Essays about: "Encryption"
Showing result 6 - 10 of 274 essays containing the word Encryption.
-
6. Tenant Separation on a multi-tenant microservice platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE
-
7. Industry preferred implementation practices for security in cloud systems : An exploratory and qualitative analysis of implementation practices for cloud security
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : Since the introduction of cloud computing as a standard solution for data storage and software hosting, new security measures have been developed, and data laws and compliance regulations have become more stringent. In this thesis, the exploration of compliance and regulatory documents, interviews of industry professionals, and thematic analysis of interview data uncover some industry-preferred implementation practices that will help to ensure compliance and cloud security for applications and data storage on the cloud. READ MORE
-
8. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE
-
9. Development of a QRNG front-end for shot noise measurement : analysis of quantum shot noise originating from photodiodes
University essay from Linköpings universitet/InformationskodningAbstract : As one of the more mature quantum technologies, quantum random number generators (QRNGs) fill an important role in producing secure and private keys for use in cryptogra- phy in e.g. quantum key distribution (QKD) systems. Many available QRNGs are expen- sive and optical QRNGs often require complex optical setups. READ MORE
-
10. Cloud-Based Collaborative Local-First Software
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Local-first software has the potential to offer users a great experience by combining the best aspects of traditional applications with cloud-based applications. However, not much has been documented regarding developing backends for local-first software, particularly one that is scalable while still supporting end-to-end encryption. READ MORE