Advanced search

Found 2 essays matching the above criteria.

  1. 1. Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Louise Bergman Martinkauppi; Qiuping He; [2019]
    Keywords : cryptography; performance; SM2; SM3; SM4; kryptering; prestanda; SM2; SM3; SM4;

    Abstract : Background. China is regulating the import, export, sale, and use of encryption technology in China. If any foreign company wants to develop or release a product in China, they need to report their use of any encryption technology to the Office of State Commercial Cryptography Administration (OSCCA) to gain approval. READ MORE

  2. 2. Process handling : A study for optimizing the processes for sourcing IT and managing software licenses

    University essay from KTH/Industriell ekonomi och organisation (Inst.)

    Author : Bashar Shaya; [2012]
    Keywords : Software Asset Management; License Management; Supplier Management;

    Abstract : During a six-month period, the author has studied, observed and analyzed the situation within Skanska ITN, headquartered in Haga Norra, Sweden. Licenses and supplier relationships and management of these are areas Skanska ITN, which delivers and manages IT services and products to Skanska AB, would like to have investigated and analyzed. READ MORE