Essays about: "Secure Hash Algorithm"
Found 4 essays containing the words Secure Hash Algorithm.
-
1. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE
-
2. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE
-
3. Evaluation and Implementation for Pushing Automatic Updates to IoT Devices
University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologiAbstract : In recent years, Internet of Things has developed rapidly, and now has penetrated into human life and industrial production. It is speculated that the internet of things will become ubiquitous in the future, which will bring a series of problems. READ MORE
-
4. Security Enhanced Firmware Update Procedures in Embedded Systems
University essay from Institutionen för datavetenskapAbstract : Many embedded systems are complex, and it is often required that the firmware in these systems are updatable by the end-user. For economical and confidentiality reasons, it is important that these systems only accept firmware approved by the firmware producer. READ MORE