Essays about: "SHA-256"
Showing result 1 - 5 of 8 essays containing the word SHA-256.
-
1. GNSS Safety and Handling
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. READ MORE
-
2. Testing Platform for Memory IPs using PULPissimo
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Memory IPs are important components in SoC designs. Hence, making sure that the memory IPs are functioning as expected is crucial for any organization. In order to do so, memory IPs must be tested. In addition, the testing capabilities can be enhanced by integrating a processor to the memory test chip. READ MORE
-
3. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE
-
4. A Web-Based Application for the Secure Transfer of NGS data
University essay from Uppsala universitet/Experimentell och klinisk onkologiAbstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE
-
5. The blockchain based system to guarantee the data integrity of IIoT
University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologiAbstract : With the advent of big data era, there is countless data produced from various kinds of machines every second. These data are used to help people to do studies, produce goods, improve the efficiency of the industrial development, and so on. READ MORE