Essays about: "encryption ip"
Showing result 1 - 5 of 16 essays containing the words encryption ip.
-
1. Homomorphic Encryption for Audio Conferencing
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE
-
2. TLS Decryption in passive monitoring system with server private key
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. READ MORE
-
3. Secure DNS transport methods
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : The Domain Name System (DNS) is a large cornerstone in internet traffic. It translates domain names to IP addresses. Standard DNS(Do53) does not encrypt any of its traffic which leads to some security issues. Mainly that others are able to extract information and tamper with the DNS requests and responses. READ MORE
-
4. Private, secure, and censorship resistant document sharing : for individuals and groups based on distributed ledger technology
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The scandal around Facebook and Cambridge Analytica in 2017 showed drastically that new concepts to share andstore information need to be developed in order to minimize the huge potential for abuse resulting from centralized information stored at trusted third parties. This thesis analysed to what degree current document exchange systems (e.g. READ MORE
-
5. Efficient Multi-Core Implementation of the IPsec Encapsulating Security Payload Protocol for a Single Security Association
University essay from Linköpings universitet/Programvara och systemAbstract : As the mobile Internet traffic increases, the workload of the base stations processing this traffic increases with it. To cope with this, the telecommunication providers responsible for the systems deployed in these base stations have looked to parallelism. READ MORE