Essays about: "Security Token"
Showing result 1 - 5 of 17 essays containing the words Security Token.
-
1. Structural Review and Performance Evaluation of Real Estate Tokens
University essay from KTH/Fastighetsekonomi och finansAbstract : This thesis study includes quantitative and qualitative research on real estate tokens, one of the leading security tokens. Security tokens, which are based on blockchain technology, are rapidly becoming widespread as new era investment products. Real estate tokens have long stood out as one of the most popular of these tokens. READ MORE
-
2. Workflow-driven, dynamic authorization for Modular Automation systems
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Industrial Control Systems (ICSs) play a critical role in various industries, automating processes and efficiency optimization. However, these systems have security vulnerabilities that make them prone to cyber attacks, so it is crucial to have strong access control mechanisms in place. READ MORE
-
3. Title Leveraging Blockchain Technology in Green Finance
University essay from KTH/Fastighetsföretagande och finansiella systemAbstract : To achieve net zero emissions by 2050, a $275 trillion investment is needed, with the private sector playing a significant role. Green corporate bonds are a popular financing method, having grown to 6% of global corporate bonds in 2021. READ MORE
-
4. Efforts towards Security: Hybrid and Pure Token Offerings : An exploratory multiple case study of novel financing methods in the blockchain environment for entrepreneurs
University essay fromAbstract : .... READ MORE
-
5. Security and performance impact of client-side token storage methods
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Applications store more data than ever before, including sensitive information such as user data, credit card information, and company secrets. Due to the value of this data, malicious actors have a financial incentive to employ a variety of attacks against applications in order to gain access to it. READ MORE