Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"Delft University of Technology" +contributor:("Pouwelse, Johan"). Showing records 1 – 21 of 21 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Delft University of Technology

1. Plomp, Angela (author). MediTrail: a blockchain-based tamper-proof auditable access log for medical data.

Degree: 2019, Delft University of Technology

After several incident in which the privacy of patients was violated, the need for logging of access to medical data is evident. In this master… (more)

Subjects/Keywords: blockchain; logging; accountability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Plomp, A. (. (2019). MediTrail: a blockchain-based tamper-proof auditable access log for medical data. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:1774b1e9-3860-4a02-adaa-be9a92557169

Chicago Manual of Style (16th Edition):

Plomp, Angela (author). “MediTrail: a blockchain-based tamper-proof auditable access log for medical data.” 2019. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:1774b1e9-3860-4a02-adaa-be9a92557169.

MLA Handbook (7th Edition):

Plomp, Angela (author). “MediTrail: a blockchain-based tamper-proof auditable access log for medical data.” 2019. Web. 03 Dec 2020.

Vancouver:

Plomp A(. MediTrail: a blockchain-based tamper-proof auditable access log for medical data. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:1774b1e9-3860-4a02-adaa-be9a92557169.

Council of Science Editors:

Plomp A(. MediTrail: a blockchain-based tamper-proof auditable access log for medical data. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:1774b1e9-3860-4a02-adaa-be9a92557169


Delft University of Technology

2. Stannat, Alexander (author). On the Sybil-Proofness of Accounting Mechanisms in P2P Networks.

Degree: 2020, Delft University of Technology

Online P2P file sharing networks rely on the cooperation of participants to function effectively. Agents upand download files to one another without the need for… (more)

Subjects/Keywords: P2P Networks; Cooperation through Indirect Reciprocity; Accounting Mechanisms; Sybil Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stannat, A. (. (2020). On the Sybil-Proofness of Accounting Mechanisms in P2P Networks. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:6b4011c6-1668-4a1c-a49e-f86d226063b1

Chicago Manual of Style (16th Edition):

Stannat, Alexander (author). “On the Sybil-Proofness of Accounting Mechanisms in P2P Networks.” 2020. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:6b4011c6-1668-4a1c-a49e-f86d226063b1.

MLA Handbook (7th Edition):

Stannat, Alexander (author). “On the Sybil-Proofness of Accounting Mechanisms in P2P Networks.” 2020. Web. 03 Dec 2020.

Vancouver:

Stannat A(. On the Sybil-Proofness of Accounting Mechanisms in P2P Networks. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:6b4011c6-1668-4a1c-a49e-f86d226063b1.

Council of Science Editors:

Stannat A(. On the Sybil-Proofness of Accounting Mechanisms in P2P Networks. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:6b4011c6-1668-4a1c-a49e-f86d226063b1


Delft University of Technology

3. Juchli, Marc (author). Limit order placement optimization with Deep Reinforcement Learning: Learning from patterns in cryptocurrency market data.

Degree: 2018, Delft University of Technology

 For various reasons, financial institutions often make use of high-level trading strategies when buying and selling assets. Many individuals, irrespective or their level of prior… (more)

Subjects/Keywords: Reinforcement Learning; Q-Learning; Deep Q-Network; deep reinforcement learning; limit order; limit order placement; trading

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Juchli, M. (. (2018). Limit order placement optimization with Deep Reinforcement Learning: Learning from patterns in cryptocurrency market data. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e2e99579-541b-4b5a-8cbb-36ea17a4a93a

Chicago Manual of Style (16th Edition):

Juchli, Marc (author). “Limit order placement optimization with Deep Reinforcement Learning: Learning from patterns in cryptocurrency market data.” 2018. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:e2e99579-541b-4b5a-8cbb-36ea17a4a93a.

MLA Handbook (7th Edition):

Juchli, Marc (author). “Limit order placement optimization with Deep Reinforcement Learning: Learning from patterns in cryptocurrency market data.” 2018. Web. 03 Dec 2020.

Vancouver:

Juchli M(. Limit order placement optimization with Deep Reinforcement Learning: Learning from patterns in cryptocurrency market data. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:e2e99579-541b-4b5a-8cbb-36ea17a4a93a.

Council of Science Editors:

Juchli M(. Limit order placement optimization with Deep Reinforcement Learning: Learning from patterns in cryptocurrency market data. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:e2e99579-541b-4b5a-8cbb-36ea17a4a93a


Delft University of Technology

4. Treep, Harmjan (author). Delftvisor: A network hypervisor for Openflow 1.3: Network virtualization for Openflow 1.3.

Degree: 2017, Delft University of Technology

 Openflow is the emerging standard for Software Defined Networking, it allows users to perform routing and run their applications on the network. Such applications can… (more)

Subjects/Keywords: SDN; Openflow; Hypervisor; Software Defined Networking; Delftvisor

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Treep, H. (. (2017). Delftvisor: A network hypervisor for Openflow 1.3: Network virtualization for Openflow 1.3. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:66db3d64-b3df-42d6-a468-c6cf50558e55

Chicago Manual of Style (16th Edition):

Treep, Harmjan (author). “Delftvisor: A network hypervisor for Openflow 1.3: Network virtualization for Openflow 1.3.” 2017. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:66db3d64-b3df-42d6-a468-c6cf50558e55.

MLA Handbook (7th Edition):

Treep, Harmjan (author). “Delftvisor: A network hypervisor for Openflow 1.3: Network virtualization for Openflow 1.3.” 2017. Web. 03 Dec 2020.

Vancouver:

Treep H(. Delftvisor: A network hypervisor for Openflow 1.3: Network virtualization for Openflow 1.3. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:66db3d64-b3df-42d6-a468-c6cf50558e55.

Council of Science Editors:

Treep H(. Delftvisor: A network hypervisor for Openflow 1.3: Network virtualization for Openflow 1.3. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:66db3d64-b3df-42d6-a468-c6cf50558e55


Delft University of Technology

5. Vodă, Mircea (author). Fault-tolerant remote execution operators for the Reactive Extensions library.

Degree: 2018, Delft University of Technology

 The continuous shift of various industries towards internet-based services have caused an exponential growth in the amount of data produced over the past few years.… (more)

Subjects/Keywords: raft; consensus; reactive programming; reactive extensions; fault tolerance

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vodă, M. (. (2018). Fault-tolerant remote execution operators for the Reactive Extensions library. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:ccf54762-3bdf-46c5-9a90-0a432af5613d

Chicago Manual of Style (16th Edition):

Vodă, Mircea (author). “Fault-tolerant remote execution operators for the Reactive Extensions library.” 2018. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:ccf54762-3bdf-46c5-9a90-0a432af5613d.

MLA Handbook (7th Edition):

Vodă, Mircea (author). “Fault-tolerant remote execution operators for the Reactive Extensions library.” 2018. Web. 03 Dec 2020.

Vancouver:

Vodă M(. Fault-tolerant remote execution operators for the Reactive Extensions library. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:ccf54762-3bdf-46c5-9a90-0a432af5613d.

Council of Science Editors:

Vodă M(. Fault-tolerant remote execution operators for the Reactive Extensions library. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:ccf54762-3bdf-46c5-9a90-0a432af5613d


Delft University of Technology

6. Enreina Annisa Rizkiasri, Enreina (author). Crowdsourced Knowledge Base Construction using Text-Based Conversational Agents.

Degree: 2019, Delft University of Technology

Knowledge Base Construction (KBC) is a challenging and complex task involving several substeps and many experts of a knowledge domain. Crowdsourcing approach has been used… (more)

Subjects/Keywords: Knowledge Base Construction; Conversational Agents; Chatbot; Crowdsourcing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Enreina Annisa Rizkiasri, E. (. (2019). Crowdsourced Knowledge Base Construction using Text-Based Conversational Agents. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:877f5299-ac54-4b8b-9b49-1d237d55e661

Chicago Manual of Style (16th Edition):

Enreina Annisa Rizkiasri, Enreina (author). “Crowdsourced Knowledge Base Construction using Text-Based Conversational Agents.” 2019. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:877f5299-ac54-4b8b-9b49-1d237d55e661.

MLA Handbook (7th Edition):

Enreina Annisa Rizkiasri, Enreina (author). “Crowdsourced Knowledge Base Construction using Text-Based Conversational Agents.” 2019. Web. 03 Dec 2020.

Vancouver:

Enreina Annisa Rizkiasri E(. Crowdsourced Knowledge Base Construction using Text-Based Conversational Agents. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:877f5299-ac54-4b8b-9b49-1d237d55e661.

Council of Science Editors:

Enreina Annisa Rizkiasri E(. Crowdsourced Knowledge Base Construction using Text-Based Conversational Agents. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:877f5299-ac54-4b8b-9b49-1d237d55e661


Delft University of Technology

7. Kohalli, Shivanand (author). Coordinate Routing in the Lightning Network.

Degree: 2019, Delft University of Technology

Blockchains such as the Bitcoin facilitate the online transaction between users without an intermediate financial institution and can serve as a global currency. However, at… (more)

Subjects/Keywords: lightning network; routing algorithm; blockchain; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kohalli, S. (. (2019). Coordinate Routing in the Lightning Network. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:350a232c-59d2-4591-9835-363675025f76

Chicago Manual of Style (16th Edition):

Kohalli, Shivanand (author). “Coordinate Routing in the Lightning Network.” 2019. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:350a232c-59d2-4591-9835-363675025f76.

MLA Handbook (7th Edition):

Kohalli, Shivanand (author). “Coordinate Routing in the Lightning Network.” 2019. Web. 03 Dec 2020.

Vancouver:

Kohalli S(. Coordinate Routing in the Lightning Network. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:350a232c-59d2-4591-9835-363675025f76.

Council of Science Editors:

Kohalli S(. Coordinate Routing in the Lightning Network. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:350a232c-59d2-4591-9835-363675025f76


Delft University of Technology

8. Mohammad, Umeer (author). Enabling double-spending detection in a pair-based ledger.

Degree: 2019, Delft University of Technology

The development of blockchain, along with the creation of Bitcoin, opened the road to the first digital currency that is secure against double-spending without the… (more)

Subjects/Keywords: trustchain; blockchain; double-spending; pair-based ledger

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohammad, U. (. (2019). Enabling double-spending detection in a pair-based ledger. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:6450bc4d-74e0-4241-9e16-454cda048949

Chicago Manual of Style (16th Edition):

Mohammad, Umeer (author). “Enabling double-spending detection in a pair-based ledger.” 2019. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:6450bc4d-74e0-4241-9e16-454cda048949.

MLA Handbook (7th Edition):

Mohammad, Umeer (author). “Enabling double-spending detection in a pair-based ledger.” 2019. Web. 03 Dec 2020.

Vancouver:

Mohammad U(. Enabling double-spending detection in a pair-based ledger. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:6450bc4d-74e0-4241-9e16-454cda048949.

Council of Science Editors:

Mohammad U(. Enabling double-spending detection in a pair-based ledger. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:6450bc4d-74e0-4241-9e16-454cda048949


Delft University of Technology

9. Zegers, Jan (author). Modelling and Mining of Data mining Workflows in Data Science Scripts.

Degree: 2017, Delft University of Technology

 Knowledge discovery and data mining (KDD) is the process that extracts new knowledge from data. Data scientists program their solutions of their KDD challenges in… (more)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zegers, J. (. (2017). Modelling and Mining of Data mining Workflows in Data Science Scripts. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:0cebb406-ffa4-4da7-9c66-0df77a48b1b3

Chicago Manual of Style (16th Edition):

Zegers, Jan (author). “Modelling and Mining of Data mining Workflows in Data Science Scripts.” 2017. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:0cebb406-ffa4-4da7-9c66-0df77a48b1b3.

MLA Handbook (7th Edition):

Zegers, Jan (author). “Modelling and Mining of Data mining Workflows in Data Science Scripts.” 2017. Web. 03 Dec 2020.

Vancouver:

Zegers J(. Modelling and Mining of Data mining Workflows in Data Science Scripts. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:0cebb406-ffa4-4da7-9c66-0df77a48b1b3.

Council of Science Editors:

Zegers J(. Modelling and Mining of Data mining Workflows in Data Science Scripts. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:0cebb406-ffa4-4da7-9c66-0df77a48b1b3


Delft University of Technology

10. de Koning, Dorian (author). Full-system After-cache Memory Tracing for Multi-core Systems using a Distributed Cache Simulator.

Degree: 2020, Delft University of Technology

The gap between CPU and memory performance becomes increasingly larger. Together with a growing memory pressure caused by higher CPU core counts combined with multi-tenant… (more)

Subjects/Keywords: Cache simulation; QEMU; NVRAM; Distributed; Full-system; Tracing; Memory; gem5

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

de Koning, D. (. (2020). Full-system After-cache Memory Tracing for Multi-core Systems using a Distributed Cache Simulator. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:afb49e79-0595-4b6c-a337-ab6b448db543

Chicago Manual of Style (16th Edition):

de Koning, Dorian (author). “Full-system After-cache Memory Tracing for Multi-core Systems using a Distributed Cache Simulator.” 2020. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:afb49e79-0595-4b6c-a337-ab6b448db543.

MLA Handbook (7th Edition):

de Koning, Dorian (author). “Full-system After-cache Memory Tracing for Multi-core Systems using a Distributed Cache Simulator.” 2020. Web. 03 Dec 2020.

Vancouver:

de Koning D(. Full-system After-cache Memory Tracing for Multi-core Systems using a Distributed Cache Simulator. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:afb49e79-0595-4b6c-a337-ab6b448db543.

Council of Science Editors:

de Koning D(. Full-system After-cache Memory Tracing for Multi-core Systems using a Distributed Cache Simulator. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:afb49e79-0595-4b6c-a337-ab6b448db543


Delft University of Technology

11. van IJzendoorn, Bas (author). Communicating with low latency peers: Building a low latency overlay in P2P networks.

Degree: 2018, Delft University of Technology

 In decentralized applications requirements on latency are high. For instance, in trading applications a millisecond latency advantage can save companies millions of dollars. In this… (more)

Subjects/Keywords: latency; overlay; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

van IJzendoorn, B. (. (2018). Communicating with low latency peers: Building a low latency overlay in P2P networks. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:3bf51816-d0e3-48fe-a794-6a4f5713baae

Chicago Manual of Style (16th Edition):

van IJzendoorn, Bas (author). “Communicating with low latency peers: Building a low latency overlay in P2P networks.” 2018. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:3bf51816-d0e3-48fe-a794-6a4f5713baae.

MLA Handbook (7th Edition):

van IJzendoorn, Bas (author). “Communicating with low latency peers: Building a low latency overlay in P2P networks.” 2018. Web. 03 Dec 2020.

Vancouver:

van IJzendoorn B(. Communicating with low latency peers: Building a low latency overlay in P2P networks. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:3bf51816-d0e3-48fe-a794-6a4f5713baae.

Council of Science Editors:

van IJzendoorn B(. Communicating with low latency peers: Building a low latency overlay in P2P networks. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:3bf51816-d0e3-48fe-a794-6a4f5713baae


Delft University of Technology

12. Luo, Changliang (author). Peer Discovery With Transitive Trust in Distributed System.

Degree: 2017, Delft University of Technology

It is a common case that resources belong to different people who are distributed across the world. So, for making good use of resources, people… (more)

Subjects/Keywords: Peer Discovery; Tribler; Dispersy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, C. (. (2017). Peer Discovery With Transitive Trust in Distributed System. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:af9b2fe1-7055-42ce-a513-1d6b1a6cc041

Chicago Manual of Style (16th Edition):

Luo, Changliang (author). “Peer Discovery With Transitive Trust in Distributed System.” 2017. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:af9b2fe1-7055-42ce-a513-1d6b1a6cc041.

MLA Handbook (7th Edition):

Luo, Changliang (author). “Peer Discovery With Transitive Trust in Distributed System.” 2017. Web. 03 Dec 2020.

Vancouver:

Luo C(. Peer Discovery With Transitive Trust in Distributed System. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:af9b2fe1-7055-42ce-a513-1d6b1a6cc041.

Council of Science Editors:

Luo C(. Peer Discovery With Transitive Trust in Distributed System. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:af9b2fe1-7055-42ce-a513-1d6b1a6cc041


Delft University of Technology

13. Harms, Jan-Gerrit (author). Creating trust through verification of interaction records.

Degree: 2018, Delft University of Technology

 Trust on the internet is largely facilitated by reputation systems on centralized online platforms. How- ever reports of data breaches and privacy issues on such… (more)

Subjects/Keywords: Blockchain; Trust; Distributed Ledger

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harms, J. (. (2018). Creating trust through verification of interaction records. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:4716c3f8-b9b1-4e80-8537-10b006bb78c1

Chicago Manual of Style (16th Edition):

Harms, Jan-Gerrit (author). “Creating trust through verification of interaction records.” 2018. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:4716c3f8-b9b1-4e80-8537-10b006bb78c1.

MLA Handbook (7th Edition):

Harms, Jan-Gerrit (author). “Creating trust through verification of interaction records.” 2018. Web. 03 Dec 2020.

Vancouver:

Harms J(. Creating trust through verification of interaction records. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:4716c3f8-b9b1-4e80-8537-10b006bb78c1.

Council of Science Editors:

Harms J(. Creating trust through verification of interaction records. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:4716c3f8-b9b1-4e80-8537-10b006bb78c1


Delft University of Technology

14. Setyawan Sajim, Ade (author). Open-Source Software-Based SRAM-PUF for Secure Data and Key Storage Using Off-The-Shelf SRAM.

Degree: 2018, Delft University of Technology

SRAM PUF has a potential to become the main player in hardware security. Unfor- tunately, currently available solutions are usually locked to specific entities, such… (more)

Subjects/Keywords: PUF; SRAM PUF; security; key storage; data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Setyawan Sajim, A. (. (2018). Open-Source Software-Based SRAM-PUF for Secure Data and Key Storage Using Off-The-Shelf SRAM. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:4f879ecf-95d5-4482-8931-8c40abde0e79

Chicago Manual of Style (16th Edition):

Setyawan Sajim, Ade (author). “Open-Source Software-Based SRAM-PUF for Secure Data and Key Storage Using Off-The-Shelf SRAM.” 2018. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:4f879ecf-95d5-4482-8931-8c40abde0e79.

MLA Handbook (7th Edition):

Setyawan Sajim, Ade (author). “Open-Source Software-Based SRAM-PUF for Secure Data and Key Storage Using Off-The-Shelf SRAM.” 2018. Web. 03 Dec 2020.

Vancouver:

Setyawan Sajim A(. Open-Source Software-Based SRAM-PUF for Secure Data and Key Storage Using Off-The-Shelf SRAM. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:4f879ecf-95d5-4482-8931-8c40abde0e79.

Council of Science Editors:

Setyawan Sajim A(. Open-Source Software-Based SRAM-PUF for Secure Data and Key Storage Using Off-The-Shelf SRAM. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:4f879ecf-95d5-4482-8931-8c40abde0e79


Delft University of Technology

15. Sabée, Wendo (author). Adding QUIC support to the Tor network.

Degree: 2019, Delft University of Technology

Privacy in the Internet is under attack by governments and companies indiscriminately spying on everyone. The anonymity network Tor is a solution to restore some… (more)

Subjects/Keywords: tor; quic; anonymity; privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sabée, W. (. (2019). Adding QUIC support to the Tor network. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:29c3fce7-cc34-4655-a98f-42bcf17f8e82

Chicago Manual of Style (16th Edition):

Sabée, Wendo (author). “Adding QUIC support to the Tor network.” 2019. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:29c3fce7-cc34-4655-a98f-42bcf17f8e82.

MLA Handbook (7th Edition):

Sabée, Wendo (author). “Adding QUIC support to the Tor network.” 2019. Web. 03 Dec 2020.

Vancouver:

Sabée W(. Adding QUIC support to the Tor network. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:29c3fce7-cc34-4655-a98f-42bcf17f8e82.

Council of Science Editors:

Sabée W(. Adding QUIC support to the Tor network. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:29c3fce7-cc34-4655-a98f-42bcf17f8e82


Delft University of Technology

16. Brouwer, Jetse (author). Consensus-less Security: A truly scalable distributed ledger.

Degree: 2020, Delft University of Technology

 Distributed ledger technology was expected to spark a technical revolution similar to the internet revolution. After the release of Bitcoin in 2008, many developments have… (more)

Subjects/Keywords: distributed ledger technology; Security; Global consensus; scalability; trustchain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Brouwer, J. (. (2020). Consensus-less Security: A truly scalable distributed ledger. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:d3d56dd8-60ee-47f7-b23a-cdc6c2650e14

Chicago Manual of Style (16th Edition):

Brouwer, Jetse (author). “Consensus-less Security: A truly scalable distributed ledger.” 2020. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:d3d56dd8-60ee-47f7-b23a-cdc6c2650e14.

MLA Handbook (7th Edition):

Brouwer, Jetse (author). “Consensus-less Security: A truly scalable distributed ledger.” 2020. Web. 03 Dec 2020.

Vancouver:

Brouwer J(. Consensus-less Security: A truly scalable distributed ledger. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:d3d56dd8-60ee-47f7-b23a-cdc6c2650e14.

Council of Science Editors:

Brouwer J(. Consensus-less Security: A truly scalable distributed ledger. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:d3d56dd8-60ee-47f7-b23a-cdc6c2650e14


Delft University of Technology

17. Olsthoorn, Mitchell (author). FBase: Trustworthy code module execution.

Degree: 2020, Delft University of Technology

 For decades the idea of re-usable software has been seen as the holy grail of software development. But up until recently, there was more discussion… (more)

Subjects/Keywords: Trust; Modular architecture; Reusability; Usability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Olsthoorn, M. (. (2020). FBase: Trustworthy code module execution. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:d68197ec-50b9-4452-b9bf-e34a743f165f

Chicago Manual of Style (16th Edition):

Olsthoorn, Mitchell (author). “FBase: Trustworthy code module execution.” 2020. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:d68197ec-50b9-4452-b9bf-e34a743f165f.

MLA Handbook (7th Edition):

Olsthoorn, Mitchell (author). “FBase: Trustworthy code module execution.” 2020. Web. 03 Dec 2020.

Vancouver:

Olsthoorn M(. FBase: Trustworthy code module execution. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:d68197ec-50b9-4452-b9bf-e34a743f165f.

Council of Science Editors:

Olsthoorn M(. FBase: Trustworthy code module execution. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:d68197ec-50b9-4452-b9bf-e34a743f165f


Delft University of Technology

18. Shi, Gaomei (author). MultiProxy: a collaborative approach to censorship circumvention.

Degree: 2019, Delft University of Technology

In recent years, many countries and administrative domains exploit control over their communication infrastructures to censor online materials. The concrete reasons behind the Internet censorship… (more)

Subjects/Keywords: censorship; network traffic analysis; distributed systems; Intel SGX

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shi, G. (. (2019). MultiProxy: a collaborative approach to censorship circumvention. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:858f16c9-71f1-4d7f-8baf-d4fa0a0687e3

Chicago Manual of Style (16th Edition):

Shi, Gaomei (author). “MultiProxy: a collaborative approach to censorship circumvention.” 2019. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:858f16c9-71f1-4d7f-8baf-d4fa0a0687e3.

MLA Handbook (7th Edition):

Shi, Gaomei (author). “MultiProxy: a collaborative approach to censorship circumvention.” 2019. Web. 03 Dec 2020.

Vancouver:

Shi G(. MultiProxy: a collaborative approach to censorship circumvention. [Internet] [Masters thesis]. Delft University of Technology; 2019. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:858f16c9-71f1-4d7f-8baf-d4fa0a0687e3.

Council of Science Editors:

Shi G(. MultiProxy: a collaborative approach to censorship circumvention. [Masters Thesis]. Delft University of Technology; 2019. Available from: http://resolver.tudelft.nl/uuid:858f16c9-71f1-4d7f-8baf-d4fa0a0687e3


Delft University of Technology

19. Cong, Kelong (author). A Blockchain Consensus Protocol With Horizontal Scalability.

Degree: 2017, Delft University of Technology

 Blockchain systems have the potential to decentralise many traditionally centralised systems. However, scalability remains a key challenge. Without a horizontally scalable solution, where performance increases… (more)

Subjects/Keywords: blockchain; consensus; distributed systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cong, K. (. (2017). A Blockchain Consensus Protocol With Horizontal Scalability. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:86b2d4d8-642e-4d0f-8fc7-d7a2e331e0e9

Chicago Manual of Style (16th Edition):

Cong, Kelong (author). “A Blockchain Consensus Protocol With Horizontal Scalability.” 2017. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:86b2d4d8-642e-4d0f-8fc7-d7a2e331e0e9.

MLA Handbook (7th Edition):

Cong, Kelong (author). “A Blockchain Consensus Protocol With Horizontal Scalability.” 2017. Web. 03 Dec 2020.

Vancouver:

Cong K(. A Blockchain Consensus Protocol With Horizontal Scalability. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:86b2d4d8-642e-4d0f-8fc7-d7a2e331e0e9.

Council of Science Editors:

Cong K(. A Blockchain Consensus Protocol With Horizontal Scalability. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:86b2d4d8-642e-4d0f-8fc7-d7a2e331e0e9


Delft University of Technology

20. Zhang, Bohao (author). Credit Mining: An Incentive and Boosting System in a Peer-to-Peer File-sharing Network.

Degree: 2018, Delft University of Technology

Since the dawn of BitTorrent technology, free-riding has always been a critical issue restricting the performance and availability of the BitTorrent network. To solve this… (more)

Subjects/Keywords: peer-to-peer; BitTorrent; Trust within Networks; Tribler; Blockchain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, B. (. (2018). Credit Mining: An Incentive and Boosting System in a Peer-to-Peer File-sharing Network. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:9a7bc08f-9f7f-43fc-a410-3961d13c6e8a

Chicago Manual of Style (16th Edition):

Zhang, Bohao (author). “Credit Mining: An Incentive and Boosting System in a Peer-to-Peer File-sharing Network.” 2018. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:9a7bc08f-9f7f-43fc-a410-3961d13c6e8a.

MLA Handbook (7th Edition):

Zhang, Bohao (author). “Credit Mining: An Incentive and Boosting System in a Peer-to-Peer File-sharing Network.” 2018. Web. 03 Dec 2020.

Vancouver:

Zhang B(. Credit Mining: An Incentive and Boosting System in a Peer-to-Peer File-sharing Network. [Internet] [Masters thesis]. Delft University of Technology; 2018. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:9a7bc08f-9f7f-43fc-a410-3961d13c6e8a.

Council of Science Editors:

Zhang B(. Credit Mining: An Incentive and Boosting System in a Peer-to-Peer File-sharing Network. [Masters Thesis]. Delft University of Technology; 2018. Available from: http://resolver.tudelft.nl/uuid:9a7bc08f-9f7f-43fc-a410-3961d13c6e8a


Delft University of Technology

21. Gout, Bart (author). Block and Mortar: A blockchain-inspired business model for mortgage funding market place.

Degree: 2017, Delft University of Technology

Subjects/Keywords: mortgage funding; blockchain; marketplace lending; business model innovation; financial sector

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gout, B. (. (2017). Block and Mortar: A blockchain-inspired business model for mortgage funding market place. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:be64e8ed-6e28-489f-a84b-7661cae75e91

Chicago Manual of Style (16th Edition):

Gout, Bart (author). “Block and Mortar: A blockchain-inspired business model for mortgage funding market place.” 2017. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:be64e8ed-6e28-489f-a84b-7661cae75e91.

MLA Handbook (7th Edition):

Gout, Bart (author). “Block and Mortar: A blockchain-inspired business model for mortgage funding market place.” 2017. Web. 03 Dec 2020.

Vancouver:

Gout B(. Block and Mortar: A blockchain-inspired business model for mortgage funding market place. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:be64e8ed-6e28-489f-a84b-7661cae75e91.

Council of Science Editors:

Gout B(. Block and Mortar: A blockchain-inspired business model for mortgage funding market place. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:be64e8ed-6e28-489f-a84b-7661cae75e91

.