- document
-
Granneman, Erik (author)The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...master thesis 2022
- document
-
Hoogland, Mathijs (author)The role of Internet of Things (IoT) devices is becoming larger in our day-to-day life. More and more, devices are used to help with simple tasks in our lives. Little computers are installed in a large variety of consumer products and are often connected to the internet. The large increase of these “resource-constrained” devices that are...master thesis 2018
- document
-
Barrero, D.F. (author), Hernandez-Castro, J.C. (author), Peris-Lopez, P. (author), Camacho, D. (author), Moreno, M.D.R. (author)Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational...journal article 2012
- document
-
Cartrysse, K. (author)This thesis' objective is to provide privacy to mobile code. A practical example of mobile code is a mobile software agent that performs a task on behalf of its user. The agent travels over the network and is executed at different locations of which beforehand it is not known whether or not these can be trusted. Because a mobile software agent...doctoral thesis 2005