Essays about: "digital signature implementation"

Showing result 1 - 5 of 12 essays containing the words digital signature implementation.

  1. 1. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  2. 2. Implementation of the signature scheme Rainbow on SoC FPGA

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Tomas Preucil; [2022]
    Keywords : ;

    Abstract : Thanks to the research progress, quantum computers are slowly becoming a reality, and some companies already have working prototypes. While this is great news for some, it also means that part of the encryption used today will be rendered unsafe and obsolete. READ MORE

  3. 3. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : David Hilm; David Rahim; [2019]
    Keywords : Digital signature; Security; Two-factor Authentication; Authentication; Cryptography; YubiKey; JavaScript; WebCrypto; Universal Second Factor;

    Abstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE

  4. 4. Cryptographic Attestation of the Origin of Surveillance Images

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Eliasson; [2017]
    Keywords : Video signing; Video surveillance; H.264 AVC; Public-key cryptography; Axis Communications AB; Technology and Engineering;

    Abstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE

  5. 5. Evaluation and Implementation for Pushing Automatic Updates to IoT Devices

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Menglei Min; [2017]
    Keywords : Automatic update; Internet of things; Digital signature; Secure sockets layer communication; Secure hash algorithm;

    Abstract : In recent years, Internet of Things has developed rapidly, and now has penetrated into human life and industrial production. It is speculated that the internet of things will become ubiquitous in the future, which will bring a series of problems. READ MORE