Searched for: subject%3A%22Privacy%22
(1 - 20 of 249)

Pages

document
Taneva, Aleksandra (author)
Nowadays, the online industry contributes to a multi-billion dollar business, facilitates most of the population's everyday activities, and processes vast amounts of data, including personal data. Current work aims to explore the inconsistency or consistency of the content obtained by the websites to generate cookies based on various data that...
master thesis 2023
document
van Schaick, Bart (author)
Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications demand confidentiality, necessitating the development of permissioned...
master thesis 2023
document
Couwenberg, Ruben (author)
The Internet of Things (IoT) consists out of billions of devices. This vast size magnifies the security and efficiency challenges the IoT faces. Blockchain (BC) features like decentralisation, immutability and smart contracts can negate these IoT challenges. <br/>In this paper we discuss how BC based solutions can significantly increase the...
bachelor thesis 2023
document
Janssen, Jeroen (author)
The Internet of Things (IoT) is producing significant amounts of data. Protecting this data from adversaries is therefore a prominent field of research. This paper conducts a review of the current state-of-the-art in the field of IoT integrated with Blockchain (BC) and Machine Learning (ML). The review focuses on the use of privacy and...
bachelor thesis 2023
document
Najafian, S. (author)
My thesis investigates what makes good explanations for group recommendations, considering the privacy concerns of group members. Let’s give an example. Have you ever been to lunch with other colleagues on a business trip? Do you recall how long it took you to pick a restaurant? In these situations, recommender systems could help people decide,...
doctoral thesis 2023
document
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author), Hu, Donghui (author)
Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak...
journal article 2023
document
Zhou, Junwei (author), Lei, Botian (author), Lang, Huile (author), Panaousis, Emmanouil (author), Liang, K. (author), Xiang, Jianwen (author)
Genotype imputation estimates missing genotypes from the haplotype or genotype reference panel in individual genetic sequences, which boosts the potential of genome-wide association and is essential in genetic data analysis. However, the genetic sequences involve people's privacy, confirming an individual's identification and even disease...
journal article 2023
document
Fernandes, Maria (author), Decouchant, J.E.A.P. (author), Couto, Francisco M. (author)
DNA computing is an emerging field that aims at enabling more efficient data storage and processing. One principle of DNA computing is to encode some information (e.g., image, video, programming scripts) into a digital DNA-like sequence and then synthesize the corresponding DNA molecule. Synthesizing this molecule using digital or real human...
book chapter 2023
document
Ofe, H.A. (author), Sandberg, Johan (author), Rudmark, Daniel (author), de Reuver, G.A. (author)
conference paper 2023
document
Ahmadvand, Hossein (author), Lal, C. (author), Hemmati, Hadi (author), Sookhak, Mehdi (author), Conti, M. (author)
In recent years, the use of Software Defined Networking (SDN) has increased due to various network management requirements. Using SDN in computer network applications has brought several benefits to users, including lower operational costs, better hardware management, flexibility, and centralized network deployment. On the other hand, the...
journal article 2023
document
Cardaioli, Matteo (author), Conti, M. (author), Orazi, Gabriele (author), Tricomi, Pier Paolo (author), Tsudik, Gene (author)
Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to pass the former, but the latter is often underestimated or ignored. Unattended or dangling sessions expose users to well-known Lunchtime Attacks. To mitigate this threat, researchers...
journal article 2023
document
Ding, Aaron Yi (author), van den Boogert, R.J. (author)
With rising numbers of people living in cities leading to increasing congestion and pollution, mobile crowdsensing applications form a potential solution to make transport systems smarter and more efficient. However, sharing data comes with the risk of private information being disclosed. Therefore, a clear incentive is necessary to motivate...
journal article 2023
document
van Stam, Just (author)
Begun in 2020, Polkadot is one of the largest blockchains in market capitalization and development. However, privacy on the Polkadot network has yet to be one of the key focus points. Especially unlinkability between the user’s IP address and Polkadot address is essential. Without this unlinkability, users are vulnerable to targeted ads,...
master thesis 2022
document
Geboers, Sven (author)
Currently, inland waterway shipping mainly includes barges and bulk transportation with little to no variation in volume, product, and route. Since transport over water emits less CO2 per tonne-km than road transport, a potential way to reduce CO2 emissions is to transport more containers via inland waterways. Large delays cause unreliability,...
master thesis 2022
document
de With, Wim (author)
Recommender systems usually base their predictions on user-item interaction, a technique known as collaborative filtering. Vendors that utilize collaborative filtering generally exclusively use their own user-item interactions, but the accuracy of the recommendations may improve if several vendors share their data. Since user-item interaction...
master thesis 2022
document
Palazzo, Marco (author)
Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These data can be aggregated to compute useful statistics from multiple sources using data aggregation protocols. However, oftentimes these data contain private information that must be protected from misuse. Privacy-preserving protocols can help to...
master thesis 2022
document
Pulles, Annemijn (author)
Due to the increasing use of Internet-of-Things (IoT) devices people have created an entirely new digital world for themselves. However, the security and privacy risk in this world are emerging. People using smart devices for everything in their lives are not realising that every interaction is collected and stored in databases. This study has...
master thesis 2022
document
Granneman, Erik (author)
The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...
master thesis 2022
document
Tian, Yuhang (author)
In this work, we propose FLVoogd, an updated federated learning method in which servers and clients collaboratively eliminate Byzantine attacks while preserving privacy. In particular, servers use automatic Density-based Spatial Clustering of Applications with Noise (DBSCAN) combined with S2PC to cluster the benign majority without acquiring...
master thesis 2022
document
Jordan, Sebastian (author)
In recent years, the large increase in connected devices and the data that is collected by these devices has caused a heightened interest in distributed processing. Many practical distributed networks are of heterogeneous nature. Because of this, algorithms operating within these networks need to be simple, robust against network dynamics and...
master thesis 2022
Searched for: subject%3A%22Privacy%22
(1 - 20 of 249)

Pages