Advanced search

Showing result 1 - 5 of 7 essays matching the above criteria.

  1. 1. On the Viability of Digital Cash in Offline Payments

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Joakim Holgersson; John Enarsson; [2022]
    Keywords : Digital cash; offline payments; anonymous payments; digital coin; electronic coin ; Digitala kontanter; offlinebetalningar; anonyma betalningar; digitala mynt; elektroniska mynt;

    Abstract : Background. As the financial systems around the world become more digitized with the use of a card and mobile payments - we see a decrease in willingness to accept cash payments in many countries. These digital payments require a stable network connection to be processed in real-time. READ MORE

  2. 2. Evaluating Privacy Technologies in Blockchains for Financial Systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Spoorthi Satheesha; [2021]
    Keywords : Blockchain; Encryption; Privacy; Trusted Execution Environment; Zero- Knowledge Proof; Blockkedja; Kryptering; Sekretess; Tillförlitlig Exekveringsmiljö; Bevis För Nollkunskap;

    Abstract : The requirements of privacy have become a necessity in modern-day internet-based applications. This applies from traditional client-server applications to blockchain-based applications. Blockchains being a new domain for application development, the priority towards privacy beyond pseudo anonymity has been lacking. READ MORE

  3. 3. Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexandra Kolonia; Rebecka Forsberg; [2020]
    Keywords : Network security; Privacy; Anonymity; Onion routing; Tor Organization; Wi-Fi data collection; Nätverkssäkerhet; Sekretess; Anonymitet; Lök-routing; Tor Organisation; Wifidatainsamling;

    Abstract : Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. READ MORE

  4. 4. The Effect of 5-anonymity on a classifier based on neural network that is applied to the adult dataset

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Jörgen Paulson; [2019]
    Keywords : Neural Network; k-anonymity; Anonymization;

    Abstract : Privacy issues relating to having data made public is relevant with the introduction of the GDPR. To limit problems related to data becoming public, intentionally or via an event such as a security breach, anonymization of datasets can be employed. READ MORE

  5. 5. Is this your smart phone? : On connecting MAC-addresses to a specific individual using access point data

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Martin Vesterlund; Viktor Wiklund; [2015]
    Keywords : Surveillance mechanisms; Network privacy and anonymity; Social aspects of security and privacy; Mobile devices;

    Abstract : Context. The potential to track individuals become greater and greater in the society today. We want to develop a method that is easy to understand so more people can participate in the discussion about the collection, and storing, of seemingly non-invasive device data and personal integrity. Objectives. READ MORE