Essays about: "Digital signature"
Showing result 11 - 15 of 41 essays containing the words Digital signature.
-
11. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey
University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystemAbstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE
-
12. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE
-
13. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE
-
14. Feature Analysis in Online Signature Verification on Digital Whiteboard : An analysis on the performance of handwritten signature authentication using local and global features with Hidden Markov models
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : The usage of signatures for authentication is widely accepted, and remains one of the most familiar biometric in our society. Efforts to digitalise and automate the verification of these signatures are hot topics in the field of Machine Learning, and a plethora of different tools and methods have been developed and adapted for this purpose. READ MORE
-
15. Patterns of malware and digital attacks : A guideline for the security enthusiast
University essay fromAbstract : Context: In today’s era, many things are dependent on the internet thus the devices and applications that are using it proliferates. Every day, many devices are getting targeted by malevolent virus authors. To protect the data from malicious factors becomes a preposterous dispute. READ MORE