Searched for: subject%3A%22Authenticity%22
(1 - 20 of 74)

Pages

document
Holtus, Jasper (author)
The slogan of the Groene Grachten (2018) for the flagship project at Oudezijds Voorburgwal 136 is ‘If it can happen here, it can happen anywhere!’ The renovation of the building in 2021 serves as a model for other canal houses to demonstrate that even these monumental buildings can be made sustainable. The aim of this paper is to investigate in...
student report 2024
document
Zhang, M. (author), Raghunath, Aparna (author), Zhao, A. (author), Eral, H.B. (author)
On-dose authentication (ODA) enhances security by incorporating customized molecular or micro-tags into each pill, preventing counterfeit products in genuine packages. ODA's security relies on tag non-replication and non-reverse engineering. Combining ODA with graphical Physical Unclonable Functions (PUF) promises maximum security. PUF uses...
journal article 2024
document
Dolieslager, Alan (author)
The goal of this project was to preserve the heritage aspect of Post-war reconstruction era Malls, which frequently face vacancy and demolition. The concept of Authenticity in heritage was an important factor to consider while transforming the design subject. The final design took into account the authenticity of materials, cultural authenticity...
master thesis 2023
document
van Duijne, Bas (author)
Architectural graduation project containing a research and design for the Notre Dame of Paris. The research focusses on reinterpreting the Notre Dame of Paris based on seven interviews. The interviews are bundled in a set of narrative drawings that approach the building and its environment as intangible domain containing rather the social...
student report 2023
document
Wang, Weizheng (author), Wang, Q. (author), Zuniga, Marco (author)
Cardiac patterns are being used to provide hard-to-forge biometric signatures in identification applications. However, this performance is obtained under controlled scenarios where cardiac signals maintain a relatively uniform pattern, facilitating the identification process. In this work, we analyze cardiac signals collected in more...
journal article 2023
document
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...
journal article 2023
document
Lotto, Alessandro (author), Singh, Vaibhav (author), Ramasubramanian, Bhaskar (author), Brighente, Alessandro (author), Conti, M. (author), Poovendran, Radha (author)
Fifth-generation (5G) cellular communication networks are being deployed on applications beyond mobile devices, including vehicular networks and industry automation. Despite their increasing popularity, 5G networks, as defined by the Third Generation Partnership Project (3GPP), have been shown to be vulnerable against fake base station (FBS)...
conference paper 2023
document
Li, Wenting (author), Wang, Ping (author), Liang, K. (author)
Password-only authentication is one of the most popular secure mechanisms for real-world online applications. But it easily suffers from a practical threat - password leakage, incurred by external and internal attackers. The external attacker may compromise the password file stored on the authentication server, and the insider may...
journal article 2023
document
Kumar, Anand (author), Singh, Karan (author), Shariq, Mohd (author), Lal, C. (author), Conti, M. (author), Amin, Ruhul (author), Chaudhry, Shehzad Ashraf (author)
In the era of the Internet of Communication Technologies (ICT), the Internet is becoming more popular and widely used across the world. Radio Frequency IDentification (RFID) has become a prominent technology in healthcare systems for identifying tagged objects. The RFID tags are attached to the billions of different healthcare devices or...
journal article 2023
document
Mankutė, Aistė (author)
The project “Activating the glass box” aims to find out how the existing built heritage can be not an obstacle, but the key to the comprehensive dense city of the near future. It showcases the contextual design approach and opportunities for the unlisted 50’s-60’s international style office buildings - “glass boxes”- whose potential is not yet...
master thesis 2022
document
Aanhane, Sam (author), Molenkamp, Simon (author), Vrijdag, Joos (author)
This bachelor end project thesis is describing ways to use dry-electrode electroencephalography (EEG) measurements for authentication. There are five proposed methods based on the literature study, which in this report are called: ’frequency tagging’, ’pseudowords’, ’familiar music’, ’mental tasks’, and ’emotions’. First, all methods were tested...
bachelor thesis 2022
document
Song, Lulu (author)
The project Open House, ‘gleans’ a derelict and underutilised part of the riverfront in Maastricht and gives it over to the everyday people of the city in the form of a public building - an Arts Centre for Maastricht. The ambition for the project is to create an architecture that will mesh seamlessly with the public realm, breaking down the...
master thesis 2022
document
Prinsze, Daan (author)
During this research we have replaced Bracha’s layer in the state-of-the-art Bracha-Dolev protocol to improve the performance by decreasing the message complexity of the protocol running on top of a given network topology so long as the requirements stated by Bracha and Dolev are met. Bracha-Dolev is an algorithm that is used to establish a...
bachelor thesis 2022
document
PSARRI, OLGA (author)
The present essay examines the influence of authenticity’s notion on <br/>Industrial Heritage Reuse practices in Europe from the 1970’s onwards. This <br/>consideration formed the motive of the carried-out analysis. Initially, <br/>authenticity’s theoretical framework is being interpreted through its latent <br/>relation to intangible heritage....
student report 2022
document
Abrahams, Joël (author)
Quantum networks allow multiple devices to exchange information encoded within quantum systems.<br/>Such quantum networks use classical control messages to coordinate entanglement between nodes.<br/>Third parties which can forge such control messages may interfere with the workings of quantum links, however:<br/>They may either perform...
master thesis 2022
document
Narang, Sushant (author)
Recently, data breaches have been increasing in many organisations, causing a spotlight to be put on the security practices such as 2 Factor Authentication(2FA) technology and the methods used to protect cyberspace. This has resulted in an opportunity for passwordless authentication technologies. Biloq is an early stage venture which aims to...
master thesis 2022
document
Tissen, L.N.M. (author)
3D printing’s rapid technological development is starting to impact the art field because, for the first time, it has become possible to exactly reproduce and reconstruct artworks without any loss of their physical features. Yet, a coherent overview of how 3D printing is used within the art field while paying attention to ethical considerations...
book chapter 2022
document
Shariq, Mohd (author), Singh, Karan (author), Lal, C. (author), Conti, M. (author), Khan, Tayyab (author)
Internet of Things (IoT) technologies rapidly evolve and are used in many real-life applications. One of the core technologies used in various IoT applications is Radio Frequency IDentification (RFID) technology. RFID wirelessly and uniquely identifies the tagged objects without a direct line of sight. However, the research community had...
journal article 2022
document
Dai, T. (author), Li, Ji (author), Aktürk, Gül (author), Jiao, Jian (author)
The designation of cultural heritage, especially the World Cultural Heritage Site, is extensively discussed regarding its impacts on tourism destination branding. However, the impact of the designation(s) of World and/or National Cultural Heritage Site on affective city image and behavioural intention is still under-researched. This study aims...
journal article 2022
document
El-Zawawy, Mohamed A. (author), Brighente, Alessandro (author), Conti, M. (author)
Internet of Drones (IoD) is a framework to set up drones networks that may serve multiple purposes, e.g., data collection. New IoD applications (such as drone assisted internet of vehicles) envision the simultaneous collection of multiple data types. Although authentication may prevent unauthorized users to access the collected data, existing...
journal article 2022
Searched for: subject%3A%22Authenticity%22
(1 - 20 of 74)

Pages