Essays about: "Kryptering"
Showing result 6 - 10 of 61 essays containing the word Kryptering.
-
6. Securing Data in a Cloud Environment: Access Control, Encryption, and Immutability
University essay from KTH/Hälsoinformatik och logistikAbstract : The amount of data and the development of new technologies used by all society-critical organizations are increasing dramatically. In parallel, data breaches, cyber-attacks, and their devastating consequences are also on the rise, as well as the number of individuals and organizations that are potential targets for such attacks. READ MORE
-
7. An Arrow Metalanguage for Partially Invertible Computation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Programming languages traditionally describe computations going one way: a program might compute a hash value from a string, or an encrypted message from a plaintext. However, sometimes it is also of interest to go the other way around: for encryption, we not only want to encrypt messages but also to decrypt them, and to be sure that the decryption correctly reproduces the original message. READ MORE
-
8. Privacy-Preserving Alternating Direction Method of Multipliers
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As machine learning models affect our lives more strongly every day, developingmethods to train these models becomes paramount. In our paper, we focus on the problem ofminimizing a sum of functions, which lies at the heart of most - if not all - of these trainingmethods. READ MORE
-
9. Evaluation of Using the WebRTC Protocol as a Fully Distributed System : Measure, benchmark, and evaluate the performance of the WebRTC protocol
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Syftet med detta examensarbete är att och utvärdera undersöka analysera och utvärdera prestandan hos WebRTC-protokollet, samt att utveckla en webbaserad klient med hjälp av JavaScript för distribuerade system och demonstrera protokollets användbarhet i ett verkligt scenario. Studien inkluderade användning av olika verktyg och bibliotek, såsom Socket. READ MORE
-
10. Rethinking Execution Layer Front-Running Protection with Threshold Encryption : F3B: A Per-Transaction Front-Running Protection Architecture with Low-Latency Overhead
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Blockchain is a decentralized and immutable append-only ledger. Smart contracts, the self-executing programs on blockchain, help build the Decentralized Finance (DeFi) markets. Front-running is the practice of benefiting from advanced knowledge of pending transactions. READ MORE