Essays about: "Symmetric cryptography"

Showing result 11 - 15 of 23 essays containing the words Symmetric cryptography.

  1. 11. Distributed ledger technology in the capital market : Shared versus private information in a permissioned blockchain

    University essay from Uppsala universitet/Avdelningen för datalogi

    Author : Alessandro Piccolo; [2017]
    Keywords : Blockchain; Blockchain technology Distributed ledger; Capital market; Private transaction; Cryptography; Bitcoin; Ethereum; Quorum; Corda; Ripple;

    Abstract : This master thesis explores how blockchain technologies can be utilized within the financial sector with focus on how to store both private and public information on the blockchain. The capital market is looking into ways of cutting down administrative work through streamlining the financial process by using blockchain technologies. READ MORE

  2. 12. An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT

    University essay from Blekinge Tekniska Högskola

    Author : Olha Khomlyak; [2017]
    Keywords : Internet of Things; Lightweight cryptography; Measurement; Hybrid Scheme;

    Abstract : Data security plays a central role in the design of Internet of Things (IoT). Since most of the "things" in IoT are embedded computing devices it is appropriate to talk about cryptography in embedded of systems. This kind of devices is based on microcontrollers, which have limited resources (processing power, memory, storage, and energy). READ MORE

  3. 13. Access Control in the Internet of Things

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Denis Sitenkov; [2014]
    Keywords : ;

    Abstract : The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. READ MORE

  4. 14. Access Control in the Internet of Things

    University essay from RISE./SICS

    Author : Sitenkov Denis; [2014]
    Keywords : ;

    Abstract : The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. READ MORE

  5. 15. Distributed cipher chaining for increased security in password storage

    University essay from Linköpings universitet/Datorteknik; Linköpings universitet/Tekniska högskolan

    Author : David Odelberg; Carl Rasmus Holm; [2014]
    Keywords : Cryptography; Password storage; AES; KDF; Scrypt;

    Abstract : As more services move on to the web and more people use the cloud for storage of important information, it is important that providers of such services can guarantee that information is kept safe. The most common way of protecting that data is to make it impossible to access without being authenticated as the user owning the data. READ MORE