Essays about: "Blowfish"
Found 5 essays containing the word Blowfish.
-
1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE
-
2. Security in Cloud Storage : A Suitable Security Algorithm for Data Protection
University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologiAbstract : The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. READ MORE
-
3. Data Encryption on a Network
University essay from Institutionen för datavetenskap, fysik och matematik, DFMAbstract : In this project you can find a study about different encryption algorithms, which are use to safeguard the information on messages over the network. We have developed a client-server application which will send information through the network which has to be secured. READ MORE
-
4. Achieving Security in Messaging and Personal Content in Symbian Phones
University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesignAbstract : This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. READ MORE
-
5. Security versus Power Consumption in Wireless Sensor Networks
University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)Abstract : X3 C is a Swedish company which develops a world wide good tracking system by using ARFID tags placed on every item which has to be delivered and base stations as gateway in a wireless sensor network. The requirement of a long lifespan of their ARFID tags made it difficult to implement security. READ MORE