- document
-
Tian, Yuhang (author)In this work, we propose FLVoogd, an updated federated learning method in which servers and clients collaboratively eliminate Byzantine attacks while preserving privacy. In particular, servers use automatic Density-based Spatial Clustering of Applications with Noise (DBSCAN) combined with S2PC to cluster the benign majority without acquiring...master thesis 2022
- document
-
Agahari, W. (author), de Reuver, G.A. (author)Consumers are increasingly reluctant to share their personal data with businesses due to mounting concerns over privacy and control. Emerging privacy-enhancing technologies like multi-party computation (MPC), which allows generating insights while consumers retain data control, are challenging the current understanding of why consumers share...conference paper 2022
- document
-
Agahari, W. (author), Ofe, H.A. (author), de Reuver, G.A. (author)Firms are often reluctant to share data because of mistrust, concerns over control, and other risks. Multi-party computation (MPC) is a new technique to compute meaningful insights without having to transfer data. This paper investigates if MPC affects known antecedents for data sharing decisions: control, trust, and risks. Through 23...journal article 2022
- document
-
Wiemers, Marina (author)With recent advances in performance and complexity, multi-party computation, a privacy-preserving technology which allows for joint processing of hidden input data, has lately been found to be applicable in a number of use cases. Despite existing implementations for secure data aggregation, substantial adoptions of the technology remain limited...bachelor thesis 2021
- document
-
Latyšov, Sever (author)Around the world millions of people get injured due to traffic accidents. Autonomous vehicles are expected to significantly reduce these numbers. To increase safety, autonomous vehicle communication can be used. Current vehicle communication networks called VANETs have security and privacy protection problems and the vehicle industry is...bachelor thesis 2021
- document
-
Kolar, Brontë (author)Social determinants such as a person’s race, level of education, and income can be responsible for their health outcomes. Consequently, we see that discrimination along the social spectrum results in health disparities. In an effort to close the gaps in healthcare systems, these determinants have been heavily researched. Open questions remain...bachelor thesis 2021
- document
-
Romanov, Danila (author)Despite evidence that collaborating in the supply chain can reduce inefficiency and result in mutual gain, parties do not wish to collaborate if they have to share their private proprietary information. The main reason for their privacy concern is that the party does not want to lose their competitive advantage by giving away company secrets....bachelor thesis 2021
- document
-
van Tetering, Daphne (author)The convenient service offered by credit cards and the technological advances in e-commerce have caused the number of online payment transactions to increase daily. With this rising number, the opportunity for fraudsters to obtain cardholder details via online credit card fraud has also increased. As a result, according to the European Central...master thesis 2021
- document
-
Vos, Jelle (author)In our increasingly digital society, we are making a growing amount of data available to computers, networks and third parties. As a consequence, our sensitive data is in danger of getting exposed. The field of multi-party computation attempts to mitigate this by studying protocols that enable parties to perform their operations digitally,...master thesis 2021
- document
-
Ugwuoke, C.I. (author)The genome is the blueprint of life and has a detailed genotype and phenotype description of any organism. This in itself attributes sensitivity to genetic data, be it in the biological or electronic format. The possibility of sequencing the genome has opened doors to further probing of the data in its electronic form. Post sequencing of the...doctoral thesis 2021
- document
-
van der Ende, Dieuwke (author)Decision-tree evaluation is a widely-used classification approach known for its simplicity and effectiveness. Decision-tree models are shown to be helpful in classifying instances of fraud, malware, or diseases and can be used to make dynamic, flexible access decisions within an access-control system. These applications often require sensitive...master thesis 2021
- document
-
Agahari, W. (author), Dolci, R. (author), de Reuver, G.A. (author)Privacy-preserving technologies could allow data marketplaces to deliver technical assurances to companies on data privacy and control. However, how such technologies change the business model of data marketplaces is not fully understood. This paper aims to bridge this gap by focusing on multi-party computation (MPC) as a cryptographic...conference paper 2021
- document
-
Lam, Julia (author)EU banks have a dual obligation to generate and protect assets as a due diligence for their customers, their business longevity, and in accordance with regulatory bodies. The effective use of data presents opportunities for banks to meet their obligations in improving financial risk and also ensuring business growth and continuity in their...master thesis 2020
- document
-
Dolci, R. (author)Practical problem: In today's digitally transformed and connected world, data has become a critical strategic corporate resource. In this context, data marketplaces are becoming more popular since they enable wider accessibility and more efficient interaction among companies. Despite this, there are several barriers in sharing data through this...master thesis 2020
- document
-
Kumar, Jeevan (author)The emergence of the Data Marketplaces is the latest iteration in the phenomenon of data-driven transformation of the world. Data marketplaces have emerged as a new form of data-driven business models which enable trading of data between the data owners/providers and data consumers by providing the necessary technological and non-technological...master thesis 2019
- document
-
Faujdar, Vidyottama (author)Research ProblemIn today’s competitive and fast-paced nature of conducting business in the semiconductor industry, the discipline of revenue management (RM) is often mentioned. Through a dynamic pricing capability, RM enables firms to maximize profits by capitalizing on missed revenues. Moreover, RM enables customers to receive products on short...master thesis 2019
- document
-
Helsloot, L.J. (author)Online advertising is a multi-billion dollar industry, forming one of the primary sources of income for many publishers that offer free web content. Online Behavioural Advertising (OBA), the practice of showing advertisements based on individual users' web browsing behaviours, greatly improves the expected effectiveness of advertisements, and is...master thesis 2017
- document
-
Gedrojc, B. (author)The objective of this thesis is to preserve privacy for the user while untrustworthy proxies are involved in the communication and computation i.e. private computing. A basic example of private computing is an access control system (proxy) which grants access (or not) to users based on fingerprints. For privacy reasons the user does not want to...doctoral thesis 2011
- document
-
Erkin, Z. (author)Recent advances in technology provided a suitable environment for the people in which they can benefit from online services in their daily lives. Despite several advantages, online services also constitute serious privacy risks for their users as the main input to algorithms are privacy sensitive such as demographic information, shopping...doctoral thesis 2010