Essays about: "cryptography and its techniques"

Showing result 1 - 5 of 8 essays containing the words cryptography and its techniques.

  1. 1. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  2. 2. Bootstrapping Secure Sensor Networks in the Internet of Things

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Edman; [2022]
    Keywords : Internet of Things; Machine-to-machine communications; Internet security; Cryptographic protocols; Sakernas internet; Maskin-till-maskin kommunikation; Säkerhet på internet; Kryptografiska protokoll;

    Abstract : The Internet of Things has become an integral part of modern society and continues to grow and evolve. The devices are expected to operate in various conditions and environments while securely transmitting sensor data and keeping low manufacturing costs. Security for the Internet of Things is still in its infancy and a serious concern. READ MORE

  3. 3. Transaction synchronization and privacy aspect in blockchain decentralized applications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Patarawan Ongkasuwan; [2020]
    Keywords : Blockchain; distributed database; distributed ledger; digital ledgers; centralized database; decentralized database; Ethereum; Blockchain synchronization; security-related; cryptocurrency; digital currency; transaction; user experience; privacy strategy; smart contract; risk; Blockchain; distribuerad storbok; digital ledbok; centraliserad databas; decentraliserad databas; Ethereum; Blockchain-synkronisering; säkerhetsrelaterad; cryptocurrency; digital valuta; transaktion; användarupplevelse; sekretessstrategi; smart kontrakt; risk;

    Abstract : The ideas and techniques of cryptography and decentralized storage have seen tremendous growth in many industries, as they have been adopted to improve activities in the organization. That called Blockchain technology, it provides an effective transparency solution. READ MORE

  4. 4. Protection of Personal Data in Blockchain Technology : An investigation on the compatibility of the General Data Protection Regulation and the public blockchain

    University essay from Stockholms universitet/Institutet för rättsinformatik (IRI)

    Author : Amelia Wallace; [2019]
    Keywords : General Data Protection Regulation; GDPR; Blockchain; Transparency; Personal Data; Dataskyddsförordningen; GDPR; Blockkedja; Transparens; Teknikneutralitet; Personuppgift;

    Abstract : On 25 May 2018 the General Data Protection Regulation, GDPR, came into force in the EU. The regulation strengthened the rights of the data subjects’ in relation to the data controllers and processors and gave them more control over their personal data. READ MORE

  5. 5. Homomorphic Encryption: Working and Analytical Assessment : DGHV, HElib, Paillier, FHEW and HE in cloud security

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Srinivas Divya Papisetty; [2017]
    Keywords : Homomorphic encryption; Homomorphic Encryption Schemes; Cloud security; Cryptography;

    Abstract : Context: Secrecy has kept researchers spanning over centuries engaged in the creation of data protection techniques. With the growing rate of data breach and intervention of adversaries in confidential data storage and communication, efficient data protection has found to be a challenge. READ MORE