Advanced search
Showing result 1 - 5 of 33 essays matching the above criteria.
-
1. Anonymization of Sensitive Data through Cryptography
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : In today's interconnected digital landscape, the protection of sensitive information is of great importance. As a result, the field of cryptography plays a vital role in ensuring individuals' anonymity and data integrity. READ MORE
-
2. Setting up Relationships in the Context of new Asset Efficiency Service Offerings
University essay from Karlstads universitet/Handelshögskolan (from 2013)Abstract : One of the most current situations for businesses to deal with is the highly competitive markets. Organizations often deal with this by including more services into their offerings to become more attractive to their customers, termed servitization. READ MORE
-
3. A Cross-Platform Always On VPN Solution for Ensuring Online Security
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : This thesis examines the implementation of an Always On VPN solution for Windows 10 and macOS, focusing on the configuration of a Palo Alto Firewall to enable their GlobalProtect VPN as Always On. This means that the VPN solution is enabled on a device at all times. READ MORE
-
4. Clueless: A Tool Characterising Values Leaking as Addresses : Clueless: A Tool Characterising Values Leaking as Addresses
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : A fundamental programming feature that allows Spectre to effortlessly leak the value of secrets via cache side channels is the transformation of data values into addresses. Consider forexample sorting, hashing, or many other algorithms that create addresses based on datavalues. READ MORE
-
5. Far Field EM Side-Channel Attack Based on Deep Learning with Automated Hyperparameter Tuning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Side-channel attacks have become a realistic threat to the implementations of cryptographic algorithms. By analyzing the unintentional, side-channel leakage, the attacker is able to recover the secret of the target. Recently, a new type of side-channel leakage has been discovered, called far field EM emissions. READ MORE