- document
-
Stokkink, Q.A. (author)The digital world is evolving toward representing - and serving the interconnection of - natural persons. Instead of depending on the intrastructure of Big Tech companies and governments, users can cooperate and use their hardware to form public infrastructure. Instead of existing by virtue of a reference in some institution's database, users...doctoral thesis 2024
- document
-
van Gend, Thijmen (author)Privacy-enhancing technologies (PETs) have historically been used for safeguarding individual privacy from both public and private interference. But lately, tech companies have started using PETs as one instrument for the expansion of their power over different actors, as appears to be unfolding in the case of Amazon’s Sidewalk service: a United...master thesis 2024
- document
-
Coggins, T.N. (author)In the introduction of this thesis, I contend that robot ethics, as a research field, generally treats privacy as the appropriate distribution of information, and therefore overlooks privacy concerns raised by robots beyond this conceptualization’s purview. I illustrate this contention by evaluating a hypothetical case involving a household...doctoral thesis 2024
- document
-
Kouwenhoven, Robin (author)Foremost among the challenges of the Bitcoin blockchain is the scalability bottleneck. To address this issue, the Lightning Network, a payment channel network, was created. Lightning is a payment channel network that is source-routed and uses onion routing, like Tor. However, unlike Tor, the routing path is determined by optimizing a cost...master thesis 2024
- document
-
Bestebreur, Timon (author)The versatility of the internet enables many applications that play an increasingly bigger role in our society. However, users have little control over the route that their internet traffic takes, which prevents them from controlling who sees their packets and how their traffic is handled. Researchers have proposed an extension to the internet,...master thesis 2024
- document
-
Trap, Cyril (author)Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it...master thesis 2023
- document
-
Geadău, Andrei (author)Cloud computing and storage solutions have been credited with increasing competitiveness through cost savings, greater flexibility, elasticity and optimal resource allocation. However, the data outsourced to the cloud may contain private information that must be protected from misuse. In such cases, the data can only be outsourced after...master thesis 2023
- document
-
Liang, C. (author)Caring for the elderly has always been a topic of great discussion. Demographic changes in an aging society have resulted in the growing phenomenon of the Sandwich Generation. The middle-aged generation cares for their aging parents and children and is usually one of the groups providing informal care. The burden of caregiving gradually harms...master thesis 2023
- document
-
Kafedjian, Ivana (author)Overpollution with plastic waste is becoming a leading concern globally, but even more so at island destinations popular among tourists. Tourists generate 3 times more waste than local residents, overuse local resources, and often lead to a change of the identity of the location (the so-called “disneyfication”). This project combines the topics...master thesis 2023
- document
-
Couwenberg, Ruben (author)The Internet of Things (IoT) consists out of billions of devices. This vast size magnifies the security and efficiency challenges the IoT faces. Blockchain (BC) features like decentralisation, immutability and smart contracts can negate these IoT challenges. <br/>In this paper we discuss how BC based solutions can significantly increase the...bachelor thesis 2023
- document
-
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author), Hu, Donghui (author)Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak...journal article 2023
- document
-
Ye, Hanting (author), Lan, G. (author), Jia, Jinyuan (author), Wang, Q. (author)Smartphones are moving towards the fullscreen design for better user experience. This trend forces front cameras to be placed under screen, leading to Under-Screen Cameras (USC). Accordingly, a small area of the screen is made translucent to allow light to reach the USC. In this paper, we utilize the translucent screen's features to...book chapter 2023
- document
-
Xu, Li (author), Li, T. (author), Erkin, Z. (author)Verifiable Credential (VC) is a new standard proposed by the W3C association to facilitate the expression and verification of third-party-verified credentials on the Internet, such as passports or diplomas. However, the current VC data model lacks an explicit revocation design that guarantees the secure operations of the system, which limits its...conference paper 2023
- document
-
Palazzo, Marco (author)Large amounts of data are continuously generated by individuals, apps, or dedicated devices. These data can be aggregated to compute useful statistics from multiple sources using data aggregation protocols. However, oftentimes these data contain private information that must be protected from misuse. Privacy-preserving protocols can help to...master thesis 2022
- document
-
Granneman, Erik (author)The increasing advancements in quantum computing have led to an increasing danger for the cyberspace. The current cryptographic algorithms that are used to enable secure communication across insecure channels have the potential to be brute-forced by sufficiently powerful quantum computers, endangering the security of many electronic devices and...master thesis 2022
- document
-
Jordan, Sebastian (author)In recent years, the large increase in connected devices and the data that is collected by these devices has caused a heightened interest in distributed processing. Many practical distributed networks are of heterogeneous nature. Because of this, algorithms operating within these networks need to be simple, robust against network dynamics and...master thesis 2022
- document
-
Vunderink, Pepijn (author)With widespread use of advanced technology for the recording, storing and sharing of social interactions, protecting privacy of people has been a growing concern. This paper zooms in on the collection of spoken audio with regard for the privacy of recorded individuals. Recently efforts have been made to collect audio at a low sampling rate to...bachelor thesis 2022
- document
-
Colenberg, Susanne (author), Romero Herrera, Natalia (author), Keyson, David (author)Background and aim - Lack of privacy is a prominent issue in contemporary offices. This study aimed to identify interior design features that jointly influence satisfaction with privacy and noise in the office workspace, and estimate their predictive power. This knowledge can inform strategic workplace design. Methods - Eight design features...conference paper 2022
- document
-
Oudejans, Daan (author)Data compliance is essential for ensuring that organizations do not run afoul of data protection and privacy legislation. Geographically distributed data is an especially relevant topic because of recent developments in cross-border data protection agreements between the United States and the European Union. We introduce Qompliance, a novel...master thesis 2022
- document
-
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)Traffic monitoring services collect traffic reports and respond to users' traffic queries. However, the reports and queries may reveal the user's identity and location. Although different anonymization techniques have been applied to protect user privacy, a new security threat arises, namely, n-by-1 jamming attack, in which an anonymous...journal article 2022