Searched for: subject%3A%22Integration%22
(1 - 8 of 8)
document
Stokkink, Q.A. (author), Ileri, Can Umut (author), Pouwelse, J.A. (author)
Web3 networks are emerging to replace centrally-governed networking infrastructure. The integrity of the shared public infrastructure of Web3 networks is guaranteed through data sharing between nodes. However, due to the unstructured and highly partitioned nature of Web3 networks, data sharing between nodes in different partitions is a...
conference paper 2022
document
Köylü, T.C. (author), Okkerman, Hans (author), Reinbrecht, Cezar (author), Hamdioui, S. (author), Taouil, M. (author)
Internet of things (IoT) devices are appearing in all aspects of our digital life. As such, they have become prime targets for attackers and hackers. An adequate protection against attacks is only possible when the confidentiality and integrity of the data and applications of these devices are secured. State-of-the-art solutions mostly address...
conference paper 2021
document
Roeser, S. (author), Copeland, S.M. (author)
The Code of Conduct gives direction to all members of the TU Delft community on how to act, how to respond to integrity-related issues, and how to maintain a high level of respect for each other, for our world and for the environment.
report 2020
document
Verbraak, T.L. (author), Ellerbroek, Joost (author), Sun, Junzi (author), Hoekstra, J.M. (author)
To investigate the contradicting findings of previous studies that investigated ADS-B quality, a study was per-formed to analyze the data and signal quality of ADS-B. For this study, a large dataset of raw ADS-B messages was analyzed, regarding the quality of the data and the signal, differentiating between internal and external sources of...
conference paper 2017
document
Bui, N.C. (author)
The investigation into the dynamic behavior of a cable during installation was done with the aim of improving cable installation for safety, operational and commercial value. In order to increase the operational limit of the vessel during cable installation, the investigation into improvement systems was desired. The workability of a vessel...
master thesis 2016
document
Mast, D.E. (author)
We present the design and implementation of a general framework that enables implementation and performance comparison of Authenticated Data Structures (ADSs). The framework guarantees that an ADS supports initialization, updates, and verification of queries. In the framework, we implemented the hash tree, skip list, and state-of-the-art SeqHash...
master thesis 2016
document
Van Adrichem, N.L.M. (author), Blenn, N. (author), Reyes-Lua, A. (author), Wang, X. (author), Wasif, M. (author), Fatturrahman, F. (author), Kuipers, F.A. (author)
DNSSEC offers protection against spoofing of DNS data by providing origin authentication, ensuring data integrity and authentication of non-existence by using public-key cryptography. Although the relevance of securing a technology as crucial to the Internet as DNS is obvious, the DNSSEC implementation increases the complexity of the deployed...
journal article 2015
document
Oliveira, J.M.V. (author), Tiberius, C.C.J.M. (author)
This contribution extends the common documented approach of integrity through Protection Levels in Satellite-Based Augmentation System (SBAS) positioning for aeronautics, to reliability on the basis of statistical hypothesis testing, and as such provides a safeguard against model misspecifications as anomalies and outliers in the measurements....
journal article 2009
Searched for: subject%3A%22Integration%22
(1 - 8 of 8)