Essays about: "b to b"

Showing result 1 - 5 of 1163 essays containing the words b to b.

  1. 1. Open Source Security Token for Linux

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Gustav ElinÖrtenberg ChristofferRoxbergh Adam Mathiesen JohanFredriksson Ben Mohammad; [2017-08-10]
    Keywords : FPGA; Linux; Open source; OpenSSL; PAM; RSA; Security; Twofactor; ;

    Abstract : The project investigates and implements a two-factor authentication system utilizingthe RSA cryptography scheme. The system consists of an FPGA security token anda PAM module for Linux. Two similar solutions were made, one air-gapped witha shorter key (version A), whereas the other communicated over USB (version B). READ MORE

  2. 2. CO and CO2 Detection for Catalysis Diagnosis by Means of PLIF

    University essay from Lunds universitet/Fysiska institutionen; Lunds universitet/Förbränningsfysik

    Author : Sebastian Pfaff; [2017]
    Keywords : plif; laser diagnostics; catalysis; carbon monoxide; carbon dioxide; palladium; planar laser induced fluorescence; Physics and Astronomy;

    Abstract : In order to fully understand the underlying processes of catalysis, it is vital to combine measurements of the catalyst surface, where the reaction occurs, with measurements of the gas concentration close to the catalyst. We have developed a convenient setup, which uses a single laser system to visualise the gas surrounding a working catalyst in situ at realistic operating conditions. READ MORE

  3. 3. Post-quantum algorithms for digital signing in Public Key Infrastructures

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Mikael Sjöberg; [2017]
    Keywords : Post-quantum algorithms; Digital signature algorithms; Public Key Infrastructures;

    Abstract : One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. READ MORE

  4. 4. Nonlinear Regression of Power-Exponential Functions : Experiment Design for Curve Fitting

    University essay from Mälardalens högskola/Utbildningsvetenskap och Matematik

    Author : Tshering Denka; [2017]
    Keywords : Curve fitting; Power exponential functions; Design; Chebyshev node; Equidistant design;

    Abstract : This thesis explores how to best choose data when curve fitting using power exponential functions. The power exponential functions used are μ(b; x)=(xe1-x)b and Φ(ρ; x)=((1-x)ex)ρ . We use a number of designs such as the equidistant design, the Chebyshev design and the the D-optimal design to compare which design gives the best fit. READ MORE

  5. 5. Wastewater from a biodiesel plant: characterization of streams and suggestions for treatment options

    University essay from Lunds universitet/Kemiteknik (CI)

    Author : Linnea Andersson; [2017]
    Keywords : water engineering; environmental engineering; avloppsteknik; vattenförsörjningsteknik; Technology and Engineering;

    Abstract : Biodiesel is an important alternative to ordinary diesel when limiting the effects on the climate. However, the production path of biodiesel produces a wastewater with a high chemical oxygen demand (COD) and it needs to be cleaned. The aim of this study was to characterise biodiesel wastewater as well as to suggest treatment options. READ MORE