Advanced search

Showing result 1 - 5 of 17 essays matching the above criteria.

  1. 1. Near Field Communication Security concerns & applicable security in Android

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Filip Bengtsson; Matteo Madrusan; [2020]
    Keywords : Near field communication; active NFC; security protocol; security exploit; standard security protocol; NFC attack countermeasures;

    Abstract : Near Field Communication (NFC) is being used more frequent in smart devices, this raises security concerns whether the users information is secure from attackers. The thesis examines the threats that NFC on Android smartphones are exposed to, its countermeasures, as well as existing protocols that ensures the integrity and confidentiality of the users data. READ MORE

  2. 2. Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

    University essay from Linköpings universitet/Informationskodning

    Author : Hampus Eriksson; [2020]
    Keywords : post-quantum; cryptography; lattice-based cryptography; quantum-resistant; Kyber; constrained device; performance; evaluation; implementation;

    Abstract : Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. READ MORE

  3. 3. eSIM Re-Selling on Mobile App

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Albin Fridh; [2020]
    Keywords : eSIM; embedded SIM; eUICC; RSP; Remote SIM Provisioning; Technology and Engineering;

    Abstract : In recent years many devices such as smartphones, smart watches and laptops have started being equipped with embedded SIM cards called eSIM, which have the possibility to be reprogrammed with new subscription data through a process called remote SIM provisioning. To enable the eSIM in these devices, the mobile operators have had to implement new systems for the remote SIM provisioning process, and most of the research around this process has focused on security, leaving other areas unexplored. READ MORE

  4. 4. Outsmarting Passwords : An Analysis on the use of Smart Cards for Single Sign-On in Legacy Applications

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Alexander Tingström; [2017]
    Keywords : Smart Cards; Security; Single Sign On; Legacy Systems;

    Abstract : By leveraging smart-cards as a bearer of user credentials for legacy applications the security of these systems can be greatly increased. In this thesis a solution to the problem of legacy applications only allowing username-password authentication is proposed. READ MORE

  5. 5. Access Control With High Security Credentials

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Michael Kapusta; Nicklas Lindstrom; [2016]
    Keywords : Technology and Engineering;

    Abstract : Developing security regardless of its format is a constant cat and mouse game were adversaries are either in the midst of trying to crack your solution, or they may have already cracked it. A cryptographic algorithm may be unfeasible to crack from a mathematical perspective but as long as a human being is the one developing the solution, a human error is always possible. READ MORE