Essays about: "encryption ip"

Showing result 1 - 5 of 16 essays containing the words encryption ip.

  1. 1. Homomorphic Encryption for Audio Conferencing

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Herman Nordin; Ebba Lindström; [2022]
    Keywords : Homomorphic encryption; VoIP; security; audio conferencing; cryptography;

    Abstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE

  2. 2. TLS Decryption in passive monitoring system with server private key

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Emil Käck; [2021]
    Keywords : TLS; Decryption; Passive monitoring; Server private key;

    Abstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE

  3. 3. Secure DNS transport methods

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Tony Berglund; [2020]
    Keywords : ;

    Abstract : The Domain Name System (DNS) is a large cornerstone in internet traffic. It translates domain names to IP addresses. Standard DNS(Do53) does not encrypt any of its traffic which leads to some security issues. Mainly that others are able to extract information and tamper with the DNS requests and responses. READ MORE

  4. 4. Private, secure, and censorship resistant document sharing : for individuals and groups based on distributed ledger technology

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jens Röwekamp; [2018]
    Keywords : ;

    Abstract : The scandal around Facebook and Cambridge Analytica in 2017 showed drastically that new concepts to share andstore information need to be developed in order to minimize the huge potential for abuse resulting from centralized information stored at trusted third parties. This thesis analysed to what degree current document exchange systems (e.g. READ MORE

  5. 5. Efficient Multi-Core Implementation of the IPsec Encapsulating Security Payload Protocol for a Single Security Association

    University essay from Linköpings universitet/Programvara och system

    Author : Mattias Hellsing; Odervall Albin; [2018]
    Keywords : Telecom 5G Eventdev Data Stream Processing;

    Abstract : As the mobile Internet traffic increases, the workload of the base stations processing this traffic increases with it. To cope with this, the telecommunication providers responsible for the systems deployed in these base stations have looked to parallelism. READ MORE