Essays about: "Implementing Encryption"

Showing result 1 - 5 of 17 essays containing the words Implementing Encryption.

  1. 1. Evaluating intrusion detection points in an end-to-end solution

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Lilla Pankaczi; [2023]
    Keywords : RFID; Random UID; Mutual Authentication; Scyther;

    Abstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE

  2. 2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  3. 3. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Adam Lindberg; [2023]
    Keywords : IoT penetration testing; Smart thermostat; Ethical hacking; PatrIoT; Cybersecurity; IoT penetrationstestning; Smart termostat; Etisk hackning; PatrIoT; Cybersäkerhet;

    Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE

  4. 4. Implementing two Threshold Private Set Intersection Protocols based on Homomorphic Encryption

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Jeppsson; [2021]
    Keywords : Private Set Intersection; Homomorphic Encryption; Cryptology; Technology and Engineering;

    Abstract : Private set intersection is a technique for finding the intersection of (two) parties' sets without disclosing anything else, and it finds it use in e.g. contact discovery, finding friends who are already on a social platform. READ MORE

  5. 5. TLS Decryption in passive monitoring system with server private key

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Emil Käck; [2021]
    Keywords : TLS; Decryption; Passive monitoring; Server private key;

    Abstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE