Essays about: "thesis for symmetric key cryptography"

Showing result 1 - 5 of 10 essays containing the words thesis for symmetric key cryptography.

  1. 1. Anonymization of Sensitive Data through Cryptography

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isac Holm; Johan Dahl; [2023]
    Keywords : Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE

  2. 2. Client controlled, secure endpointto-endpoint storage in the cloud

    University essay from KTH/Hälsoinformatik och logistik

    Author : Maximilian Michelson; [2020]
    Keywords : ;

    Abstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE

  3. 3. Distributed ledger technology in the capital market : Shared versus private information in a permissioned blockchain

    University essay from Uppsala universitet/Avdelningen för datalogi

    Author : Alessandro Piccolo; [2017]
    Keywords : Blockchain; Blockchain technology Distributed ledger; Capital market; Private transaction; Cryptography; Bitcoin; Ethereum; Quorum; Corda; Ripple;

    Abstract : This master thesis explores how blockchain technologies can be utilized within the financial sector with focus on how to store both private and public information on the blockchain. The capital market is looking into ways of cutting down administrative work through streamlining the financial process by using blockchain technologies. READ MORE

  4. 4. Access Control in the Internet of Things

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Denis Sitenkov; [2014]
    Keywords : ;

    Abstract : The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. READ MORE

  5. 5. Access Control in the Internet of Things

    University essay from RISE./SICS

    Author : Sitenkov Denis; [2014]
    Keywords : ;

    Abstract : The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. READ MORE