Essays about: "RSA"

Showing result 1 - 5 of 47 essays containing the word RSA.

  1. 1. Self-Organizing High-Assurance Privacy

    University essay from Uppsala universitet/Institutionen för informationsteknologi; Uppsala universitet/Institutionen för informationsteknologi

    Author : Joakim Ingnäs; Nicole Tutsch; [2019]
    Keywords : ;

    Abstract : When using a network, devices might have to securely communicate with oneanother. Issues arise when the devices are unaware of others in the network, orwhen the devices have to be manually updated with the information about thedevices they wish to communicate with. This presents an issue with bootstrappingover networks. READ MORE

  2. 2. Improvement Strategies in Construction Sites : Development of Rapid Site Assessment for House-building Industry

    University essay from Luleå tekniska universitet/Institutionen för samhällsbyggnad och naturresurser

    Author : Pontus Urban; [2019]
    Keywords : Rapid Site Assessment; RSA; Lean; Lean Construction; House-building industry;

    Abstract : The construction industry has deteriorated during the past 40 years. Up to 35 % of the production cost is from wastes. The manufacturing industry has had an opposite development, in many cases owing to the contributions of Lean Production and various assessment tools. READ MORE

  3. 3. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap; Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Louise Bergman Martinkauppi; Qiuping He; [2019]
    Keywords : cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Abstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE

  4. 4. Hardware Root of Trust for Linux Based Edge Gateway

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap; Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Mohamed Al-Galby; Madani Arezou; [2018]
    Keywords : HRoT; TPM 2.0; Zynq; TSS; RSA; Secure Boot; TPM Simulator;

    Abstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE

  5. 5. Near-local density approximation approach to one-dimensional lattice systems

    University essay from Lunds universitet/Matematisk fysik; Lunds universitet/Fysiska institutionen

    Author : Basheer Joudeh; [2018]
    Keywords : DFT; Hartree; Hartree-Fock; LDA; BALDA; Mean-field; Hubbard; SOFT; Physics and Astronomy;

    Abstract : Describing many-body quantum systems has been an analytically and computationally challenging task since the advent of quantum mechanics. However, in the past 50 years as a result of our technological advancement and the emergence of methods such as density-functional theory (DFT), we have taken crucial steps forward regarding our ability to study and understand large quantum systems. READ MORE