Essays about: "Implementing Encryption"
Showing result 1 - 5 of 17 essays containing the words Implementing Encryption.
-
1. Evaluating intrusion detection points in an end-to-end solution
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE
-
2. A SYSTEMATIC REVIEW OF ATTRIBUTE-BASED ENCRYPTION FOR SECURE DATA SHARING IN IoT ENVIRONMENT.
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Internet of Things (IoT) refers to a network of global and interrelated computing devices that connects humans and machines. It connects anything that has access to the internet and creates an avenue for data and information exchange. READ MORE
-
3. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. READ MORE
-
4. Implementing two Threshold Private Set Intersection Protocols based on Homomorphic Encryption
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Private set intersection is a technique for finding the intersection of (two) parties' sets without disclosing anything else, and it finds it use in e.g. contact discovery, finding friends who are already on a social platform. READ MORE
-
5. TLS Decryption in passive monitoring system with server private key
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE