Advanced search
Found 4 essays matching the above criteria.
-
1. Puncturable Symmetric KEMs for Forward-Secret 0-RTT Key Exchange
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The latest version of the Transport Layer Security protocol (TLS 1.3) introduces a pre-shared key zero round-trip time (0-RTT) mode. This enables session resumption with no latency before the first application data can be sent, at the cost of losing forward secrecy and replay protection. READ MORE
-
2. Out-of-band transfer with Android to configure pre-shared secrets into sensor nodes
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Applications based on Wireless Sensor Networks are making their way into all kinds of industries. Today, they can do anything from off-loading hospitals by monitoring patients in their homes to regulating production lines in factories. More often than not, they perform some kind of surveillance and tracking. READ MORE
-
3. A framework to implement delegation in offline PACS : A strategy to restrict user’s path
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Physical access control systems (PACS) deal with the security of the availability of resources. They work as an alternative to traditional manual security access control. Access control has two variants, the logical which deals with computer environments and the physical which deals with the physical entry into a property or warehouses. READ MORE
-
4. Elliptic Curve Digital Signatures in RSA Hardware
University essay from Informationskodning; Tekniska högskolanAbstract : A digital signature is the electronic counterpart to the hand written signature. It can prove the source and integrity of any digital data, and is a tool that is becoming increasingly important as more and more information is handled electronically. Digital signature schemes use a pair of keys. READ MORE