Essays about: "Äkthet"

Showing result 1 - 5 of 10 essays containing the word Äkthet.

  1. 1. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kei Duke-Bergman; Alexander Huynh; [2023]
    Keywords : Bachelor’s thesis; FPGA; SHA; Cryptography; Kandidatexamensarbete; FPGA; SHA; Kryptografi;

    Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE

  2. 2. With great power comes great social responsibility

    University essay from

    Author : Eric Björklund; Johan Börjesson; [2022]
    Keywords : CSR; Trustworthiness; Trust; Transparency; Authenticity; Euphemisms; Social Media; CSR; Trovärdighet; Tillit; Transparens; Äkthet; Eufemismer; Sociala Medier;

    Abstract : The overall vagueness of words and sentences can show differences in meaning and perceptions. Applying this to Corporate Social Responsibility (CSR) initiatives can end up being misleading, especially in an online setting such as social media, which has shown as a preferable medium for these kinds of messages. READ MORE

  3. 3. Unsupervised anomaly detection on log-based time series data

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oskar Granlund; [2019]
    Keywords : ;

    Abstract : Due to a constant increase in the number of connected devices and there is an increased demand for confidentiality, availability, and integrity on applications. This thesis was focused on unsupervised anomaly detection in data centers. READ MORE

  4. 4. Physical Proximity Verification based on Physical Unclonable Functions

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marco Spanghero; [2018]
    Keywords : ;

    Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE

  5. 5. Cryptographic Attestation of the Origin of Surveillance Images

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Eliasson; [2017]
    Keywords : Video signing; Video surveillance; H.264 AVC; Public-key cryptography; Axis Communications AB; Technology and Engineering;

    Abstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE