Essays about: "Secure Boot"
Showing result 1 - 5 of 7 essays containing the words Secure Boot.
-
1. E2PM: Enclosed Portable Password Manager
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Passwords have been a necessary evil for a while. Today’s computer users have multiple accounts on the internet, with each burdening the user’s memory with complex long passwords. READ MORE
-
2. Building and Evaluating a Full Disk Encrypted Secure Multi-user Operating Platform in Linux
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Security is more important than ever, and since we are storing much of our sensitive data on hard drives, the demand for security systems is high. Full disk encrypted systems where multiple users can decrypt the same hard drive using the same secret but with different credentials are not common and is something that the military and various companies demand. READ MORE
-
3. Next generation of trunks in battery electric vehicles
University essay fromAbstract : The development of battery electric vehicles (BEV) has gained momentum during recent years and the adoption rate will continue to increase. In 2020, 33 BEV models are expected to be released to the European market, compared to only six models in 2017. This is one of many examples of the development on the international BEV market. READ MORE
-
4. There’s a Snake in My Boot!
University essay from Lunds universitet/Företagsekonomiska institutionenAbstract : Kering is a multi-player in the luxury industry, owning high-end brands such as Gucci, Saint Laurent, Alexander McQueen, among others. A range of product lines of these brands use exotic skins as raw materials. Some argue that the use of such materials is too cruel and that the animal welfare cannot be guaranteed. READ MORE
-
5. Hardware Root of Trust for Linux Based Edge Gateway
University essay from Högskolan Kristianstad/Fakulteten för naturvetenskapAbstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE