Essays about: "Digital signature"
Showing result 1 - 5 of 41 essays containing the words Digital signature.
-
1. Evaluating the performance of FPGA-based Secure Hash Algorithms for use in SPHINCS+
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the digital landscape of today, large amounts of transactions, messaging and different kinds of authorizations are carried out online. To ensure the the integrity and security of these systems, digital signature systems are used to verify the identity of different individuals and entities. READ MORE
-
2. Authentication Techniques Based on Physical Layer Attributes
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE
-
3. Implementation of the signature scheme Rainbow on SoC FPGA
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Thanks to the research progress, quantum computers are slowly becoming a reality, and some companies already have working prototypes. While this is great news for some, it also means that part of the encryption used today will be rendered unsafe and obsolete. READ MORE
-
4. Call for Diversity in Web 3.0 : Case Study of NFT Art Projects World of Women (WoW) and Women Rise
University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)Abstract : Non-fungible tokens (NFTs) are digital assets that exist in the blockchain with a unique signature that has been gaining significant attention starting from the early 2021. While NFTs can be anything stored digitally from text to music, since these digital tokens enable artists to democratize their works, there has been a particular rise in using them to promote digital art which has long been undervalued. READ MORE
-
5. BGPcredit : A Blockchain-based System for Securing BGP
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Due to the absence of appropriate security mechanisms, even the latest version of Board Gateway Protocol (BGP) is still highly vulnerable to malicious routing hijacking. The original problem is that BGP allows router to accept any BGP update message without any extra validation process. READ MORE