Essays about: "Digital signatures"
Showing result 11 - 15 of 36 essays containing the words Digital signatures.
-
11. Relative vegetation height variation and reflectance of herbaceous-dominated patches in Central Sweden
University essay from Stockholms universitet/Institutionen för naturgeografiAbstract : Semi-natural landscapes are recognized as suitable habitats for different plant species and provide ecosystem services that contribute to increased plant biodiversity. At the stand level, plant biodiversity is influenced by vegetation structure, of which vegetation height is an important parameter. READ MORE
-
12. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE
-
13. Feature Analysis in Online Signature Verification on Digital Whiteboard : An analysis on the performance of handwritten signature authentication using local and global features with Hidden Markov models
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : The usage of signatures for authentication is widely accepted, and remains one of the most familiar biometric in our society. Efforts to digitalise and automate the verification of these signatures are hot topics in the field of Machine Learning, and a plethora of different tools and methods have been developed and adapted for this purpose. READ MORE
-
14. Applied design of distributed ledgers for real estate and land registration
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The recent emergence of a distributed technology named blockchain, clearly created a new point of view in the data storing and data distribution fields. If on one hand blockchain is mainly known for Bitcoin (an auto-regulated decentralized digital currency), on the other hand it has the potential to set up an auto regulated economy. READ MORE
-
15. Operator authentication and accountability for SCADA servers when requests are forwarded by a middle layer
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Due to their critical nature, the actions performed by operators on IndustrialControl Systems (ICS) are subject to source authentication andaccountability. When commands are not send directly by the user, butforwarded by middle servers, the compromise of those severs threatensthe security of the whole architecture. READ MORE