Essays about: "asymmetric encryption"
Showing result 1 - 5 of 9 essays containing the words asymmetric encryption.
-
1. Multiparty adversarial neural cryptography with symmetric and asymmetric encryption
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Deep learning has shown excellent performance in image recognition, speech recognition, natural language processing and other fields over the recent decades. Cryptography is a technical science that studies the preparation and decoding of ciphers. READ MORE
-
2. User Attitudes around Key Management, and their Impact on Blockchain Technology Adoption
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The following study examines the background of users’ decisions about their behavior concerning online identity, specifically looking at the acceptance or rejection of self-sovereign identity solutions and the technologies that support them: blockchain and asymmetric encryption. A qualitative analysis is presented of typical user narratives concerning online behavior, while exploring the cultural values underlying users’ decisions about accepting or rejecting new, potentially emancipatory technologies. READ MORE
-
3. Post-Quantum Public Key Cryptography for the Internet of Things
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Recent progress in the field of quantum computers provide radically improved muscles to search and sort in lists, solve systems of equations and prime factorize – virtues that inflict an immediate threat to the most common systems for public key cryptography used in a vast proportion of today’s computer networks. NTRUEncrypt is a lattice-based cryptography system which inhibits quantum computers for breaking the algorithm in polynomial time. READ MORE
-
4. A Web-Based Application for the Secure Transfer of NGS data
University essay from Uppsala universitet/Experimentell och klinisk onkologiAbstract : During the last decade, the use of Next-Generation Sequencing(NGS) technologies has sky-rocketed. The vast amount of data produced by these platforms require processing and analysis. This is usually performed at locations remote from the sequencing facilities thereby introducing the need for data-transportation to the place of analysis. READ MORE
-
5. Security of Big Data: Focus on Data Leakage Prevention (DLP)
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Data has become an indispensable part of our daily lives in this era of information age. The amount of data which is generated is growing exponentially due to technological advances. This voluminous of data which is generated daily has brought about new term which is referred to as big data. READ MORE