Essays about: "End-to-end Encryption"

Showing result 1 - 5 of 18 essays containing the words End-to-end Encryption.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  2. 2. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  3. 3. Cloud-Based Collaborative Local-First Software

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Tor Vallin; [2023]
    Keywords : Cloud Computing; Local-First Software; End-to-End Encryption; Privacy; Scalability;

    Abstract : Local-first software has the potential to offer users a great experience by combining the best aspects of traditional applications with cloud-based applications. However, not much has been documented regarding developing backends for local-first software, particularly one that is scalable while still supporting end-to-end encryption. READ MORE

  4. 4. FFS: A cryptographic cloud-based deniable filesystem through exploitation of online web services : Store your sensitive data in plain sight

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Glenn Olsson; [2023]
    Keywords : Filesystem; Fejk FileSystem; Cloud-based filesystem; Steganograhpic filesystem; Filsystem; Fejk FileSystem; Molnbaserat filsystem; Steganografiskt filsystem;

    Abstract : Many Online Web Services (OWSs) today, such as Flickr and Twitter, provide users with the possibility to post images that are stored on the platform for free. This thesis explores creating a cryptographically secure filesystem that stores its data on an online web service by encoding the encrypted data as images. READ MORE

  5. 5. Compression's effect on end-to-end latency in file upload systems that utilize encryption

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Kristoffer Zaar; [2023]
    Keywords : Encryption; Compression; Latency; Web-Based systems;

    Abstract : Encryption is the process of obfuscating data to restrict access to it while allowing it to be returned to its original non-obfuscated form through decryption. This process is increasingly used within web-based systems to secure data. READ MORE