Essays about: "thesis in the security of the digital signature"
Showing result 1 - 5 of 15 essays containing the words thesis in the security of the digital signature.
-
1. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE
-
2. BGPcredit : A Blockchain-based System for Securing BGP
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. READ MORE
-
3. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey
University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystemAbstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE
-
4. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE
-
5. Post-quantum algorithms for digital signing in Public Key Infrastructures
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. READ MORE