Essays about: "SHA"
Showing result 11 - 15 of 37 essays containing the word SHA.
-
11. Migration of Signing Algorithms : An investigation in migration of signing algorithms used in certificate authorities.
University essay from KTH/Hälsoinformatik och logistikAbstract : The migration of signing algorithms is a process which can be used to move from signing algorithms which are regarded as less safe to algorithms which are regarded as safer. The safety of cryptographic algorithms has been compromised before, algorithms such as SHA-1 has been proven to be broken. READ MORE
-
12. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE
-
13. A Web-Based Application for the Secure Transfer of NGS data
University essay from Uppsala universitet/Experimentell och klinisk onkologiAbstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE
-
14. Secure Automotive Ethernet : Balancing Security and Safety in Time Sensitive Systems
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background.As a result of the digital era, vehicles are being digitalised in arapid pace. Autonomous vehicles and powerful infotainment systems are justparts of what is evolving within the vehicles. These systems require more in-formation to be transferred within the vehicle networks. READ MORE
-
15. The blockchain based system to guarantee the data integrity of IIoT
University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologiAbstract : With the advent of big data era, there is countless data produced from various kinds of machines every second. These data are used to help people to do studies, produce goods, improve the efficiency of the industrial development, and so on. READ MORE