Essays about: "Secret Key."
Showing result 11 - 15 of 55 essays containing the words Secret Key..
-
11. Using Correlation Analysis to Locate Encryption Activity in Electromagnetic Side-Channels
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Physical implementations of cryptographic algorithmscan leak sensitive information through different kindsof side-channels. This information can potentially be used forrecovering the secret key used in the algorithms. Recently, sidechannelattacks on CPU implementations of Advanced EncryptionStandard (AES) has been presented. READ MORE
-
12. Confidential Construction Project : An Explorative-Comparative Study Between Conventional and Confidential Construction Projects
University essay from KTH/Fastigheter och byggandeAbstract : The definition of a project is that an individual or group of individuals carries out a work that results in a unique product or service. What is usually discussed in both the media and in the construction industry is the type of project that you can talk about. In this study, this is called conventional construction projects. READ MORE
-
13. Knock-Knock Door Lock : Unlocking your door with a secret knock sequence
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : The door lock - a key function in every modern home, as well as a product which is today undergoing drastic change. The digital revolution has not left the door lock untouched, and there is today a wide variety of digital door locks utilizing technologies ranging from touch displays to fingerprint readers. READ MORE
-
14. On the pursuit of change: The Role of Middle Managers in Promoting Organizational Entrepreneurship
University essay from Lunds universitet/Företagsekonomiska institutionenAbstract : Background: In today’s dynamic market environment, change and entrepreneurship are considered important for organizations to keep gaining a competitive advantage. Previous literature on change management primarily focuses on the importance of top management and employees during change, while underexposing the potential key role of middle managers in driving and implementing change. READ MORE
-
15. Client controlled, secure endpointto-endpoint storage in the cloud
University essay from KTH/Hälsoinformatik och logistikAbstract : Abstract Softronic's customers do not want them to store sensitive data in a cloud environment as theydistrust the cloud providers with keeping sensitive data secret and are afraid of violating GDPR.Softronic wants to prove that data can be kept protected using encryption, even though it is storedin a cloud, and the goal of this thesis is to find a cryptographic solution with good security and performance. READ MORE