Essays about: "security of smart cards"
Showing result 1 - 5 of 17 essays containing the words security of smart cards.
-
1. Near Field Communication Security concerns & applicable security in Android
University essay from Högskolan Kristianstad/Fakulteten för naturvetenskapAbstract : Near Field Communication (NFC) is being used more frequent in smart devices, this raises security concerns whether the users information is secure from attackers. The thesis examines the threats that NFC on Android smartphones are exposed to, its countermeasures, as well as existing protocols that ensures the integrity and confidentiality of the users data. READ MORE
-
2. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card
University essay from Linköpings universitet/InformationskodningAbstract : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. READ MORE
-
3. eSIM Re-Selling on Mobile App
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In recent years many devices such as smartphones, smart watches and laptops have started being equipped with embedded SIM cards called eSIM, which have the possibility to be reprogrammed with new subscription data through a process called remote SIM provisioning. To enable the eSIM in these devices, the mobile operators have had to implement new systems for the remote SIM provisioning process, and most of the research around this process has focused on security, leaving other areas unexplored. READ MORE
-
4. Outsmarting Passwords : An Analysis on the use of Smart Cards for Single Sign-On in Legacy Applications
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : By leveraging smart-cards as a bearer of user credentials for legacy applications the security of these systems can be greatly increased. In this thesis a solution to the problem of legacy applications only allowing username-password authentication is proposed. READ MORE
-
5. Access Control With High Security Credentials
University essay from Lunds universitet/Institutionen för reglerteknikAbstract : Developing security regardless of its format is a constant cat and mouse game were adversaries are either in the midst of trying to crack your solution, or they may have already cracked it. A cryptographic algorithm may be unfeasible to crack from a mathematical perspective but as long as a human being is the one developing the solution, a human error is always possible. READ MORE