in need of certain capabilities – substituting specialized technical knowledge with “knowing what to buy”. The impact of this trend could...
doctoral thesis 2020
document
van Wegberg, R.S. (author), Miedema, F.E.G. (author), Akyazi, U. (author), Noroozian, A. (author), Klievink, A.J. (author), van Eeten, M.J.G. (author)
Many cybercriminal entrepreneurs lack the skills and techniques to provision certain parts of their business model, leading them to outsource these parts to specialized criminal vendors. Online anonymous markets, from Silk Road to AlphaBay, have been used to search for these products and contract with their criminal vendors. While one listing of...
conference paper 2020
document
Sabée, Wendo (author)
Privacy in the Internet is under attack by governments and companies indiscriminately spying on everyone. The anonymity network Tor is a solution to restore some privacy, however, Tor is slow in both bandwidth and latency. It uses a TCP-based connection to multiplex different circuits between nodes and this causes different independent circuits...
master thesis 2019
document
van den Bos, Anne Hester (author), Tan, E.B.K. (author)
This paper investigates the effect of anonymity in online peer review on feedback types (directive, non-directive, higher-order concern, lower-order concern) and students' revisions (processed, partly processed and not processed) in second-language writing. Participants were 114 Dutch second-year university students. They were assigned to two...
journal article 2019
document
Li, Victor (author)
Digital identities and credentials are gradually replacing physical documents, as they can be verified with more accuracy and efficiency. Since online privacy is becoming more crucial than ever, it is essential to preserve the privacy of individuals whenever possible. Therefore, anonymous attestation of digital credentials should be feasible,...
master thesis 2018
document
El Maouchi, Mourad (author)
Traceability is an increasingly important aspect of the supply chain with several highlights throughout the last few decades. Parties, such as consumers and government agencies, have shown an increase in demand for information regarding their products and materials. Studies throughout the last few years have proposed approaches for a...
master thesis 2018
document
van Wegberg, R.S. (author), Tajalizadehkhoob, S. (author), Soska, Kyle (author), Akyazi, U. (author), Hernandez Ganan, C. (author), Klievink, A.J. (author), Christin, Nicolas (author), van Eeten, M.J.G. (author)
Researchers have observed the increasing commoditization of cybercrime, that is, the offering of capabilities, services, and resources as commodities by specialized suppliers in the underground economy. Commoditization enables outsourcing, thus lowering entry barriers for aspiring criminals, and potentially driving further growth in cybercrime....
conference paper 2018
Searched for: subject%3A%22Anonymity%22
(1 - 20 of 31)

Pages