Advanced search

Showing result 1 - 5 of 12 essays matching the above criteria.

  1. 1. Privacy risks caused by the Swedish Police use of IMSI-catchers in a democratic society

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Karl Martin Stawe; [2021]
    Keywords : ;

    Abstract : For over a decade, the Swedish government has debated the Swedish Police Authority, starting now, the Swedish Police, usage of IMSI-catchers, without finding a solution that provides a formal statute that balances crime-fighting and caring for a natural person's integrity. By IMSI-catchers, the author of this paper refers to the man-in-the-middle attack device that, among other things, can listen to SMS and phone calls in plaintext. READ MORE

  2. 2. Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol.

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nishkal Gupta Myadam; Bhavith Patnam; [2020]
    Keywords : Bonseyes AI Marketplace; Ocean Protocol; Public Key Infrastructure; Distributed Public Key Infrastructure; Secret Store functionality;

    Abstract : During the modern times, innovators and researchers developed a key technology known as Artificial Intelligence (AI) Marketplace which leverages the power of AI to efficiently utilize the data generated by millions of devices to create new and better services and software products. H2020 Bonseyes is one such project that provides us a collaborative cloud based model of the AI marketplace for the users who generally don’t have access to large data sets, algorithms etc by allowing them to collaborate which each other and exchange the software artifacts. READ MORE

  3. 3. Security of dynamic authorisation for IoT through Blockchain technology

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Sandor; [2018]
    Keywords : Blockchain; IoT; Public Key Encryption; Public Key Infrastructure;

    Abstract : The use of Internet of Things devices is an integral part of our modern society. Communication with internet of things devices is secured with asymmetric key encryption that is handled by the centralized certificate authority infrastructure. READ MORE

  4. 4. Cryptographic Attestation of the Origin of Surveillance Images

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Eliasson; [2017]
    Keywords : Video signing; Video surveillance; H.264 AVC; Public-key cryptography; Axis Communications AB; Technology and Engineering;

    Abstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE

  5. 5. Consistent authentication in disitrbuted networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Lindskog; [2016]
    Keywords : Authentication; Distributed Hash Table; Kademlia; Distributed Networking; Network Security; Calvin; Cryptography; Technology and Engineering;

    Abstract : In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in relevance, new storage solutions are needed. Storage can no longer rely on a single central entity but rather needs to depend on the resources of the entire network. READ MORE