Essays about: "design and implementation of public key infrastructure"

Showing result 1 - 5 of 16 essays containing the words design and implementation of public key infrastructure.

  1. 1. Blockchain-based e-voting system without digital ID: A Proof-of-Concept

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Leonard Schick; [2024]
    Keywords : Computer science; Cryptography; Crypto; Blockchain; Distributed systems; e-voting; electronic voting; Ethereum; Hyperledger; Hyperledger besu; Decentralization; Datavetenskap; Kryptografi; Blockkedja; Distribuerade system; e-röstning; Elektronisk röstning; Blinda signaturer; Ethereum; Hyperledger Besu; Decentralisering;

    Abstract : Electronic voting systems have the potential to offer a cost effective, secure and transparent way of communicating with the citizens, increasing trust and participation. However creating a secure open source electronic voting system providing confidentiality and transparency with sufficient performance has long been a challenge. READ MORE

  2. 2. Conditions for Circular Electric Vehicle Battery Value Chains : Exploring Opportunities for Circular Economy Implementation in the Value Chain of Electric Vehicle Batteries in Nairobi, Kenya

    University essay from Linköpings universitet/Industriell miljöteknik

    Author : Johanna Hegenbart; Sofie Rosmark; [2023]
    Keywords : Circular Economy; Electric Vehicle Batteries; Sustainability; Ecosystem;

    Abstract : To reduce the negative impacts of climate change, electric vehicles (EVs) have emerged as a viable solution in the mobility sector, leading to an increase in battery production and use. For electric vehicle batteries (EVBs) to be sustainable, the total impact of the supply and value chain has to be as low as possible, making the implementation of circular economy (CE) principles a key element in the transition. READ MORE

  3. 3. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qi Li; [2023]
    Keywords : NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE

  4. 4. Closing the loop of human waste: can eco-innovation be the key? Findings from the case study of the LooPi urinal

    University essay from Lunds universitet/Internationella miljöinstitutet

    Author : Maricruz Vargas Esquivel; [2022]
    Keywords : eco-innovation; eco-toilet; wastewater reuse; circular economy; Vienna; Earth and Environmental Sciences;

    Abstract : The Circular Economy (CE) primary goal is to be capable of "closing the loops" in processes by changing the idea of resources and waste. Eco-innovation ("the introduction of any new or significantly improved product (good or service), process, organizational change or marketing solution that reduces the use of natural resources (including materials, energy, water, and land)" could be a way to encourage industries to develop more solutions with "closed-loop" systems. READ MORE

  5. 5. LF-PKI: Practical, Secure, and High-Performance Design and Implementation of a Lite Flexible PKI

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yongzhe Xu; [2022]
    Keywords : Web Public Key Infrastructure PKI ; Certificate Transparency CT ; trust heterogeneity; Sparse Merkle Tree SMT ; Web Public Key Infrastructure PKI ; Certificate Transparency CT ; trust heterogenity; Sparse Merkle Träd SMT ;

    Abstract : Today’s Web Public Key Infrastructure (PKI) builds on a homogeneous trust model. All Certificate Authorities (CAs) are equally trusted once they are marked as trusted CAs on the client side. As a result, the security of the Web PKI depends on the weakest CA. READ MORE