Essays about: "encrypted data"

Showing result 1 - 5 of 86 essays containing the words encrypted data.

  1. 1. Models, Keys, and Cryptanalysis: Evaluating historical statistical language models in cryptanalysis of homophonic substitution ciphers

    University essay from Göteborgs universitet/Institutionen för filosofi, lingvistik och vetenskapsteori

    Author : Filip Fornmark; [2023-01-19]
    Keywords : statistical language models; cryptanalysis; historical cryptology; homophonic substitution;

    Abstract : This thesis presents an empirical study connected to historical cryptography and especially within the framework of the research project DECRYPT. One of the research questions in the DECRYPT project relates to the use of language models for automatic cryptanalysis. READ MORE

  2. 2. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  3. 3. Evaluating and Fine-Tuning a Few-Shot Model for Transcription of Historical Ciphers

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Ingrid Eliasson; [2023]
    Keywords : historical ciphers; few-shot learning; automatic transcription;

    Abstract : Thousands of historical ciphers, encrypted manuscripts, are stored in archives across Europe. Historical cryptology is the research field concerned with studying these manuscripts - combining the interest of humanistic fields with methods of cryptography and computational linguistics. READ MORE

  4. 4. Homomorphic encryption

    University essay from KTH/Matematik (Avd.)

    Author : Daniel Sanaee; [2023]
    Keywords : Mathematics; Cryptography; Computer science; Group Theory; Matematik; Kryptografi; Datalogi; Gruppteori;

    Abstract : The problem of constructing a secure encryption scheme that allows for computation on encrypted data was an open problem for more than 30 years. In 2009, Craig Gentry solved the problem, constructing the first fully homomorphic encryption (FHE) scheme. READ MORE

  5. 5. Enhancing Privacy in Cookieless Web Advertising : A Comparative Study of Multi-Party Computation and Trusted Execution Environment Solutions for Private Attribution Reporting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Victor Massy; [2023]
    Keywords : Multiparty computation; Trusted execution envrionment; Web advertising; Private attribution reporting; Flerpartsberäkning; Pålitlig exekveringsmiljö; Webannonsering; Privat attributionsrapportering;

    Abstract : The end of third-party cookies has driven the advertising market to seek new solutions. Third-party cookies were widely used to track users’ online activities across websites. However, the growing concern for privacy has led web browsers to put an end to this practice. READ MORE