Essays about: "Encryption"

Showing result 1 - 5 of 226 essays containing the word Encryption.

  1. 1. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qiao Jin; [2022]
    Keywords : Embedded systems; ESP 32; Cryptographic algorithms; Cryptographic hardware acceleration; AES; RSA; SHA-2; HTTPS; Inbyggda system; ESP 32; Kryptografiska algoritmer; Kryptografisk hårdvaruacceleration; AES; RSA; SHA-2; HTTPS;

    Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE

  2. 2. Anomaly Detection in a SQL database: A Retrospective Investigation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Vahid Naserinia; Mikael Beremark; [2022]
    Keywords : Anomaly Detection; Machine Learning; Data Mining; Database Security; Intrusion Detection.;

    Abstract : Insider attacks aiming at stealing data are highly common, according to recent studies, and they are carried out in precise patterns. In order to protect against these threats, additional security measures, such as access control and encryption, must be used in conjunction with tools and methods that can detect anomalies in data access. READ MORE

  3. 3. Performance benchmarking of data-at-rest encryption in relational databases

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Stewart Istifan; Mattias Makovac; [2022]
    Keywords : Data-at-rest; encryption; performance comparison; relational database management system; MariaDB; MySQL; advanced encryption standard AES ;

    Abstract : This thesis is based on measuring how Relational Database Management Systems utilizing data-at-rest encryption with varying AES key lengths impact the performance in terms of transaction throughput of operations through the process of a controlled experiment. By measuring the effect through a series of load tests followed by statistical analysis, the impact of adopting a specific data-at-rest encryption algorithm could be displayed. READ MORE

  4. 4. Simulating ADS-B vulnerabilitiesby imitating aircrafts : Using an air traffic management simulator

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Axel Boström; Oliver Börjesson; [2022]
    Keywords : ADS-B; ATC; Impersonation attack; Sybil attack; Air Traffic Communication; openScope; Security; Machine learning; K nearest neighbour; Naive Bayes; Decision tree;

    Abstract : Air traffic communication is one of the most vital systems for air traffic management controllers. It is used every day to allow millions of people to travel safely and efficiently across the globe. READ MORE

  5. 5. Assessing the Security of Internal Automotive Networks

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Anas Alkoutli; Joakim Anderlind; Carl-Johan Björnson; Mathias Drage; Morgan Thowsen; Antonia Welzel; [2021-09-14]
    Keywords : Vehicle; Network Security; CAN; Ethernet;

    Abstract : Context In order to address the growing need for connectivity in today’s cars, the in-vehicle network has increased in complexity, now consisting of over 100 electrical control units. Balancing the level of security with high performance is non-trivial, and current networks have shown to sacrifice security measures for performance, therefore leaving the networks sensitive to both manipulation and information re trieval. READ MORE