Essays about: "Decryption"
Showing result 1 - 5 of 38 essays containing the word Decryption.
-
1. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE
-
2. Evaluating Transcription of Ciphers with Few-Shot Learning
University essay from Uppsala universitet/Institutionen för lingvistik och filologiAbstract : Ciphers are encrypted documents created to hide their content from those who were not the receivers of the message. Different types of symbols, such as zodiac signs, alchemical symbols, alphabet letters or digits are exploited to compose the encrypted text which needs to be decrypted to gain access to the content of the documents. READ MORE
-
3. Security Evaluation of Damper System’s Communication and Update Process : Threat modeling using vehicleLang and securiCAD
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As the automotive industry becomes increasingly reliant on digital systems it is of utmost importance that these systems are secure. Secure systems are of interest both for the general public as well as manufactures. READ MORE
-
4. Design and evaluation of an inter-core QUIC connection migration approach for intra-server load balancing
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the emergence of novel cloud applications and their critical latency demand [1], Quick UDP Internet Connection (QUIC) [2] was proposed as a new transport protocol that is promising to reduce the connection establishment overhead while providing security properties similar to Transport Layer Security (TLS) [3]. However, without an efficient task scheduling mechanism, the high cost for encryption and decryption in QUIC can easily lead to load imbalance among multiple Central Processing Unit (CPU) cores and thus cause a high tail latency. READ MORE
-
5. Ethical hacking of Danalock V3 : A cyber security analysis of a consumer IoT device
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : IoT-enheter blir alltmer populära. IoT-produkter tillåter användare att fjärrstyraenheten med hjälp av en mobilapplikation eller en webbapplikation. För dettaändamål används en mängd av kommunikationsprotokoll som Bluetooth och Wi-Fi.Denna sammankoppling av enheter och användningen av olika tekniker kan leda tillsäkerhetsproblem. READ MORE
