Essays about: "Storage of encryption keys in devices"

Found 4 essays containing the words Storage of encryption keys in devices.

  1. 1. KeySafe The platform-independent password safe with external security

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Olof Björklund; [2015]
    Keywords : Password management; security;

    Abstract : Storing and accessing sensitive data has become an important task in today’s society. Many different services require login credentials for users to remember in order to authenticate themselves. A common habit is to use the same password for several services. READ MORE

  2. 2. Cloud computing from a privacy perspective

    University essay from Institutionen för datavetenskap

    Author : Daniel Evertsson; [2013]
    Keywords : ;

    Abstract : The cloud could simplifies the everyday life of private individuals as well as big enterprises by renting out recourses. Resources such as storage capacity, computational power or cloud-based applications could be accessed without the need to invest in expensive infrastructure. READ MORE

  3. 3. Securing Distributed Context Exchange Networks in Mobile Environments

    University essay from Avdelningen för informations- och kommunikationssystem

    Author : Sijan Kafle; [2013]
    Keywords : MediaSense; Security; Java.;

    Abstract : The use of the internet has exploded with many more context aware applications for different services, simplifying the use and access for human requirements. The present situation shows an increasing number of devices from computers to sensors and actuators that are connected to the internet. READ MORE

  4. 4. Secure storage of encryption keys

    University essay from Institutionen för systemteknik

    Author : Purushotham Kothapalli; [2007]
    Keywords : Cryptography; Storage of encryption keys in devices; Attacks on devices; Proposed secure system;

    Abstract : The purpose of this thesis work was to make a survey of presently existing devices available in the market to store encryption keys; how the hacker intrudes into the device; what are the attacks behind theft of the keys; how can we store encryption keys securely? To achieve this purpose, an overview of the storage devices and attacks made by hackers was acquired through academic books and papers, Internet sites and magazines. Basic cryptography and related algorithms were studied for the purpose of knowing how the encryption key is generated from these algorithms. READ MORE