Essays about: "Merkle träd"
Showing result 1 - 5 of 6 essays containing the words Merkle träd.
-
1. LF-PKI: Practical, Secure, and High-Performance Design and Implementation of a Lite Flexible PKI
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Today’s Web Public Key Infrastructure (PKI) builds on a homogeneous trust model. All Certificate Authorities (CAs) are equally trusted once they are marked as trusted CAs on the client side. As a result, the security of the Web PKI depends on the weakest CA. READ MORE
-
2. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
3. Design and Implementation of A Smart Grid System Based on Blockchain Smart Contract Technology
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : Under de senaste åren har blockchain-tekniken fått mer och mer uppmärksamhet. Det har visat speciella fördelar i digital valuta, eftersom det distribueras och dess data inte kan ändras. Med fler länder som presenterar idén om kraftsysteminnovationen har ett stort antal distribuerade kraftkällor dykt upp. READ MORE
-
4. Using Hash Trees for Database Schema Inconsistency Detection
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : For this work, two algorithms have been developed to improve the performance of the inconsistency detection by using Merkle trees. The first builds a hash tree from a database schema version, and the second compares two hash trees to find where changes have occurred. READ MORE
-
5. Privacy Preserving Audit Proofs
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : The increased dependence on computers for critical tasks demands sufficient and transparent methods to audit its execution. This is commonly solved using logging where the log must not only be resilient against tampering and rewrites in hindsight but also be able to answer queries concerning (non)-membership of events in the log while preserving privacy. READ MORE