Essays about: "FIPS"

Showing result 1 - 5 of 7 essays containing the word FIPS.

  1. 1. Tamper Protection for Cryptographic Hardware : A survey and analysis of state-of-the-art tamper protection for communication devices handling cryptographic keys

    University essay from Linköpings universitet/Informationskodning

    Author : Emil Johansson; [2020]
    Keywords : ;

    Abstract : This master's thesis was conducted at Sectra Communications AB, where the aim of the thesis was to investigate the state of the art of physical hardware tampering attacks and corresponding protections and mitigations, and finally combining this to a protection model that conforms to the FIPS 140-2 standard. The methods used to investigate and evaluate the different attacks were literature searching, looking for articles presenting different attacks that have been used against real targets, and attacks that there are no records of being attempted on a real target, but are theoretically possible. READ MORE

  2. 2. Pathogenesis and risk factors of feline infectious peritonitis

    University essay from SLU/Dept. of Biomedical Sciences and Veterinary Public Health

    Author : Kristian Arkela; [2019]
    Keywords : infektiös; peritonit; katt; patogenes; FIP; feline; coronavirus; risk;

    Abstract : Feline infectious peritonitis (FIP) is a fatal disease amongst both domesticated and wild felines. Pathogenesis behind FIP is not completely clear, but the consensus states that Feline coronavirus (FCoV) acquires mutations in genes that code for example the Spike (S) protein and 3c (Bank-Wolf et al., 2014; Chang et al., 2012; Vennema, 1999). READ MORE

  3. 3. Access Control With High Security Credentials

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Michael Kapusta; Nicklas Lindstrom; [2016]
    Keywords : Technology and Engineering;

    Abstract : Developing security regardless of its format is a constant cat and mouse game were adversaries are either in the midst of trying to crack your solution, or they may have already cracked it. A cryptographic algorithm may be unfeasible to crack from a mathematical perspective but as long as a human being is the one developing the solution, a human error is always possible. READ MORE

  4. 4. Security integration in IP video surveillance systems

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Natalia Paratsikidou; [2014]
    Keywords : Video surveillance Systems; security; FIPS; OpenVNP; Videoövervakningssystem; säkerhet; FIPS; OpenVPN;

    Abstract : Video surveillance systems are a rapidly growing industry. As with most systems, this technology presents both opportunities and threats. The wide adoption of video surveillance systems by various businesses and individuals has raised some vital security issues. READ MORE

  5. 5. Strong Authentication Protocol using PIV Card with Mobile Devices

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Mao Kunning; [2013]
    Keywords : Mobile Applications Security; Strong Authentication; Smart Card;

    Abstract : Nowadays weak single-factor authentication mechanisms like passwords or passphrases are commonly used. Static passwords are easy to use, just remember them in mind. However it has many security weaknesses and even strong passwords are not strong enough. READ MORE