Essays about: "Cryptographic protocols"
Showing result 1 - 5 of 20 essays containing the words Cryptographic protocols.
-
1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
2. Securing LwM2M with Mbed TLS in Contiki-NG
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. READ MORE
-
3. Bootstrapping Secure Sensor Networks in the Internet of Things
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. READ MORE
-
4. Improving deep learning assistedfar-field electromagnetic sidechannelattacks on AES : Effects on attack efficiency from using additive noise and otherdata augmentation techniques
University essay from KTH/MekatronikAbstract : Profiled side-channel attacks on hardware implemented cryptographic algorithms have been a well-researched topic for the past two decades and many countermeasures against these attacks have been proposed and adopted by the industry. Recently, a new form of far field EM side channel called "screaming channel attacks" have been highlighted. READ MORE
-
5. On Secure Administrators for Group Messaging Protocols
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the smartphone era, instant messaging is fully embedded in our daily life. Messaging protocols must preserve the confidentiality and authenticity of sent messages both in two-party conversations and in group chats, in which the list of group members may suffer modifications over time. READ MORE