Advanced search

Showing result 1 - 5 of 33 essays matching the above criteria.

  1. 1. Anonymization of Sensitive Data through Cryptography

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Isac Holm; Johan Dahl; [2023]
    Keywords : Cryptography; Encryption; Decryption; AES; Camellia; Anonymization; Sensitive Data;

    Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE

  2. 2. Setting up Relationships in the Context of new Asset Efficiency Service Offerings

    University essay from Karlstads universitet/Handelshögskolan (from 2013)

    Author : Joel Rydén; Sofie Arkensved; [2023]
    Keywords : Servitization; Asset Efficiency Service; Co-creation; Customer Success Management; Tjänstefiering; Asset Efficiency Services; Samskapande; Customer Success Management;

    Abstract : One of the most current situations for businesses to deal with is the highly competitive markets. Organizations often deal with this by including more services into their offerings to become more attractive to their customers, termed servitization. READ MORE

  3. 3. A Cross-Platform Always On VPN Solution for Ensuring Online Security

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Adam Thiede; Josef Samen; [2023]
    Keywords : Always On; VPN; Cross-Platform; Palo Alto;

    Abstract : This thesis examines the implementation of an Always On VPN solution for Windows 10 and macOS, focusing on the configuration of a Palo Alto Firewall to enable their GlobalProtect VPN as Always On. This means that the VPN solution is enabled on a device at all times. READ MORE

  4. 4. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Xiaoyue Chen; [2022]
    Keywords : ;

    Abstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE

  5. 5. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Keyi Liu; [2021]
    Keywords : Side-Channel Attack; Deep Learning; Far Field EM emission; Auto Hyperparameter Tuning; Auto-Keras; AES; Sidokanalattack; Machine Learning; Multilayer Perceptron; Hyperparameter Tuning; Bayesian Optimization; Auto-Keras; AES;

    Abstract : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. READ MORE