Essays about: "merkle tree"
Showing result 1 - 5 of 10 essays containing the words merkle tree.
-
1. LF-PKI: Practical, Secure, and High-Performance Design and Implementation of a Lite Flexible PKI
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s Web Public Key Infrastructure (PKI) builds on a homogeneous trust model. All Certificate Authorities (CAs) are equally trusted once they are marked as trusted CAs on the client side. As a result, the security of the Web PKI depends on the weakest CA. READ MORE
-
2. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
3. Design and Implementation of A Smart Grid System Based on Blockchain Smart Contract Technology
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : Under de senaste åren har blockchain-tekniken fått mer och mer uppmärksamhet. Det har visat speciella fördelar i digital valuta, eftersom det distribueras och dess data inte kan ändras. Med fler länder som presenterar idén om kraftsysteminnovationen har ett stort antal distribuerade kraftkällor dykt upp. READ MORE
-
4. Using Hash Trees for Database Schema Inconsistency Detection
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : For this work, two algorithms have been developed to improve the performance of the inconsistency detection by using Merkle trees. The first builds a hash tree from a database schema version, and the second compares two hash trees to find where changes have occurred. READ MORE
-
5. Distributed Client Driven Certificate Transparency Log
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) was compromised, has shed light on the vulnerabilities of the internet. In order to make the internet safer in terms of exposing fraudulent certificates, CertificateTransparency (CT) was introduced. READ MORE