Essays about: "Data Encryption on a Network"

Showing result 1 - 5 of 41 essays containing the words Data Encryption on a Network.

  1. 1. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  2. 2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Faith Nnenna Onwumere; [2023]
    Keywords : IoT; ABE; Attribute-based Encryption; CP-ABE; KP-ABE; Internet of Things; Cryptography; Smart Devices;

    Abstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE

  3. 3. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  4. 4. Efficient Memory Encryption for Neural Network Accelerators

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : George-Alexandru Stoian; [2023]
    Keywords : ;

    Abstract : The widespread integration of machine learning (ML) in edge and mobile devices, particularly in critical contexts like autonomous vehicles, highlights the need for robust security. However, ensuring data confidentiality and preserving inference integrity is costly due to the mismatch between traditional security methods and ML demands. READ MORE

  5. 5. Compression's effect on end-to-end latency in file upload systems that utilize encryption

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Kristoffer Zaar; [2023]
    Keywords : Encryption; Compression; Latency; Web-Based systems;

    Abstract : Encryption is the process of obfuscating data to restrict access to it while allowing it to be returned to its original non-obfuscated form through decryption. This process is increasingly used within web-based systems to secure data. READ MORE