Essays about: "digital fingerprint"
Showing result 1 - 5 of 11 essays containing the words digital fingerprint.
-
1. Phone Free Study : Encouraging students to put away their phones
University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleAbstract : Many of us have grown up or have been acquainted with individuals who have grown up with smartphones in educational settings. We are well aware of how disruptive they can be, and I myself am not an exception. READ MORE
-
2. Fuzzing of PKCS#11 Trusted Application
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The main goal of this thesis is to find an effective way to fuzz trusted applications (TAs) with source code residing in trusted execution environment (TEE). While fuzzing TAs has been previously done, no work has been found to utilize the source code of TAs to improve the fuzzing. READ MORE
-
3. FPGA Implementation of the ORB Algorithm
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Image feature extraction has become a key technology in the field of autonomous Artificial Intelligence. The algorithm Oriented FAST and Rotated BRIEF (ORB), uses established technologies in image processing to allow a computer to ”see” and navigate its surroundings. READ MORE
-
4. Natural Fingerprinting of Steel
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : A cornerstone in the industry's ongoing digital revolution, which is sometimes referred to as Industry 4.0, is the ability to trace products not only within the own production line but also throughout the remaining lifetime of the products. READ MORE
-
5. Designing a Physical Unclonable Function for Cryptographic Hardware
University essay from Linköpings universitet/Institutionen för teknik och naturvetenskap; Linköpings universitet/Tekniska fakultetenAbstract : Hardware Security Modules (HSMs) are embedded systems that provide a physically secure data storage and handling environment. This master thesis evaluates an HSM method incorporating cryptographic key generation, key management, and tamper protection. READ MORE