Essays about: "Digital signatures"
Showing result 21 - 25 of 36 essays containing the words Digital signatures.
-
21. On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. READ MORE
-
22. The Needed Input Data for Accurate On-line Signature Verification : The relevance of pressure and pen inclination for on-line signature verification
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : Signatures have been used to authenticate documents and transactions for over 1500 years and are still being used today. In this project a method for verifying signatures written on a tablet has been developed and tested in order to test whether pressure information is vital for a well performing on-line signature verification systems. READ MORE
-
23. Hardware Security Module Performance Optimization by Using a "Key Pool" : Generating keys when the load is low and saving in the external storage to use when the load is high
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : This thesis project examines the performance limitations of Hardware Security Module (HSM) devices with respect to fulfilling the needs of security services in a rapidly growing security market in a cost-effective way. In particular, the needs due to the introduction of a new electronic ID system in Sweden (the Federation of Swedish eID) and how signatures are created and managed. READ MORE
-
24. New Cryptographic Key Management for Smart Grid
University essay from Institutionen för informationsteknologiAbstract : A smart grid is a simple upgrade of a power grid, which delivers electricity from suppliers to consumers. It uses two-way digital communication in order to control appliances at consumers’ households. Such system saves energy, reduces costs and increases reliability and transparency. READ MORE
-
25. The major security challenges to cloud computing.
University essay from Högskolan i Borås/Institutionen Handels- och IT-högskolanAbstract : Cloud computing is the computing model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or light-weight desktop machine over the internet (Wink, 2012). This computing model abolishes the necessity of sustaining the computer resources locally hence cuts-off the cost of valuable resources (Moreno, Montero & Llorente, 2012). READ MORE