Advanced search

Showing result 1 - 5 of 10 essays matching the above criteria.

  1. 1. Compression's effect on end-to-end latency in file upload systems that utilize encryption

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Kristoffer Zaar; [2023]
    Keywords : Encryption; Compression; Latency; Web-Based systems;

    Abstract : Encryption is the process of obfuscating data to restrict access to it while allowing it to be returned to its original non-obfuscated form through decryption. This process is increasingly used within web-based systems to secure data. READ MORE

  2. 2. Securing Electronic Health Records : A Blockchain Solution

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Oscar Andersson; [2021]
    Keywords : Electronic health records; blockchain; ethereum; smart contracts; interplanetary file system;

    Abstract : Blockchain is an interesting technology, with different projects developing every day since it first gained its light back in 2008. More and more research finds blockchain useful in several different sectors. One of the sectors being healthcare, specifically for electronic health records (EHR). READ MORE

  3. 3. Security analysis of a smartlock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Pontus Persman; Sebaztian Öjebrant; [2021]
    Keywords : ;

    Abstract : The Internet of Things (IoT) market has expanded and the variety as well as quantity of IoT devices has been rapidly increasing. Which also bring new security threats as new vulnerabilities are found within IoT devices. READ MORE

  4. 4. Studies of Cipher Keys from the 16th Century : Transcription, Systematisation and Analysis

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Crina Tudor; [2019]
    Keywords : keys; ciphers; historical keys; cryptography; key transcription;

    Abstract : In historical cryptography, a cipher key represents a set of rules by which we can convert between plaintext and ciphertext within an encryption system. Presently, there are not many studies that focus on analysing keys,especially not on a large scale or done in a systematic manner. READ MORE

  5. 5. Designing an Access Control System for Internet of Things

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Felix Grape; [2017]
    Keywords : IoT; internet of things; access control system; security; generic; remote procedure call; rpc; access control; distributed access control; decentralized access control; generic access control system; sakernas internet; accesskontrollsystem; accesskontroll; generisk accesskontroll; generisk;

    Abstract : For many Internet of Things (IoT) devices security have not been a priority during the development, but what happens if the makers of IoT devices use a secure framework for developing their devices? In this thesis a number of such frameworks have been evaluated for their suitability to build an access control system around. Both Vanadium and Protocol of Things (PoT) were found to be suitable candidates. READ MORE