Searched for: subject%3A%22Anonymization%22
(1 - 20 of 24)

Pages

document
Ruppert, Mats (author)
In a society where food poverty is affecting more and more people. The presence of social food initiatives, such as community kitchens, is of growing importance. This paper investigates London’s high streets in search of tools to achieve the acknowledgement of social food provision in the everyday life of society. Something which is still not...
master thesis 2024
document
Trap, Cyril (author)
Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it...
master thesis 2023
document
Heijligers, Jaap (author)
Tor is the most popular tool for anonymous online communication. However, the performance of Tor's volunteer-run network is suboptimal when network congestion occurs. Within Tor, many connections are multiplexed over a single TCP connection between relays, which causes a head-of-line blocking problem, degrading relay performance. In this thesis,...
master thesis 2021
document
Iacoban, Paula (author)
Anonymity networks, such as The Invisible Internet Project, commonly known as I2P, enable privacy aware users to stay anonymous on the Internet and provide secure methods of communication, as well as multi-layered encryption. Despite the many innocent reasons users opt for online anonymity, these particular networks are censored at times, as...
bachelor thesis 2021
document
Biazin do Nascimento, Francine (author)
There are many valid reasons for someone to choose to stay anonymous online, not least of which is the fact that online privacy is a human right. However, discrimination against users of anonymity networks from web-servers and content distribution networks on the grounds of defense against malicious users often means that genuine users are faced...
bachelor thesis 2021
document
Mulder, Jurgen (author)
Users of anonymity networks face differential treatment and sometimes get blocked by websites, it is currently unclear how common this blocking is. This research aims to provide an overview of how common this blocking is while utilizing the AN.ON anonymity network. The analysis is accomplished by utilizing automated web scraping and processing...
bachelor thesis 2021
document
Özkan, Emre (author)
The LND is currently the most popular routing algorithm used in the Lightning Network, the second layer solution to Bitcoin’s scalability. Despite its popularity, recent studies demonstrate that its deterministic nature compromises the anonymity of the Lightning Network. In other words, threatening parties present in the transaction path can...
bachelor thesis 2021
document
Heemskerk, Joran (author)
The Lightning Network (LN) is a second-layer solution built on top of the Bitcoin protocol, allowing faster and cheaper transactions without compromising on decentralization. LN is also designed to be more anonymous, since less information has to be shared with the entire network. This should, in theory, improve privacy as well. However, recent...
bachelor thesis 2021
document
Plotean, Mihai (author)
The Lightning Network is a second layer payment protocol built on top of Bitcoin, which is scalable and has reduced transaction fees. It does so by eliminating the need to broadcast every transaction to the whole network. When one user wants to send a payment to another, the routing protocol generates a path between them that is always fast and...
bachelor thesis 2021
document
Kazemi Koohbanani, Paolo Arash (author)
The Bitcoin Lightning Network is a layer-two solution that promises instant payments, scalability, and low transaction fees on top of the Bitcoin blockchain. In case there is no direct channel between the sender and receiver, the routing algorithm uses source routing and a shortest path algorithm to determine the hops in a transaction. However,...
bachelor thesis 2021
document
de Boer, Rick (author)
The Lightning Network aims to solve Bitcoin's scalability problem by providing a way to transact with minimal use of the blockchain. Instead, payments are routed over payment channel networks. This routing is done by LN clients, which use cost functions to compute the optimal transaction path. With the use of onion routing, LN tries to hide the...
bachelor thesis 2021
document
Rustici, Pietro (author)
This study investigates whether an automatic anonymization algorithm that takes as input a 3D model of a human face can produce an output model exempt from General Data Protection Regulation (GDPR) biometric data definition. The algorithm first uses Random Sample Consensus (RANSAC) for registering the source point cloud globally to an oriented...
bachelor thesis 2020
document
Sabée, Wendo (author)
Privacy in the Internet is under attack by governments and companies indiscriminately spying on everyone. The anonymity network Tor is a solution to restore some privacy, however, Tor is slow in both bandwidth and latency. It uses a TCP-based connection to multiplex different circuits between nodes and this causes different independent circuits...
master thesis 2019
document
Li, Victor (author)
Digital identities and credentials are gradually replacing physical documents, as they can be verified with more accuracy and efficiency. Since online privacy is becoming more crucial than ever, it is essential to preserve the privacy of individuals whenever possible. Therefore, anonymous attestation of digital credentials should be feasible,...
master thesis 2018
document
El Maouchi, Mourad (author)
Traceability is an increasingly important aspect of the supply chain with several highlights throughout the last few decades. Parties, such as consumers and government agencies, have shown an increase in demand for information regarding their products and materials. Studies throughout the last few years have proposed approaches for a...
master thesis 2018
document
Norberhuis, S.D. (author)
Peer-to-peer networks are often large, collaborative networks where peers can join openly. The essence of a collaborative, distributed system is that every node performs tasks for other nodes. The peers often help in singular interactions and without direct reciprocity. Malicious peers can abuse and freeride the public goods. The network without...
master thesis 2015
document
Ruigrok, R.J. (author)
The Internet is a large public network of networks and computers. When no countermeasures are taken, all information and activities taking place on the public Internet are subject to traffic analysis, threatening personal freedom and privacy. The first measure to take is securing all transferred information by applying encryption on it, which...
master thesis 2015
document
Van Bruggen, C. (author), Feddes, N.F. (author), Vermeer, M. (author)
Privacy is dying. Internet users have been trying more and more to keep governments' and security agencies' prying eyes away from their online activity. Anonymity - Internet anonymity, specifically - has therefore gained traction in recent years. In order to further contribute to the effort of Internet privacy and anonymity, this project's goal...
bachelor thesis 2015
document
Jansen, C.M. (author)
The societal issue that this project tries to address is the increasing anonymity in residential urban neighborhoods. The increasing anonymity is caused by a decrease of social interaction between citizens that share the same living environment. The government used to subsidize community facilities like sports clubs and cultural institutions to...
master thesis 2015
document
Aué, J. (author), Van Staveren, R.H. (author)
Medical doctors and researchers have to send medical image files to each other. This may be for a consult, because a patient is treated by a different doctor or because the files are to be used for research. The files contain personal health information, and privacy rules have to be satisfied before the files may be sent. To securely send the...
bachelor thesis 2014
Searched for: subject%3A%22Anonymization%22
(1 - 20 of 24)

Pages