Essays about: "cryptography authentication"

Showing result 1 - 5 of 28 essays containing the words cryptography authentication.

  1. 1. Privacy-preserving Authentication in Participatory Sensing Systems : An attribute based authentication solution with sensor requirement enforcement.

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jose Luis Martin Navarro; [2023]
    Keywords : Anonymous authentication; privacy; ABS; participatory-sensing-systems; applied-cryptography; mobile-crowdsensing; Anonym autentisering; integritet; ABS; deltagande-avkänningssystem; tillämpad kryptografi; mobil-crowdsensing;

    Abstract : Participatory Sensing Systems (PSS) are a type of Mobile Crowdsensing System where users voluntarily participate in contributing information. Task initiators create tasks, targeting specific data that needs to be gathered by the users’ device sensors. READ MORE

  2. 2. Fuzzing of PKCS#11 Trusted Application

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Kevin Zeng; [2022]
    Keywords : Fuzzing; white-box; PKCS#11; OP-TEE; AFL; Open-TEE; TA; Trusted Application; Technology and Engineering;

    Abstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE

  3. 3. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  4. 4. GNSS Safety and Handling

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Axel Björklund; [2022]
    Keywords : Navigation; GNSS; GPS; Galileo; OSNMA; TESLA protocol; SHA-256; jamming; spoofing; SDR; GPS-SDR-SIM; Smart Tachograph; dead reckoning; U-blox; Volvo Group; Volvo FH;

    Abstract : Satellite navigation (such as GPS) has become widely successful and is used by billions of users daily. Accuratepositioning and timing has a wide range of applications and is increasingly being integrated in safety criticalsystems such as autonomous operations, traffic management, navigation for airplanes and other vehicles. READ MORE

  5. 5. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE