Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Delft University of Technology" +contributor:("Erkin, Z."). Showing records 1 – 13 of 13 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Delft University of Technology

1. Shrishak, K. (author). Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy.

Degree: 2016, Delft University of Technology

Numerous services are being offered over the Internet and require identification of users as in face-to-face interactions. To simplify the authentication procedure and reduce the… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shrishak, K. (. (2016). Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:dc8ce7c6-d13a-4ee3-9332-5294eb58d055

Chicago Manual of Style (16th Edition):

Shrishak, K (author). “Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy.” 2016. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:dc8ce7c6-d13a-4ee3-9332-5294eb58d055.

MLA Handbook (7th Edition):

Shrishak, K (author). “Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy.” 2016. Web. 23 Jan 2021.

Vancouver:

Shrishak K(. Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:dc8ce7c6-d13a-4ee3-9332-5294eb58d055.

Council of Science Editors:

Shrishak K(. Incorporating Leveled Homomorphic Encryption-based Private Information Retrieval in Federated eID Schemes to Enhance User Privacy. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:dc8ce7c6-d13a-4ee3-9332-5294eb58d055


Delft University of Technology

2. Helsloot, L.J. (author). Preserving privacy through cryptography in online behavioural advertising.

Degree: 2017, Delft University of Technology

Online advertising is a multi-billion dollar industry, forming one of the primary sources of income for many publishers that offer free web content. Online Behavioural… (more)

Subjects/Keywords: applied cryptography; online advertising; privacy; behavioural advertising; response prediction; multi-party computation; homomorphic encryption; secret sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Helsloot, L. J. (. (2017). Preserving privacy through cryptography in online behavioural advertising. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:dfb98715-941d-4a62-8743-b0acb0d701b7

Chicago Manual of Style (16th Edition):

Helsloot, L J (author). “Preserving privacy through cryptography in online behavioural advertising.” 2017. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:dfb98715-941d-4a62-8743-b0acb0d701b7.

MLA Handbook (7th Edition):

Helsloot, L J (author). “Preserving privacy through cryptography in online behavioural advertising.” 2017. Web. 23 Jan 2021.

Vancouver:

Helsloot LJ(. Preserving privacy through cryptography in online behavioural advertising. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:dfb98715-941d-4a62-8743-b0acb0d701b7.

Council of Science Editors:

Helsloot LJ(. Preserving privacy through cryptography in online behavioural advertising. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:dfb98715-941d-4a62-8743-b0acb0d701b7


Delft University of Technology

3. Mast, D.E. (author). A Framework for the Implementation and Comparison of Authenticated Data Structures.

Degree: 2016, Delft University of Technology

We present the design and implementation of a general framework that enables implementation and performance comparison of Authenticated Data Structures (ADSs). The framework guarantees that… (more)

Subjects/Keywords: authenticated data structures; seqhash; skip list; merkle hash tree; integrity; verification; performance; comparison

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mast, D. E. (. (2016). A Framework for the Implementation and Comparison of Authenticated Data Structures. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:46bc606f-6105-4b33-9406-dc6f6f5e7631

Chicago Manual of Style (16th Edition):

Mast, D E (author). “A Framework for the Implementation and Comparison of Authenticated Data Structures.” 2016. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:46bc606f-6105-4b33-9406-dc6f6f5e7631.

MLA Handbook (7th Edition):

Mast, D E (author). “A Framework for the Implementation and Comparison of Authenticated Data Structures.” 2016. Web. 23 Jan 2021.

Vancouver:

Mast DE(. A Framework for the Implementation and Comparison of Authenticated Data Structures. [Internet] [Masters thesis]. Delft University of Technology; 2016. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:46bc606f-6105-4b33-9406-dc6f6f5e7631.

Council of Science Editors:

Mast DE(. A Framework for the Implementation and Comparison of Authenticated Data Structures. [Masters Thesis]. Delft University of Technology; 2016. Available from: http://resolver.tudelft.nl/uuid:46bc606f-6105-4b33-9406-dc6f6f5e7631


Delft University of Technology

4. Hijgenaar, S. (author). Electric Vehicles; The Driving Power for Energy Transition: Blockchain-based Decentralised Energy Trading.

Degree: 2017, Delft University of Technology

The widespread introduction of (hybrid) electric vehicles has caused dynamic, local energy demand peaks. While, decentral energy generation, often using sustainable methods, creates local over-supply.… (more)

Subjects/Keywords: Electric vehicles; EV; PHEV; BEV; power management; smart charging; blockchain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hijgenaar, S. (. (2017). Electric Vehicles; The Driving Power for Energy Transition: Blockchain-based Decentralised Energy Trading. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:c4a8d2be-6c4e-4bfb-8a37-8a65bd7fe50b

Chicago Manual of Style (16th Edition):

Hijgenaar, S (author). “Electric Vehicles; The Driving Power for Energy Transition: Blockchain-based Decentralised Energy Trading.” 2017. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:c4a8d2be-6c4e-4bfb-8a37-8a65bd7fe50b.

MLA Handbook (7th Edition):

Hijgenaar, S (author). “Electric Vehicles; The Driving Power for Energy Transition: Blockchain-based Decentralised Energy Trading.” 2017. Web. 23 Jan 2021.

Vancouver:

Hijgenaar S(. Electric Vehicles; The Driving Power for Energy Transition: Blockchain-based Decentralised Energy Trading. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:c4a8d2be-6c4e-4bfb-8a37-8a65bd7fe50b.

Council of Science Editors:

Hijgenaar S(. Electric Vehicles; The Driving Power for Energy Transition: Blockchain-based Decentralised Energy Trading. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:c4a8d2be-6c4e-4bfb-8a37-8a65bd7fe50b

5. Manta, A. (author). Publishing Privacy Sensitive Open Data using an Automated Decision Support System.

Degree: 2013, Delft University of Technology

In recent years, the idea of Open Data has gained popularity, mainly due to the initiative of the president of the USA, Barack Obama. He… (more)

Subjects/Keywords: open data; privacy; privacy preserving data publishing; framework; decision support tool; publishing process

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Manta, A. (. (2013). Publishing Privacy Sensitive Open Data using an Automated Decision Support System. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:54207af1-ab87-4498-9a17-49cc924ae544

Chicago Manual of Style (16th Edition):

Manta, A (author). “Publishing Privacy Sensitive Open Data using an Automated Decision Support System.” 2013. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:54207af1-ab87-4498-9a17-49cc924ae544.

MLA Handbook (7th Edition):

Manta, A (author). “Publishing Privacy Sensitive Open Data using an Automated Decision Support System.” 2013. Web. 23 Jan 2021.

Vancouver:

Manta A(. Publishing Privacy Sensitive Open Data using an Automated Decision Support System. [Internet] [Masters thesis]. Delft University of Technology; 2013. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:54207af1-ab87-4498-9a17-49cc924ae544.

Council of Science Editors:

Manta A(. Publishing Privacy Sensitive Open Data using an Automated Decision Support System. [Masters Thesis]. Delft University of Technology; 2013. Available from: http://resolver.tudelft.nl/uuid:54207af1-ab87-4498-9a17-49cc924ae544


Delft University of Technology

6. Dekker, F.W. (author). Privacy-Preserving Data Aggregation with Probabilistic Range Validation.

Degree: 2020, Delft University of Technology

 Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended… (more)

Subjects/Keywords: Privacy; Data aggregation; Applied cryptography; Hypergraphs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dekker, F. W. (. (2020). Privacy-Preserving Data Aggregation with Probabilistic Range Validation. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:5d769bad-a615-41b1-908e-2b52dd10e268

Chicago Manual of Style (16th Edition):

Dekker, F W (author). “Privacy-Preserving Data Aggregation with Probabilistic Range Validation.” 2020. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:5d769bad-a615-41b1-908e-2b52dd10e268.

MLA Handbook (7th Edition):

Dekker, F W (author). “Privacy-Preserving Data Aggregation with Probabilistic Range Validation.” 2020. Web. 23 Jan 2021.

Vancouver:

Dekker FW(. Privacy-Preserving Data Aggregation with Probabilistic Range Validation. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:5d769bad-a615-41b1-908e-2b52dd10e268.

Council of Science Editors:

Dekker FW(. Privacy-Preserving Data Aggregation with Probabilistic Range Validation. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:5d769bad-a615-41b1-908e-2b52dd10e268


Delft University of Technology

7. Gerling, Jan (author). Machine Learning for Software Refactoring: a Large-Scale Empirical Study.

Degree: 2020, Delft University of Technology

Refactorings tackle the challenge of architectural degradation of object-oriented software projects by improving its internal structure without changing the behavior. Refactorings improve software quality and… (more)

Subjects/Keywords: Refactoring; software engineering; machine learning; data set; open source; Java

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gerling, J. (. (2020). Machine Learning for Software Refactoring: a Large-Scale Empirical Study. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:bf649e9c-9d53-4e8c-a91b-f0a6b6aab733

Chicago Manual of Style (16th Edition):

Gerling, Jan (author). “Machine Learning for Software Refactoring: a Large-Scale Empirical Study.” 2020. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:bf649e9c-9d53-4e8c-a91b-f0a6b6aab733.

MLA Handbook (7th Edition):

Gerling, Jan (author). “Machine Learning for Software Refactoring: a Large-Scale Empirical Study.” 2020. Web. 23 Jan 2021.

Vancouver:

Gerling J(. Machine Learning for Software Refactoring: a Large-Scale Empirical Study. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:bf649e9c-9d53-4e8c-a91b-f0a6b6aab733.

Council of Science Editors:

Gerling J(. Machine Learning for Software Refactoring: a Large-Scale Empirical Study. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:bf649e9c-9d53-4e8c-a91b-f0a6b6aab733


Delft University of Technology

8. van Bruggen, Christian (author). Forward-looking consistency in Attribute-Based Credentials: A privacy-preserving way to determine the revocation status of credentials after presentation.

Degree: 2020, Delft University of Technology

 Authentication mechanisms play an important role in everyday digital interactions and allow users to prove their identity to others. Privacy-preserving Attribute-Based Credential Systems (PABCSs) allow… (more)

Subjects/Keywords: attribute-based credentials; revocation; forward-looking consistency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

van Bruggen, C. (. (2020). Forward-looking consistency in Attribute-Based Credentials: A privacy-preserving way to determine the revocation status of credentials after presentation. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:871e17aa-a023-461f-88b1-80d83c21de92

Chicago Manual of Style (16th Edition):

van Bruggen, Christian (author). “Forward-looking consistency in Attribute-Based Credentials: A privacy-preserving way to determine the revocation status of credentials after presentation.” 2020. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:871e17aa-a023-461f-88b1-80d83c21de92.

MLA Handbook (7th Edition):

van Bruggen, Christian (author). “Forward-looking consistency in Attribute-Based Credentials: A privacy-preserving way to determine the revocation status of credentials after presentation.” 2020. Web. 23 Jan 2021.

Vancouver:

van Bruggen C(. Forward-looking consistency in Attribute-Based Credentials: A privacy-preserving way to determine the revocation status of credentials after presentation. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:871e17aa-a023-461f-88b1-80d83c21de92.

Council of Science Editors:

van Bruggen C(. Forward-looking consistency in Attribute-Based Credentials: A privacy-preserving way to determine the revocation status of credentials after presentation. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:871e17aa-a023-461f-88b1-80d83c21de92


Delft University of Technology

9. To, Seu Man (author). Privacy-Preserving Electronic Healthcare with Self-Monitoring Devices using Trusted Execution Environments.

Degree: 2020, Delft University of Technology

 The adoption of smart wearable devices has been on the rise over the past few years. These wearables are able to track the user's vital… (more)

Subjects/Keywords: cryptography; security and privacy; e-healthcare

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

To, S. M. (. (2020). Privacy-Preserving Electronic Healthcare with Self-Monitoring Devices using Trusted Execution Environments. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:5f94a350-8311-4ed8-a505-5113220b077e

Chicago Manual of Style (16th Edition):

To, Seu Man (author). “Privacy-Preserving Electronic Healthcare with Self-Monitoring Devices using Trusted Execution Environments.” 2020. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:5f94a350-8311-4ed8-a505-5113220b077e.

MLA Handbook (7th Edition):

To, Seu Man (author). “Privacy-Preserving Electronic Healthcare with Self-Monitoring Devices using Trusted Execution Environments.” 2020. Web. 23 Jan 2021.

Vancouver:

To SM(. Privacy-Preserving Electronic Healthcare with Self-Monitoring Devices using Trusted Execution Environments. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:5f94a350-8311-4ed8-a505-5113220b077e.

Council of Science Editors:

To SM(. Privacy-Preserving Electronic Healthcare with Self-Monitoring Devices using Trusted Execution Environments. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:5f94a350-8311-4ed8-a505-5113220b077e


Delft University of Technology

10. Andreadis, G. (author). Capelin: Fast Data-Driven Capacity Planning for Cloud Datacenters.

Degree: 2020, Delft University of Technology

Cloud datacenters provide a backbone to our digital society. Crucial to meeting increasing demand while maintaining efficient operation is the activity of capacity planning. Inaccurate… (more)

Subjects/Keywords: capacity planning; cloud; datacenter; data-driven

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andreadis, G. (. (2020). Capelin: Fast Data-Driven Capacity Planning for Cloud Datacenters. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:d6d50861-86a3-4dd3-a13f-42d84db7af66

Chicago Manual of Style (16th Edition):

Andreadis, G (author). “Capelin: Fast Data-Driven Capacity Planning for Cloud Datacenters.” 2020. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:d6d50861-86a3-4dd3-a13f-42d84db7af66.

MLA Handbook (7th Edition):

Andreadis, G (author). “Capelin: Fast Data-Driven Capacity Planning for Cloud Datacenters.” 2020. Web. 23 Jan 2021.

Vancouver:

Andreadis G(. Capelin: Fast Data-Driven Capacity Planning for Cloud Datacenters. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:d6d50861-86a3-4dd3-a13f-42d84db7af66.

Council of Science Editors:

Andreadis G(. Capelin: Fast Data-Driven Capacity Planning for Cloud Datacenters. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:d6d50861-86a3-4dd3-a13f-42d84db7af66


Delft University of Technology

11. Nasrullah, I.H. (author). Hierarchical Query Mechanisms for Searchable Encrypted Databases.

Degree: 2009, Delft University of Technology

Detecting and tracking of objects by a tracking device can be considered a breach of privacy when an unauthorised party can associate certain tracking information… (more)

Subjects/Keywords: Hierarchical Query Mechanisms; Searchable Encrypted Databases; Information Security; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nasrullah, I. H. (. (2009). Hierarchical Query Mechanisms for Searchable Encrypted Databases. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:2b736629-4e3c-40f2-b64d-c65e79847cb9

Chicago Manual of Style (16th Edition):

Nasrullah, I H (author). “Hierarchical Query Mechanisms for Searchable Encrypted Databases.” 2009. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:2b736629-4e3c-40f2-b64d-c65e79847cb9.

MLA Handbook (7th Edition):

Nasrullah, I H (author). “Hierarchical Query Mechanisms for Searchable Encrypted Databases.” 2009. Web. 23 Jan 2021.

Vancouver:

Nasrullah IH(. Hierarchical Query Mechanisms for Searchable Encrypted Databases. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:2b736629-4e3c-40f2-b64d-c65e79847cb9.

Council of Science Editors:

Nasrullah IH(. Hierarchical Query Mechanisms for Searchable Encrypted Databases. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:2b736629-4e3c-40f2-b64d-c65e79847cb9


Delft University of Technology

12. Dantas, H. (author). Vulnerability Analysis of Smart Meters.

Degree: 2014, Delft University of Technology

Cyber Security

Intelligent Systems

Electrical Engineering, Mathematics and Computer Science

Advisors/Committee Members: Erkin, Z. (mentor), Doerr, C. (mentor).

Subjects/Keywords: Security; Smart Meters; DLMS/COSEM; Smart Grid; Fuzzing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dantas, H. (. (2014). Vulnerability Analysis of Smart Meters. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e6c67f53-70ec-45be-ae78-d4701368a3e0

Chicago Manual of Style (16th Edition):

Dantas, H (author). “Vulnerability Analysis of Smart Meters.” 2014. Masters Thesis, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:e6c67f53-70ec-45be-ae78-d4701368a3e0.

MLA Handbook (7th Edition):

Dantas, H (author). “Vulnerability Analysis of Smart Meters.” 2014. Web. 23 Jan 2021.

Vancouver:

Dantas H(. Vulnerability Analysis of Smart Meters. [Internet] [Masters thesis]. Delft University of Technology; 2014. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:e6c67f53-70ec-45be-ae78-d4701368a3e0.

Council of Science Editors:

Dantas H(. Vulnerability Analysis of Smart Meters. [Masters Thesis]. Delft University of Technology; 2014. Available from: http://resolver.tudelft.nl/uuid:e6c67f53-70ec-45be-ae78-d4701368a3e0


Delft University of Technology

13. Tillem, G. Preserving Confidentiality in Data Analytics-as-a-Service.

Degree: 2020, Delft University of Technology

 The enhancements in computation technologies in the last decades enabled businesses to analyze the data that is collected through their systems which helps to improve… (more)

Subjects/Keywords: Data Analytics; Secure Computation; Confidentiality

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tillem, G. (2020). Preserving Confidentiality in Data Analytics-as-a-Service. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; urn:NBN:nl:ui:24-uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; 2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; 10.4233/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; urn:isbn:978-94-028-2044-7 ; urn:NBN:nl:ui:24-uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; http://resolver.tudelft.nl/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e

Chicago Manual of Style (16th Edition):

Tillem, G. “Preserving Confidentiality in Data Analytics-as-a-Service.” 2020. Doctoral Dissertation, Delft University of Technology. Accessed January 23, 2021. http://resolver.tudelft.nl/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; urn:NBN:nl:ui:24-uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; 2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; 10.4233/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; urn:isbn:978-94-028-2044-7 ; urn:NBN:nl:ui:24-uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; http://resolver.tudelft.nl/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e.

MLA Handbook (7th Edition):

Tillem, G. “Preserving Confidentiality in Data Analytics-as-a-Service.” 2020. Web. 23 Jan 2021.

Vancouver:

Tillem G. Preserving Confidentiality in Data Analytics-as-a-Service. [Internet] [Doctoral dissertation]. Delft University of Technology; 2020. [cited 2021 Jan 23]. Available from: http://resolver.tudelft.nl/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; urn:NBN:nl:ui:24-uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; 2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; 10.4233/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; urn:isbn:978-94-028-2044-7 ; urn:NBN:nl:ui:24-uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; http://resolver.tudelft.nl/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e.

Council of Science Editors:

Tillem G. Preserving Confidentiality in Data Analytics-as-a-Service. [Doctoral Dissertation]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; urn:NBN:nl:ui:24-uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; 2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; 10.4233/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; urn:isbn:978-94-028-2044-7 ; urn:NBN:nl:ui:24-uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e ; http://resolver.tudelft.nl/uuid:2332e125-c9c4-443c-9a18-0f8fd1c2f85e

.