Essays about: "Authentication Authority"

Showing result 6 - 10 of 12 essays containing the words Authentication Authority.

  1. 6. Secure Multicast with Source Authentication for the Internet of Things

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Nikita Martynov; [2014]
    Keywords : ;

    Abstract : Sakernas Internet är ett snabbt växande område av avancerad teknik och forskning. Dess säkerhet är avgörande för tillförlitligheten och tryggheten av framtida dagliga kommunikationer. DTLS protokollet är ett standardprotokoll för att garantera säkerheten för unicast kommunikation. READ MORE

  2. 7. Namecoin as authentication for public-key cryptography

    University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Tekniska högskolan

    Author : Tomas Melin; Tomas Vidhall; [2014]
    Keywords : Namecoin; block chain; public-key chryptography;

    Abstract : Public-key cryptography is a subject that is very important to everyone who wants confidentiality and privacy in networks. It is important to understand how public-key cryptography systems work and what flaws they have. In the first part of this report we describe some of the most common encryption schemes and key agreements. READ MORE

  3. 8. Single Sign-On : Risks and Opportunities of Using SSO (Single Sign-On) in a Complex System Environment with Focus on Overall Security Aspects

    University essay from Institutionen för datavetenskap (DV)

    Author : Ece Cakir; [2013]
    Keywords : SSO; information security; authentication; federated identity; multi-factor authentication; MoDAF framework; SAML; LDAP; certificate authority; kerberos; shibboleth; SSO architectures; risk evaluation.;

    Abstract : Main concern of this thesis is to help design a secure and reliable network system which keeps growing in complexity due to the interfaces with multiple logging sub-systems and to ensure the safety of the network environment for everyone involved. The parties somewhat involved in network systems are always in need of developing new solutions to security problems and striving to have a secure access into a network so as to fulfil their job in safe computing environments. READ MORE

  4. 9. A framework to implement delegation in offline PACS : A strategy to restrict user’s path

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Tati Bharath; [2013]
    Keywords : smart card authentication; offline physical access control; delegation; shared secret keys; design science;

    Abstract : Physical access control systems (PACS) deal with the security of the availability of resources. They work as an alternative to traditional manual security access control. Access control has two variants, the logical which deals with computer environments and the physical which deals with the physical entry into a property or warehouses. READ MORE

  5. 10. Investigating Security Options for StudentDevelop.com and the Testing of SSL

    University essay from

    Author : Jude Nunga; Godwin Okeke; [2012]
    Keywords : SSL; Authentication; Encryption; Communication; Web 2.0; Data;

    Abstract : Security issues have become a key problem with most e-commerce platforms these days and information sent over the internet needs to be protected. When operating an e-commerce platform such as studentdevelop.com financial transactions are involved. Data communication is very vital to e-commerce and needs to be processed securely. READ MORE