Essays about: "thesis in digital signature"

Showing result 1 - 5 of 20 essays containing the words thesis in digital signature.

  1. 1. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kei Duke-Bergman; Alexander Huynh; [2023]
    Keywords : Bachelor’s thesis; FPGA; SHA; Cryptography; Kandidatexamensarbete; FPGA; SHA; Kryptografi;

    Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE

  2. 2. BGPcredit : A Blockchain-based System for Securing BGP

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yu Yang Liu; [2022]
    Keywords : blockchain; RPKI; consensus algorithm; border gateway protocol; security; blockchain; RPKI; konsensusalgoritm; border gateway-protokoll; säkerhet;

    Abstract : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. READ MORE

  3. 3. Identifying signatures in scanned paperdocuments : A proof-of-concept at Bolagsverket

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Björn Norén; [2022]
    Keywords : Pytorch; Neural Networks; Machine Learning; Deep Neural Networks; Convolutional Neural Networks; Computer Vision; Image Detection;

    Abstract : Bolagsverket, a Swedish government agency receives cases both in paper form via mail, document form via e-mail and also digital forms. These cases may be about registering people in a company, changing the share capital, etc. READ MORE

  4. 4. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : David Hilm; David Rahim; [2019]
    Keywords : Digital signature; Security; Two-factor Authentication; Authentication; Cryptography; YubiKey; JavaScript; WebCrypto; Universal Second Factor;

    Abstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE

  5. 5. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Martin Lang; [2019]
    Keywords : Automotive Ethernet; Information Security; Integrity; Time Sensitive Systems; Automotive Ethernet; Informationssäkerhet; Integritet; tidskänsliga system;

    Abstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE