Advanced search
Showing result 1 - 5 of 30 essays matching the above criteria.
-
1. E2PM: Enclosed Portable Password Manager
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Passwords have been a necessary evil for a while. Today’s computer users have multiple accounts on the internet, with each burdening the user’s memory with complex long passwords. READ MORE
-
2. Performance Evaluation of Cryptographic Algorithms on ESP32 with Cryptographic Hardware Acceleration Feature
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rise of the Internet of Things (IoT) and autonomous robots/vehicles comes with a lot of embedded electronic systems. Small printed circuit boards with microcomputers will be embedded almost everywhere. READ MORE
-
3. An Efficiency Evaluation of Far-Field Electromagnetic Deep Learning Side-Channel Attacks in Controlled Environments
University essay from Uppsala universitet/Signaler och systemAbstract : As more and more modern systems and products use built-in microcontrollers, hardware security becomes more important to protect against cyber-attacks. Internet of things devices, like Bluetooth devices, usually use an encryption algorithm to keep data safe from hackers. Advanced Encryption Standard (AES) is a commonly used encryption algorithm. READ MORE
-
4. Performance benchmarking of data-at-rest encryption in relational databases
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : This thesis is based on measuring how Relational Database Management Systems utilizing data-at-rest encryption with varying AES key lengths impact the performance in terms of transaction throughput of operations through the process of a controlled experiment. By measuring the effect through a series of load tests followed by statistical analysis, the impact of adopting a specific data-at-rest encryption algorithm could be displayed. READ MORE
-
5. TLS Decryption in passive monitoring system with server private key
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE