Essays about: "Authentication Authority"
Showing result 1 - 5 of 11 essays containing the words Authentication Authority.
-
1. Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. READ MORE
-
2. Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol.
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : During the modern times, innovators and researchers developed a key technology known as Artificial Intelligence (AI) Marketplace which leverages the power of AI to efficiently utilize the data generated by millions of devices to create new and better services and software products. H2020 Bonseyes is one such project that provides us a collaborative cloud based model of the AI marketplace for the users who generally don’t have access to large data sets, algorithms etc by allowing them to collaborate which each other and exchange the software artifacts. READ MORE
-
3. Cryptographic Attestation of the Origin of Surveillance Images
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE
-
4. Consistent authentication in disitrbuted networks
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in relevance, new storage solutions are needed. Storage can no longer rely on a single central entity but rather needs to depend on the resources of the entire network. READ MORE
-
5. Secure Multicast with Source Authentication for the Internet of Things
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Sakernas Internet är ett snabbt växande område av avancerad teknik och forskning. Dess säkerhet är avgörande för tillförlitligheten och tryggheten av framtida dagliga kommunikationer. DTLS protokollet är ett standardprotokoll för att garantera säkerheten för unicast kommunikation. READ MORE