Essays about: "Äkthet"
Showing result 1 - 5 of 10 essays containing the word Äkthet.
-
1. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE
-
2. With great power comes great social responsibility
University essay fromAbstract : The overall vagueness of words and sentences can show differences in meaning and perceptions. Applying this to Corporate Social Responsibility (CSR) initiatives can end up being misleading, especially in an online setting such as social media, which has shown as a preferable medium for these kinds of messages. READ MORE
-
3. Unsupervised anomaly detection on log-based time series data
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Due to a constant increase in the number of connected devices and there is an increased demand for confidentiality, availability, and integrity on applications. This thesis was focused on unsupervised anomaly detection in data centers. READ MORE
-
4. Physical Proximity Verification based on Physical Unclonable Functions
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There are rapidly growing concerns about security of hardware implementing cryptographic algorithms. A compromised device can potentially be used as an entry point for cyberattacks on other devices connected to the network, as evidenced by the recent Spectre and Meltdown CPU bugs. READ MORE
-
5. Cryptographic Attestation of the Origin of Surveillance Images
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE