Essays about: "Digital Signature"

Showing result 16 - 20 of 41 essays containing the words Digital Signature.

  1. 16. Post-quantum algorithms for digital signing in Public Key Infrastructures

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Mikael Sjöberg; [2017]
    Keywords : Post-quantum algorithms; Digital signature algorithms; Public Key Infrastructures;

    Abstract : One emerging threat to Public Key Infrastructures is the possible development of large-scale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. READ MORE

  2. 17. Cryptographic Attestation of the Origin of Surveillance Images

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Eliasson; [2017]
    Keywords : Video signing; Video surveillance; H.264 AVC; Public-key cryptography; Axis Communications AB; Technology and Engineering;

    Abstract : A method is devised that provides authentication and integrity protection for H.264 encoded surveillance video. A digital signature is created at the H. READ MORE

  3. 18. Evaluation and Implementation for Pushing Automatic Updates to IoT Devices

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Menglei Min; [2017]
    Keywords : Automatic update; Internet of things; Digital signature; Secure sockets layer communication; Secure hash algorithm;

    Abstract : In recent years, Internet of Things has developed rapidly, and now has penetrated into human life and industrial production. It is speculated that the internet of things will become ubiquitous in the future, which will bring a series of problems. READ MORE

  4. 19. Consistent authentication in disitrbuted networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Lindskog; [2016]
    Keywords : Authentication; Distributed Hash Table; Kademlia; Distributed Networking; Network Security; Calvin; Cryptography; Technology and Engineering;

    Abstract : In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in relevance, new storage solutions are needed. Storage can no longer rely on a single central entity but rather needs to depend on the resources of the entire network. READ MORE

  5. 20. An Analysis and Interpretation of the Geoscience BC Trek Project Till Geochemical and Mineralogical Data to Determine the Surficial Geochemical Expression of Bedrock Au-Ag-Cu-Mo Mineralization on the Nechako Plateau, British Columbia, Canada.

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : Karin Öberg; [2016]
    Keywords : British Columbia; till; gold; copper; mineralization; British Columbia; morän; mineralisering; guld; koppar;

    Abstract : The mineral exploration in the interior of British Columbia is challenged by an extensive coverage of glacial sediments. The Geoscience British Columbia (GBC) Targeting Resources through Exploration and Knowledge (TREK) Survey has since 2013 collected till samples in the northern interior plateau of British Columbia, covering an area of approximately 25,000km2. READ MORE