Essays about: "Digital signature"

Showing result 11 - 15 of 41 essays containing the words Digital signature.

  1. 11. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : David Hilm; David Rahim; [2019]
    Keywords : Digital signature; Security; Two-factor Authentication; Authentication; Cryptography; YubiKey; JavaScript; WebCrypto; Universal Second Factor;

    Abstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE

  2. 12. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Louise Bergman Martinkauppi; Qiuping He; [2019]
    Keywords : cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Abstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE

  3. 13. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Martin Lang; [2019]
    Keywords : Automotive Ethernet; Information Security; Integrity; Time Sensitive Systems; Automotive Ethernet; Informationssäkerhet; Integritet; tidskänsliga system;

    Abstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE

  4. 14. Feature Analysis in Online Signature Verification on Digital Whiteboard : An analysis on the performance of handwritten signature authentication using local and global features with Hidden Markov models

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Simon Olander Sahlén; [2018]
    Keywords : signature; machine learning; hmm; online; verification; hidden markov model; whiteboard; wall; wallrite; hand written; written;

    Abstract : The usage of signatures for authentication is widely accepted, and remains one of the most familiar biometric in our society. Efforts to digitalise and automate the verification of these signatures are hot topics in the field of Machine Learning, and a plethora of different tools and methods have been developed and adapted for this purpose. READ MORE

  5. 15. Patterns of malware and digital attacks : A guideline for the security enthusiast

    University essay from

    Author : Wolf Güven; [2018]
    Keywords : malware; ransomware; keylogger; virus; antivirus; encryption; infection; protection; user guideline; digital attack;

    Abstract : Context: In today’s era, many things are dependent on the internet thus the devices and applications that are using it proliferates. Every day, many devices are getting targeted by malevolent virus authors. To protect the data from malicious factors becomes a preposterous dispute. READ MORE