Essays about: "Secret Sharing"

Showing result 16 - 20 of 25 essays containing the words Secret Sharing.

  1. 16. Sending Location-Based Keys Using Visible Light Communication

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Abdalah Hilmia; [2016]
    Keywords : ;

    Abstract : In this thesis we explore the possibilities of using Visible Light Communication (VLC) to build a system that is capable of securely sharing small amounts of data in the form of encryption keys in a boundary defined area. We design and implement the MAC and Physical layers of the system. READ MORE

  2. 17. Sending Location-Based KeysUsing Visible Light Communication

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Estuardo Rene Garcia Velasquez; [2016]
    Keywords : ;

    Abstract : In this thesis we present a Security Application based on Visible Light Communication(VLC). As VLC continues to develop, the need to protect valuable informationtransmitted using this type of communication is also growing. READ MORE

  3. 18. Integrated or Comprehensive sharing? : Drivers, enablers and barriers to civilian-military information sharing

    University essay from Försvarshögskolan

    Author : Adam Waller; [2016]
    Keywords : integrated approach; comprehensive approach; information sharing; MINUSMA; ISAF; institutional analysis and development framework;

    Abstract : The UN and NATO have implemented separate approaches to civilian-military cooperation. Central in both approaches is a need for information sharing between civilian and military actors. Without shared information, cooperative planning becomes impossible. READ MORE

  4. 19. Trust and Word of Mouse : Your secret weapons towards customer loyalty on the web

    University essay from Högskolan i Borås/Institutionen Textilhögskolan

    Author : SUSANNE EMOND; HANNA SELLING; [2013]
    Keywords : Online Shopping; Internet; Social Media; Customer loyalty;

    Abstract : With the explosion of social media platforms in the interactive digital media realm and companies increased comprehension of the importance of having loyal customers, the question of social media usage in developing customer loyalty has become more and more prominent. Since social media allows firms to engage directly with the end‐consumer at a relatively low cost and with a higher level of efficiency, it is particularly important for small online branded retailers with limited marketing and PR budgets. READ MORE

  5. 20. Anonymous Authentication Using Secure Multi-Party Computations

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Maqsood Ahmad; [2011]
    Keywords : ;

    Abstract : Typical authentication systems provide a method to allow registered users access to protected resources after the user successfully authenticates. A user successfully authenticates by proving his or her valid identity if he or she is a registered user. READ MORE