Searched for: subject%3A%22compare%22
(1 - 5 of 5)
document
Alkan, Efe (author)
Pseudo-random number generators are the essential part of many security protocols such as signature schemes, key-exchange protocols and encryption algorithms. The security of these protocols is usually dependent on the quality of the generators they use. The generation of unpredictable random numbers supplies refreshment to the protocols, which...
bachelor thesis 2021
document
Adriaanse, P.E.A. (author)
With the current fast paced growth in the number of devices connected to the internet, many of these having limited computational capability, security concerns are of increasing importance. To meet the necessity of providing secure encryption to constrained devices many lightweight cryptographic schemes have been developed. This paper provides a...
bachelor thesis 2021
document
Eckhardt, Thomas (author)
Wireless Sensor Networks(WSN's) are networks of sensor that wirelessly communicate to each other. The communication of these sensors needs to be secured to prevent leaking of potentially sensitive information of the data sent between the user, gateway and sensors. For WSN's lightweight authentication, protocols have been developed in order to...
bachelor thesis 2021
document
Duan, Shuyu (author)
Circular economy is gaining global momentum as a new economic system to achieve sustainable development. The built environment plays an important role during the transition to a circular economy. China and the Netherlands share a common basis on enhancing resource efficiency by circular economy, which provides opportunities for mutual learning....
master thesis 2019
document
van Egeraat, Hugo (author)
Traditionally, steel joints are calculated by the calculation rules described in the Eurocode 3: NEN-EN 1993-1-8. Effective lengths are important parameters to determine the different resistances of the components in the steel joint. Finite Element Analyses (FEA)...
master thesis 2017
Searched for: subject%3A%22compare%22
(1 - 5 of 5)