Essays about: "Säkerhetsapplikationer"
Found 3 essays containing the word Säkerhetsapplikationer.
-
1. An FPGA Implementation of Arbiter PUF with 4x4 Switch Blocks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Theft of services, private information, and intellectual property have become significant dangers to the general public and industry. Cryptographic algorithms are used for protection against these dangers. All cryptographic algorithms rely on secret keys that should be generated by an unpredictable process and securely stored. READ MORE
-
2. Network Authentication to the Physical World
University essay from KTH/Kommunikationssystem, CoSAbstract : Quick Response (QR) codes have been used for both non-authentication purposes and authentication & authorization of a user. The visual representation of a QR code requires a reader/decoder to convert the code to a readable resource for an application. READ MORE
-
3. Speech Enhancement using Constrained-ICA with Bessel Features
University essay from Blekinge Tekniska Högskola/Sektionen för ingenjörsvetenskapAbstract : In this thesis, we proposed an approach for extracting a desired speech signal from a mixed source signal using the ICA-R algorithm and Bessel features. Here the desired speech signal and the reference signal are two different speech utterances of a same speaker. READ MORE