Essays about: "Certificate Authority"

Showing result 6 - 10 of 22 essays containing the words Certificate Authority.

  1. 6. Distributed Client Driven Certificate Transparency Log

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Robin Ellgren; Tobias Löfgren; [2018]
    Keywords : ;

    Abstract : High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) was compromised, has shed light on the vulnerabilities of the internet. In order to make the internet safer in terms of exposing fraudulent certificates, CertificateTransparency (CT) was introduced. READ MORE

  2. 7. Evaluating Supportive Formsfor Physicians

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Anton Björsell Anton Björsell; [2018]
    Keywords : ;

    Abstract : In 2017, almost 1 out of 10 medical certificates regarding sick leave needed additional completion since the judging authority, Försäkringskassan, deemed that they lacked critical information. This is considered a big pain for both health care, Försäkringskassan and the patient, since it prolongs the process and claims additional resources. READ MORE

  3. 8. Security of dynamic authorisation for IoT through Blockchain technology

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexander Sandor; [2018]
    Keywords : Blockchain; IoT; Public Key Encryption; Public Key Infrastructure;

    Abstract : The use of Internet of Things devices is an integral part of our modern society. Communication with internet of things devices is secured with asymmetric key encryption that is handled by the centralized certificate authority infrastructure. READ MORE

  4. 9. Cryptographic Attestation of the Origin of Surveillance Images

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Eliasson; [2017]
    Keywords : Video signing; Video surveillance; H.264 AVC; Public-key cryptography; Axis Communications AB; Technology and Engineering;

    Abstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE

  5. 10. A Distributed Public Key Infrastructure for the Web Backed by a Blockchain

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Bastian Fredriksson; [2017]
    Keywords : Public key infrastructure; Blockchain; Merkle tree; Proof of Stake; Certificate authority;

    Abstract : The thesis investigates how a blockchain can be used to build a decentralised public key infrastructure for the web, by proposing a custom federation blockchain relying on honest majority. Our main contribution is the design of a Proof of Stake protocol based on a stake tree, which builds upon an idea called follow-the-satoshi used in previous papers. READ MORE