Essays about: "Elliptical Curve Cryptography"
Found 2 essays containing the words Elliptical Curve Cryptography.
-
1. Proof-of-Possession Tokens in Microservice Architectures
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : The popular OAuth 2.0 Framework specifies the use of Bearer Tokens for the transmission of authorization credentials. A Bearer Token has the property that any party in possession of it can use the it. Requests including Bearer Tokens are therefore performed over a secure channel t oensure that tokens cannot be obtained by eavesdroppers. READ MORE
-
2. Security and Privacy of Controller Pilot Data Link Communication
University essay from Linköpings universitet/Kommunikations- och transportsystem; Linköpings universitet/Tekniska fakultetenAbstract : Newly implemented technologies within the aviation lack, according to recent studies, built in security measures to protect them against outside interference. In this thesis we study the security and privacy status of the digital wireless Controller Pilot Data Link Communication (CPDLC) used in air traffic management alongside other systems to increase the safety and traffic capacity of controlled airspaces. READ MORE