Essays about: "Secret Key."

Showing result 21 - 25 of 55 essays containing the words Secret Key..

  1. 21. Enhancing Zigbee Security for Industrial Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Hamza Kadhum; [2020]
    Keywords : Zigbee network security; LoWPAN; IoT; Wireless Sensor Network; Node lifetime; Zigbee nätverk säkerhet; LoWPAN; IoT; Trådlöst Sensornätverk; Sensornodens livslängd;

    Abstract : Zigbee network is a popular choice for deploying low power personal area network (LoWPAN). The application areas vary but the most popular are industrial area monitoring and home automation. But Zigbee has been identified to have weak security and is not applicable for industrial implementation. READ MORE

  2. 22. The invocation of X

    University essay from Göteborgs universitet/HDK - Högskolan för design och konsthantverk

    Author : Klara Bothén; [2019-07-15]
    Keywords : Textil; Formgivning; Steneby;

    Abstract : “The Invocation of X” takes its beginning in a narrative about domestic textile handicrafts in a historical perspective. This is in turn connected to other stories: handicrafts as a political strategy, secret societies, and the shared matrix of textile and digital structures. READ MORE

  3. 23. Context-Based Authentication and Lightweight Group Key Establishment Protocol for IoT Devices

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Nico Ferrari; [2019]
    Keywords : Internet of Things; Context-based authentication; Fuzzy commitment scheme; Cryptographic key establishment; Lightweight cryptography; Contiki; One-way accumulators;

    Abstract : The concept of the Internet of Things is driven by advancements of the Internet with the interconnection of heterogeneous smart objects using different networking and communication technologies. With the rapidly increasing number of interconnected devices present in the life of a person, providing authentication and secure communication between them is considered a key challenge. READ MORE

  4. 24. Side-Channel Analysis of AES Based on Deep Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Huanyu Wang; [2019]
    Keywords : Side-Channel Attack; Deep Learning; Convolutional Neural Network;

    Abstract : Side-channel attacks avoid complex analysis of cryptographic algorithms, instead they use side-channel signals captured from a software or a hardware implementation of the algorithm to recover its secret key. Recently, deep learning models, especially Convolutional Neural Networks (CNN), have been shown successful in assisting side-channel analysis. READ MORE

  5. 25. A Configuration User Interface for Multi-Cloud Storage Based on Secret Sharing : An Exploratory Design Study

    University essay from Karlstads universitet/Handelshögskolan (from 2013)

    Author : Erik Framner; [2019]
    Keywords : Secret Sharing; multi-cloud; data storage; user interface; design; HCI; security; privacy; usability; trust; PRISMACLOUD;

    Abstract : Storing personal information in a secure and reliable manner may be crucial for organizational as well as private users. Encryption protects the confidentiality of data against adversaries but if the cryptographic key is lost, the information will not be obtainable for authorized individuals either. READ MORE